Operations | Monitoring | ITSM | DevOps | Cloud

ServiceNow and Coca-Cola European Partners offer blueprint for safe return to workplace

It’s been more than seven months of forced work from home for many of us, particularly in the United States. That’s six months in which our spouses, our kids, and our parents became our colleagues. And I don’t know about you, but I’m starting to feel a little antsy. If this Wall Street Journal article is any indication, I’m far from alone. Despite an initial boost in productivity, cracks in the remote work experience are clearly starting to emerge.

Splunk Named Launch Partner of AWS Network Firewall

Today, AWS has announced AWS Network Firewall: a new managed service that makes it easy to deploy essential network protections for Amazon Virtual Private Clouds (VPCs). As a launch partner, Splunk has worked closely with AWS to provide customers an integration to AWS Network Firewall. In today’s blog, co-authored by my esteemed colleague Anush Jayaraman, we’ll first detail the data flow architecture and your options to ingest the AWS Network Firewall data.

Why Cybersecurity Depends on the CDM Integration Layer

When you take a close look at the Continuous Diagnostics and Mitigation (CDM) function at the heart of a successful cybersecurity program, you quickly realize that it all depends on integration. It isn’t that the individual components of the program aren’t absolutely essential. But with cyber-attacks gaining in number and sophistication, the true power of CDM is in the ability to overlay multiple datasets to create a single lens for tracking, assessing, and responding to threats.

5 user behavioral patterns to look out for in a decentralized workspace

Problem: If there are thousands of employees scattered around hundreds of places, how do you keep your organization’s network safe? Solution: You should monitor your employees wherever they’re located, and devise a standard baseline of their behavior through machine learning techniques. By using that information, you can identify anomalies and protect your network from cyberattacks.

Monitor Oracle Cloud logs with Datadog

Oracle Cloud Infrastructure (OCI) is an infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) cloud used by enterprise-scale companies. With a full suite of services for hosting, storage, networking and more, OCI lets customers deliver, maintain, and scale secure, highly available applications. But as your cloud infrastructure becomes more complex, monitoring the full scope of activity across your services and accounts can be increasingly difficult.