Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Conquer it with correlation-Part 3: Cryptojacking

In the previous posts of this blog series, we discussed advanced persistent threats and data breaches, highlighting the importance of data security in today’s times. In the final post of this series, we’ll talk about cryptojacking, a type of attack that can severely affect your network’s integrity, and how you can combat it with event correlation.

AWS monitoring 101: Metrics to watch out for

Amazon Web Services (AWS) is one of the most popular public cloud providers today. Over the years, AWS’ services have expanded from cloud computing to application development and security. To retain the reliability, availability, and performance of your AWS instances, an AWS cloud monitoring solution is a must. It’s critical for AWS monitoring tools to collect data from all parts of your AWS service, so that multi-point failure can be easily debugged.

Applications Manager: A game changer for multiple businesses

To retain a competitive advantage in today’s fast-paced digital market, organizations need to focus on their application stack. Error-prone or bug-ridden applications may deter potential customers from visiting a site again. Organizations must monitor application performance at every level to ensure optimal performance of business applications.

Advanced analytics for ServiceDesk Plus' ticket history, projects, and knowledge base modules

We’re happy to announce the release of advanced analytics for three more ServiceDesk Plus modules: Request transition history, Projects and Knowledge base management. Read on to see how this integration between ServiceDesk Plus and Analytics Plus gives enterprises better visibility into their help desk activity.

Conquer it with correlation-Part 2: The data breach

In my previous post, we looked at how event correlation can be used to deal with advanced persistent threats (APTs). The thing is, an APT is just one ugly face of a much larger epidemic: the data breach. In this blog, we examine this larger problem and the role of event correlation in securing sensitive data.

Conquer it with correlation-Part 1: The advanced persistent threat (APT)

Among all the pesky attacks that keep security administrators working late, advanced persistent threats (APTs) are possibly the most lethal. An APT is a long-term, targeted attack which involves stealthily spying on an organization’s network activity or siphoning off sensitive data, as opposed to openly damaging or locking down network resources.

Better functional invoices, new integrations, and more introduced in ServiceDesk Plus MSP 9410

Your trusted MSP service desk software just got a whole lot better with a set of new features and enhancements to take your IT support experience to greater heights. We’re excited to share with you ServiceDesk Plus MSP’s newest release, where we’ve focused on taking what you, as a managed service provider, need for your business to thrive—and make world-class IT support for customers, a reality.

Top metrics to consider while monitoring DynamoDB performance

NoSQL databases have always been regarded as a notch above SQL databases. The primary reason for the soaring popularity of NoSQL databases is their dynamic and cloud-friendly approach to seamlessly processing data across a large amount of commodity servers. With high scalability, availability, and reliability, AWS’s DynamoDB is a great example of a fully-managed NoSQL database.

Five cybersecurity best practices to follow in 2019

Research by Cybersecurity Ventures predicts ransomware alone will cost businesses around the world more than $11.5 billion in 2019. What’s worse, this same study also predicts businesses will experience a cyberattack every 14 seconds by 2019, up from once every 40 seconds in 2016. So what can you do to mitigate the increasing threat of cyberattacks? Here are five IT security best practices that can help.

OpManager doubles the number of device templates, cuts your work in half

Just last month we heard flattering statements about OpManager’s UX, and nothing makes us happier than knowing that our continuous improvements have positively impacted our users. We’re always eager to meet your growing IT infrastructure needs, so we’re happy to introduce a set of 4,000 new device templates. That doubles the number of OpManager device templates to over 8,000, helping you in your goal of comprehensive network management.