Operations | Monitoring | ITSM | DevOps | Cloud

Using Cribl Search for Anomaly Detection: Finding Statistical Outliers in Host CPU Busy Percentage

In this video, we'll demonstrate how to use Cribl Search for anomaly detection by finding statistical outliers in host CPU usage. By monitoring the "CPU Busy" metric, we can identify unusual spikes that may indicate malware penetration or high load/limiting conditions on customer-facing hosts. The best part? This simple but powerful analytic is easily adaptable to other metrics, making it a versatile tool for any data-driven organization.

Webinar on 'Evolution of Incident Management from On-Call to SRE' | Squadcast

This Incident Management has evolved considerably over the last decade, more so in the last few years. What was traditionally limited to having just an in-house on-call team and an alerting system, has now grown well beyond that to ensure Automation, Collaboration, Transparency, and Retrospection are deeply entrenched in Incident Response.

How the All in One Worker Group Fits Into the Cribl Stream Reference Architecture

Join Ed Bailey and Eugene Katz as they go into more detail about the Cribl Stream Reference Architecture, designed to help observability admins achieve faster and more valuable stream deployment. In this live stream discussion, Ed and Eugene will explain guidelines for deploying all in one worker group. They will also share different use cases and talk about the pros and cons for using the all in one worker group.

Get your team to adopt DORA metrics when you're already on board

Need help getting your teams to adopt DORA metrics? Join this live stream on Thursday, February 23 at 9 a.m. PT to learn how. Sleuth TV Live is back for season 2! It's a common reality: You're already on board with DORA metrics and ready to run with them, but now you need to get your teams to adopt DORA metrics. How? We'll share 5 ways we use DORA metrics at Sleuth to shed light on the possibilities for your own team.

What do best-in-class cybersecurity organizations do differently? | CISO Panel

Have they somehow found unlimited budget for their every tech request? Do they have an uncanny ability to source the diamond-in-the-rough talent? Or is it something else? As part of our inaugural State of Cybersecurity Preparedness research series, Ivanti asked 6,550+ cybersecurity professionals, leaders, and end users what their cybersecurity teams will do in the next 12 months to secure their organizations. But we wanted to know what our cybersecurity experts truly believe set top teams apart from the pack.

Ivanti Neurons for Service Mapping

Automatically discover and map the linkages between underlying data center services and applications to visualize and understand how business services connect and interact to respond quickly to unexpected changes. Data center discovery Extensible probes and sensors automatically discover thousands of physical and virtual compute, network and storage assets in minutes giving you comprehensive visibility into your data center and cloud environments.

Ivanti Wavelink - Speakeasy

Speakeasy is the fastest, easiest way to voice-enable the telnet and browser apps you already have. Whether Windows Mobile, Windows CE, or new Android mobile platforms, you get full-featured voice-directed productivity, while minimizing risk and without disrupting your host applications. Whether you’re running terminal emulation or web apps, you can extend the productivity benefits of these apps with voice enablement—or move to Android, iOS, or Windows 10 and deploy fast with the Wavelink Velocity framework.