Operations | Monitoring | ITSM | DevOps | Cloud

The What and The Why of TLS Inspection

Connecting to nearly any web page today, you’re more often to see a URL that begins with “https://” instead of “http://”. Wondered what the “S” is for? It stands for “secure”, but more importantly, it identifies that the connection is taking place over a secure channel using the Transport Layer Security (TLS) protocol. But what is TLS, and beyond that, what’s a TLS inspection?

3 Steps to Optimize Collaboration Solutions and Drive Adoption Today

It’s hard to imagine our work lives without collaboration tools. Whether you attend Zoom meetings or brainstorm projects (and send the occasional humorous GIF) on Slack, these solutions have become foundational elements of the workplace – even moreso in recent times, when most workplaces became more digital than ever before.

Monitor Your InfluxDB Open Source Instances with InfluxDB Cloud

Everyone says the cloud is the future. Sure, but try telling that to someone who has terabytes of sensitive data stored in an on-prem InfluxDB Open Source (OSS) instance, and they will bring up a whole set of reasons why it doesn’t make sense for them to move into the cloud right now. There are also some use cases which make more sense for on-prem software deployments.

Building a complete network security checklist

Understanding what to audit in a network can be chaotic and confusing. Building a complete network security checklist is crucial for organizations with computers connected to the internet or to each other. Think of it like an antivirus scan you might run on your computer to find Trojans or malware, except you’re scanning your entire network to find anything that may cripple it.

How to Improve IT Service Desk Performance

IT Service Desks are developed as an efficient mechanism of delivering quick help whenever your employees need it. But as businesses grow, so does the request volume and the pressure on the technicians to attend every call and resolve a ticket. And with the onset of the work-from-home necessity induced by the COVID-19 pandemic, IT teams are struggling to efficiently support a remote workforce with minimum resources.

The Importance of Log Management - Guide & Best Practices

Log management encompasses the processes of managing this trove of computer-generated event log data, including: There are two ways that IT teams typically approach event log management. Using a log management tool, you can filter and discard events you don’t need, only gathering relevant information – eliminating noise and redundancy at the point of ingestion.

How to Manage Your Monitoring with Subaccounts

The need to implement 360° monitoring of a multi-service infrastructure is almost a universal truth among growing companies. With an expanding pool of clients and services to monitor, segmentation is the key to smooth operation. Monitoring with subaccounts is prime management solution. The trick is to simplify your account structure without limiting your visibility. To evaluate, we’re going to dive to a cellular level. Size matters.

June 2021 Civo Roadmap Update

In October 2020 we released the community-driven roadmap for 2021. It's time to revisit and see all the things we have completed from the list! I am very proud to say that at Civo we have taken the community suggestions and implemented most of them during the launch on May 4th 2021. Let's dive into each of the features listed in the original blog post and see where we are with the 2021 Civo Roadmap.

Understanding The Move To Intelligent Networking

More CIOs are seeing the value of network automation, which can improve network efficiency and cost, as well as help them manage increasingly complex IT environments. But like the adoption of any new technology, network automation presents a number of challenges and considerations for CIOs. In our recent webinar, PCCW Global’s CTO Paul Gampe and VP of Development and Operations Jay Turner shared some tips and insights into how to begin the move to intelligent networking…