Operations | Monitoring | ITSM | DevOps | Cloud

Measure your DevSecOps maturity with Datadog's self-assessment

With DevOps teams moving at ever greater speed, it’s vital for security teams to be deeply involved at all stages of the software development and delivery lifecycle. Breaking down silos between development, operations, and security teams ensures that security considerations are not overlooked, that vulnerabilities are caught early, and that security checkpoints do not slow down the delivery process.

Website Monitoring to Optimize Your Page Speed

Chaos theory tells us that disruption strongly relates to time; and that the interval between chaos events either increases or decreases based on the amount of action. It sounds like a complex concept but the internet has managed to prove this theory and make it viral – not Rick Roll viral, more like DogeCoin viral – where profits are instantly influenced by volatile popularity. Inside the internet, speed equals profit so it makes sense to monitor it…but what does that mean?

Enabling Single Sign-On with SQL Monitor

It’s never been more critical to protect your data infrastructure against malicious actors, with organizations dealing with an ever-expanding number of increasingly sophisticated attacks. Monitoring solutions represent part of your infrastructure’s attack surface area – they enjoy highly privileged access to the systems they help manage, and store sensitive information about the workloads running on them.

What is ITSM Automation? 10 Reasons to Adopt ITSM Automation

IT Service Management (ITSM) is the essence of IT service delivery in an organization. However, ITSM cannot properly contribute value if the people, processes, and technology in place are not optimized. This is where ITSM automation can help streamline operations to generate optimum efficiency. But, you may ask, what is ITSM automation exactly and what kind of benefits can it reap for your business? Let’s find out!

What to Look for in a Network Traffic Visibility Solution

As company infrastructures now sprawl across several different environments, additional tools need to be added to the portfolio. But adhering to the traditional approach of focusing on individual devices, their health, performance, and availability, only aggravates its downsides; i.e. visibility blind spots, tool disparity, and therewith connected “swivel-chair” management. The problem calls for increased network traffic visibility that does not come at the cost of extra work.

What is SDLC? An Intro to the Software Development Lifecycle

SDLC is one of the age-old terms in the software industry. SDLC stands for Software Development Lifecycle and is a methodology that defines various strategies and steps for building high-quality software most efficiently. SDLC is undoubtedly an integral part of most organizations’ development routines.

How astronomers use Grafana dashboards to read the stars (and their data) on the SOFIA airborne observatory

There’s stargazing, and then there’s SOFIA. The SOFIA airborne astronomical observatory is a joint NASA and German Aerospace Center endeavor consisting of a modified Boeing 747SP aircraft with a 2.7-meter reflecting telescope and a team of astronomers onboard.

TAP Tank-keeping MSPs up-to-date with the latest cool tech and services in our sector

You may have seen we announced recently that we have more than 50 technology providers active within our Technology Alliance Program (TAP). These providers include many well-known technology leaders, like Cisco, Sophos, and Webroot, alongside emerging innovators, including Liongard and Zomentum.

How you can harden your N-central server

My colleague Lewis Pope, our head security herd, wrote an excellent blog last week about hardening N-able™ RMM. I thought it prudent, in light of recent developments, to do the same for the N-able N-central® product. A lot of it is common knowledge, but I wanted to put together a checklist so you can review the security of your N-central platform and ensure you’re meeting some of these best practices.