Industry recognition is always something to strive for, but when the recognition comes from a trusted partner then it means even more. At Ivanti, we’re proud to be recognized by longstanding partner, Deutsche Telekom, as a “Best Solution Partner” of the year. This was the first year that the award was handed down and represents the deep commitment to partnership and execution.
QR codes, those touch-free codes that look like square puzzles or mazes, seem to be everywhere these days. Gaining in popularity over the past few years, their proliferation has exploded with the onset of COVID-19 precautions. These wonder-codes make it easy for our mobile devices to quickly scan a menu, pay a bill, and find information about a product or service. QR codes blend the physical world with the virtual.
In an earlier blog, we had discussed what is Microsoft Windows Virtual Desktop (WVD) and why it is gaining popularity. In this blog, we present various community and vendor resources that can help you choose the right Azure instances for your Microsoft WVD deployment. Here, at eG Innovations, we offer a wealth of monitoring and simulation tools to allow you to monitor what real users are experiencing when accessing Microsoft WVD.
A typical service delivery chain starts from the device and runs through the network and all the way through to the application. There are many things that can go wrong along the way! It’s critical to monitor that experience and quickly understand where issues occur, why they occur, and what can be done to remedy them. That’s where employee and/or customer Digital Experience Monitoring (DEM) comes into play.
Pandora FMS is a proactive, advanced, flexible and easy-to-configure monitoring tool according to each business. Pandora FMS integrates with the needs of the business, being able to monitor servers, network equipment, terminals and whatever is necessary. In this article we will focus on monitoring using Pandora FMS, bearing in mind the new reality, which has arrived to stay, known as “Digital Transformation”.
One of the most prevalent log sources in many enterprises is Windows Event Logs. Being able to collect and process these logs has a huge impact on the effectiveness of any cybersecurity team. In this multi-part blog series, we will be looking at all things related to Windows Event Logs. We will begin our journey with audit policies and generating event logs, then move through collecting and analysing logs, and finally to building use cases such as detection rules, reports, and more.