Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

6 Ways to Avoid the 'Swivel-Chair' Effect

When an incident occurs, do you shudder when either you or your team proceed to open multiple browser tabs for each of your monitoring tools? This is the picture painted by the “swivel-chair” effect, context-switching between tools to gather information needed to determine a path of resolution.

Simplifying security auditing, part 6: Compliance and the cloud

In part 5, we looked at auditing your network device logs. A decade ago, security professionals were primarily concerned about network perimeter and endpoint security. While those concerns are still valid, technological advancements have created new scenarios that need to be addressed.

XenWinGo, Citrix Service Provider (CSP) DaaS Reduces End User Support Tickets by 20%

USACI is a Managed Service Provider (MSP) provides Software as a Service (SaaS) and Desktop as a Service (DaaS) solutions over Citrix XenApp and Citrix XenDesktop. They also offer public and private cloud services via their product, XenWinGo. The breadth of services which the organization offers can place a lot of pressure on their Citrix help desk professionals.

Top 5 Nonprofit Healthcare Organization Troubleshoots and Resolves Issue Impacting MEDITECH Users with Goliath Performance Monitor

Healthcare IT faces both complexity and urgency when dealing with end user experience issues that impact their EHR environments. In addition to the usual issues of frustration, delays, and inefficiency, patient care is impacted when healthcare workers can’t access critical applications via Citrix XenApp, Citrix XenDesktop, or VMware Horizon.

The Sound of Silence: Threats from Without and Threats from Within

Recent news has broken about a group of hackers which appears to be operating out of Russia. The group, dubbed “Silence,” is believed to be involved in the theft of over $800,000 from multiple Russian and Eastern European financial institutions. However, what is particularly notable about this group is they seem to count at least one former cyber security professional among their number.