Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

Keep your Network Secure and Running for Home Office Users

Just like many companies in these trying times, we too have asked many of our employees to work from home to protect their health. As a consequence, our network traffic characteristics have changed dramatically. In this webinar, we would like to share our experience with three of the most concerning issues we’ve come across to ensure a productive and safe workplace for home office employees. Pavel Minarik, Flowmon’s CTO will explain, and show live, how we secured sufficient VPN bandwidth, managed our uplink utilization and minimized risks introduced by personal assets.

Journey from reactive IT to full control

Without exception, the IT team at medium-sized companies acts as a firefighter. A usual scenario is a user calling in with complaints about an IT problem. With limited resources, dealing with basic requirements and routine tasks, there is no time to work on the strategic development of IT and adopt new technologies. Is there a way out of this? Join this webinar where Pavel Minarik, CTO at Flowmon Networks, will guide you on a journey from a fireman-like reactive IT department to a truly modern team with proactive control and visibility throughout their digital environment.

HoneyByte: Make a Beeline Toward Observability Just Like DEV's Molly Struve

“When things broke,” Molly explained, “you’re mad scrambling—jumping from website to website to website, trying to put the pieces together.” Molly was able to use Honeycomb to fix things up: “It makes my job easier as an SRE.” Getting started with Honeycomb doesn’t require a lot of work: at dev.to, they used the Ruby Beeline to get it going: “I didn’t do that much,” she said.

An IT Operations Exec Discusses DevOps Collaboration, AIOps Trends

Donnie Berkholz is a VP of IT Service Delivery and comments frequently on trends in IT infrastructure in his newsletter. We talked to Donnie about his typical day on the job, his initiatives in self-service platforms and product management and his take on top infrastructure management trends such as AIOps and Kubernetes.

7 Remote Work Problems IT is Solving With Nexthink

The past several weeks have been anything but normal, especially for those in enterprise IT. Though every company is facing their own unique challenges, we have noticed that certain technical use cases come up over and over again with our customers. After two months, and hundreds of use cases, we’ve picked the top remote work problems that enterprise IT departments are solving with Nexthink.

Your Last Local IP Address, Giving Context to IT's Remote Worker Data

With millions of employees recently making the jump to remote work, some IT departments are finding themselves on unfamiliar ground, and with newfound stress and pressure. The stakes seem higher now. IT cannot visit an employee’s desk or stop them in the hallway whenever they encounter an issue, they now have to solve problems proactively and remotely. But for some companies, the switch to remote work has been smooth and painless.

Identity Guard: Identity Theft Protection Tool

Identity theft is on the rise and it is not enough to simply stay on top of the latest trends in this arena to avoid falling victim to common cons; you need to be proactive to prevent sensitive information being stolen and used against you. This is where Identity Guard’s identity theft protection tool comes into play. It aims to deliver always-on protection from the biggest threats faced by innocent web users.

Blocking USB Drives For Work From Home Employees

With so many people working from home, the perimeter of corporate data safety has suddenly grown very large, in many cases encompassing employee home computers. Data loss prevention (DLP) was challenging enough already, but now it takes on even more importance. One way that data can escape the corporate network is by getting copied to USB thumb drives. Some companies take the approach of gluing or epoxying the USB ports closed.