Operations | Monitoring | ITSM | DevOps | Cloud

Webinar: Streamlining Incident Management With Automation and Contextual Awareness

In the modern context of distributed teams & complex digital infrastructure, major incidents having a negative impact spanning multiple teams and services can cause a barrage of alerts. While a meticulously designed incident response strategy can aid in restoring order, it's essential to underscore the significance of providing responders with effective tools that offer contextual understanding and facilitate the identification of actionable alerts.

A Brief History of BGP Incidents

Kentik internet analysis expert, Doug Madory, discusses the most notable and significant BGP incidents in the history of the internet, from traffic-disrupting leaks to recent crypto-stealing hijacks. Stretching back to the AS7007 leak of 1997, this webinar uses a historical perspective to explore the questions: what progress has been made and what is the path to finally securing BGP?

Fighting DDoS at the Source

For decades, the scourge of distributed denial of service (DDoS) attacks has plagued the internet. Join Doug Madory, Director of Internet Analysis at Kentik, and Aaron Weintraub, Principal Engineer at Cogent Communications, as they explain how organizations can identify customer networks sending the spoofed traffic that leads to DDoS attacks.

Detect Shadow IT And Keep Unauthorized Assets Under Control

Shadow IT refers to systems, software, applications, SaaS services, hardware, or mobile devices used within an organization without the IT department's explicit approval, oversight, support, or knowledge. Initially, it focused on hardware assets, but it has evolved to include SaaS applications (SaaS sprawl). Even though shadow IT has a few benefits, it also poses significant risks to organizations, such as.

Grafana panel title generator, interactive visualizations, and more

Dive deep into the enhancements in Grafana 10.2. From embedding interactive buttons within Canvas visualizations to utilizing AI for dashboard titles and descriptions, this release brims with features designed to optimize your Grafana experience. In this video, discover how to: Stay with us through this playlist to delve deeper into each addition and maximize your Grafana 10.2 experience.

Security Webinar, Zero Trust For Users

Zero trust security — anywhere Working from everywhere means employees need access to corporate apps and data from any device, anywhere, anytime. This is a new level of freedom — and a new level of vulnerability. Navigate this new landscape with security that’s purpose-built for Everywhere Work. Get edge-to-edge security for every device, every user, every application and every network everywhere.