Operations | Monitoring | ITSM | DevOps | Cloud

Monitoring UV sensors on the International Space Station with Grafana

In space, there’s no atmosphere to protect against the sun’s ultraviolet radiation. Astronauts in orbit are exposed to the equivalent of eight X-rays a day, and the space stations and suits that protect them degrade over time due to radiation and other factors. Scientists working on the International Space Station (ISS) want to know more about ultraviolet (UV) radiation in orbit so they can design better materials.

Correlate CrowdStrike Data with Logz.io Cloud SIEM

Crowdstrike is an innovator in the endpoint protection market with innovative approaches for the last decade. They specialize in depth of data collection and have uncovered many forensic mysteries in security over the last 10 years. We have many mutual customers with CrowdStrike, which is why we began working with them on a solution to analyze and correlate their data within Logz.io.

Kaseya VSA Cyberattack: A Statement on Solidarity from N-able CSO Dave MacKinnon

The recent Kaseya VSA cyberattack is an important reminder of how security works best when we approach it as a community. The adversarial pivot to supply chain-based attacks for delivering ransomware underscore the role we all must play in helping to keep each other protected.

How to Monitor Logs Guide With Recommended Automated Tools

Log monitoring is a practice used by IT administrators to organize, analyze, and understand a network’s performance. All network devices, including applications and hardware, create logs as they perform operations. Logs are like a device’s diary—they record every event and its critical information like user IP address, date and time, request time, and more.

A Look at Today-The "New Normal"

We’ve reviewed the year that was, how business big and small had to fast forward their digital transformation to accommodate remote work and keep their businesses in business. Some IT leaders have said because of the pandemic, they were able to expedite digitalization and digital transformation within their organizations. Efforts previously envisioned to take months or years were moved forward and achieved in a matter of weeks.

Elastic Security prevents 100% of REvil ransomware samples

Users of Elastic Security are protected through numerous layers of protections against the REvil ransomware that affected Kaseya VSA and its customers. Elastic Security’s layered protections prevented 100% of the REvil ransomware samples tested before damage and loss could occur to the business. We believe that detections and preventions must be layered, as no single protection works 100% of the time.

DX NetOps 21.2 Network Monitoring Software Continues to Improve Visibility with Expanded SD-WAN, SDDC, and SD-WiFi Coverage

DX NetOps 21.2 network monitoring software continues to innovate and improve the scale, speed, and simplicity of network operations with a focused set of high-value features and capabilities. The solution collects data (network faults, performance, events, and alarms) from SDN and WiFi controllers and orchestrators to deliver deep visibility into the health and performance of your modern network deployments. Additionally, the solution correlates data from different network streams.