Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Now or never: Your last stand against cyber attacks.

The Global Risks Report 2019 states that cyber attacks are one of the top five risks to global stability. In the cyber world, there are just two categories of people: one category who've realized that they've been attacked and the other category who are yet to realize. In this technology-infused world, anybody can become a hacker with just $1; that's how critical cyber security is.

Account Takeover IS Your Problem

Phishing and malware are scary enough, but the number-one tactic used by bad actors to get access to and take over accounts is something different: using compromised credentials. Why? Because it’s so easy. Data breaches happen almost constantly, and credentials get leaked. At the same time, people are prone to reuse the same few passwords across all their accounts. These two facts spell trouble, as it’s almost impossible for an IT professional to know if working credentials to their company email or CRM are floating around the dark web. Almost impossible that is, until now.

3 Tips on How to Use Automation to Anticipate and Troubleshoot Slow VDI Logons with XenAppBlog

Citrix CTP, Trond Eirik Haavarstein, and Goliath show how to shift IT from reactive to proactive through embedded intelligence and automation to anticipate and troubleshoot slow logon times before an end-user notices an issue exists!

Moogsoft User Conference 2019 Overview

Attendees at this year's inaugural Moogsoft User Conference were immersed in two full days of all things AIOps. Our goal: To help our users gain new insights, best practices, and AI and ML skills to transform their IT Operations and deliver continuous service assurance. The result? We all left invigorated with renewed enthusiasm, actionable expertise and fresh ideas to boost our collective organizations' AIOps strategies!