Operations | Monitoring | ITSM | DevOps | Cloud

Building a Superstar SOC with Automation and Standardization

When you have a team of security analysts that have a wide range of expertise, knowledge, and experience, it is natural to see the difference in the quality of work performed. One of the biggest challenges that security operation managers face when auditing the work performed is that some team members may execute different steps at different levels of rigor when investigating and remediating threats.

Analyze your tracing data any way you want with Sumo search query language

It’s been almost a year since I shared some thoughts about distributed tracing adoption strategies on this blog. We have discussed how different approaches between log vendors and application performance management (APM) vendors exist in the market and how important that is to allow users to analyze the data, including custom telemetry, the way they want.

The Cost of Racing Toward Success

LogDNA recently celebrated 5 years since our launch in Y Combinator and during this half-a-decade we’ve learned several lessons about balancing cost and scalability. As a founder, here are the top 3 things I wish someone had told me as we were racing towards success. The appeal of building a cloud-native application for a startup is a no brainer—it’s agile, scalable, and can be managed by a distributed team. Not to mention, it’s the cheapest way to get off the ground.

How to View Office 365 Service Health in CloudReady?

In today’s modern IT world, enterprises are looking to not only streamline their global monitoring operations but also facilitate access to reporting capabilities that provide insight into usage, uptime, and availability of SaaS services. Covid disrupted the work culture and our daily lives. With so many of us working from home, IT leaders and executives are now more than ever interested in ensuring that the cloud services their team relies on are available.

Monitor Juniper network devices with Datadog

Juniper Networks provides a range of IT network and security devices, including routers, switches, access points, and firewalls. As you scale your on-prem infrastructure with potentially thousands of devices distributed across multiple locations, getting visibility into your entire network can easily become a pain point.

How to Make Your Zoom Meetings More Secure

During the first months of the last year, Zoom was a little known video conferencing platform with a few million users. However, the spread of Coronavirus across the globe forced businesses and organizations to make changes in their working models. Among them was adopting remote working practices, fostered by several communication and collaboration tools. This is where Zoom's popularity surged, with remote workers using the tool to conduct virtual meetings. However, the explosive popularity of Zoom created several cybersecurity ramifications. The unexpected growth exposed the platform to various security faults, vulnerabilities, and hackers. That said, below are some of the best practices to keep your Zoom meetings secure.

Accelerate your logs investigations with Watchdog Insights

If you’re investigating an incident, every minute means degraded performance or even downtime for customers. The causes of an issue often come from parts of your systems and applications that you would not think to check, and the sooner you can bring these to light, the better.