Operations | Monitoring | ITSM | DevOps | Cloud

Web browser security. Is it really safe?

If there is still a reason why you have a post-it covering the webcam of your laptop, if you have not yet had the audacity to delve into the deep web despite all the mysteries they say it contains, if you only enter the Internet in incognito mode, sitting in your armchair with a blindfold: then you’re worried about one thing: safety. Today, in our blog, we will discuss Web browser security. Which are the safest? Is there life beyond Google Chrome?

The Sapphire Ventures CIO Innovation Index Report: CIOs Forge Tighter Bonds with Startups, Especially in AI

Despite a rocky year in the global economy, global venture deal volume grew by over 9.3 percent in the third quarter of 2019, up nearly 9.9 percent from Q3 2018, according to Crunchbase. The year 2018 was a banner year for dollar volume: startups raised $130.9 billion, which surpassed the epic year of 2000, according to Pitchbook.

The Importance of Engineer Walkabouts

A core tenet of managed services is the ability of an MSP to support multiple clients, in various locations, all without ever leaving your desk. While this approach is more efficient and profitable than dispatching engineers out to client sites to deal with every support ticket that comes in, there’s a catch. The challenge is when you become good at doing managed services in this way, you don’t have much of an excuse to visit your client sites at all.

How Informatica Confidently Migrates to Kubernetes with Sumo Logic

Informatica is an enterprise cloud data management company, which means they have a full suite of products that focus on data integration and data management. In fact, they are a leader in 5 different magic quadrants including Enterprise Integration Platform as a Service, Data Quality Tools, and Master Data Management Solutions.

View SQL Queries From Your Code With Prefix

Have you heard the saying “you can’t manage what you can’t measure?” The phrase is often attributed to management thinker Peter Drucker, and less often to other authors as well. It can also slightly vary in its wording, depending on the source. At the end of the day, the exact wording of the sayer and who said it first doesn’t matter as much as whether it’s true or not. We’re here to tell you that yes, it’s true for a lot of things in life.

The importance of event correlation techniques in SIEM

Event correlation tools are a fundamental instrument in your toolbox to detect threats from all sources across your organization in real time. A wise use of the right event correlation techniques through log management and analysis is the cornerstone of any reliable security information and event management (SIEM) strategy – a strategy that focuses on prevention rather than reaction.

What's Next for Observability

In the industry, the long-held theory behind observability is that a successful stack consists of three key components – metrics, logging, and tracing. “This is a mental model for people who are often new to observability which helps them get a handle on what they need to implement to be successful,” said Grafana Labs VP of Product Tom Wilkie during a keynote presentation he delivered at KubeCon + CloudNativeCon EU in May alongside Red Hat Software Engineer Frederic Branczyk.

Introducing the Wi-Fi Analyzer for OpManager's Android app: A perfect team for sustained IT infrastructure management

Addressing Wi-Fi issues can be challenging Tracking the availability, speed, and performance of a large number of systems, servers, VMs, routers, access points, firewalls, interfaces, and WAN links, plus monitoring their health is not a simple task. Tackling angry emails from employees about Wi-Fi running slowly, or it taking a lifetime to download a simple setup file or load a business-critical application, can hamper productivity.

NCSAM 2019: Cybersecurity Tips for Enterprise IT Pros

October is National Cybersecurity Awareness Month (NCSAM) in the US. IT departments are tasked with protecting more than ever. Today’s IT department is responsible for creating, maintaining and managing a myriad of systems. Not only do you need to secure internal connections, but you also need to ensure availability for cloud-based applications and your company website. Many of the suggestions below may be already in place.