Operations | Monitoring | ITSM | DevOps | Cloud

Vulnerability Management with Sysdig

Software is always changing and improving, and within this process, developers can unknowingly introduce vulnerabilities. Discover how Sysdig Secure provides a single vulnerability management solution for both containers and hosts. It allows you to validate compliance across your whole infrastructure. And it's so easy to deploy, that you will be scanning images and hosts in seconds.

Connection Center Overview

A deep dive into Cookdown's Connection Center designed to make SCOM your single source of truth. Find out all about how it works, our code-free integrations, and much more. Unlock SCOMs full potential by connecting it to all your IT enterprise tools and you'll never miss a critical SCOM alert again! The setup is super simple! To get started just download a FREE 30-DAY TRIAL and you'll be syncing alerts in minutes.

Onboarding Data in Splunk Security Analytics for AWS

Splunk Security Analytics for AWS's new data onboarding wizard quickly takes you from subscribing to the service to visualizing your AWS environment. We’ll walk through the wizard in this video, and you’ll see how the new process can save you hours, days, or even weeks when compared to traditional data onboarding processes.

Detecting and Investigating Threats in Splunk Security Analytics for AWS

Splunk Security Analytics for AWS’s pre-built, AWS-specific detections and dashboards allow you to easily visualize your AWS environment and centralize your security analysis and investigations. We’ll walk through some of the offering’s key dashboards and detections in this video, as well as the investigation interface.

10 Popular Alternatives to AppDynamics

Application performance is one of the most important factors in determining your brand reputation, revenue, and authenticity in the virtual marketplace. There are several ways to monitor your application’s health and performance. Some choose to do it the traditional way - manually. Others prefer to adopt an automated solution capable of monitoring an application 24/7 and producing useful visualizations all by itself.

Multitenancy: What You See vs. What They See

Multitenancy is one of the core concepts of cloud computing. As an organization considers bringing in cloud capabilities, it’s crucial for them to understand the full range of tenancy options available to them, and what each will mean for their company. This article will break down the intricacies of multitenancy, how it stacks up against other tenancy models, and its benefits.

SOCtails Episode 4 - Respond Fast to Security Incidents with Automated Playbooks

Investigating and responding to phishing attacks is tedious and time-consuming. Kevin responds to phishing attacks by following a step-by-step manual process catalogued in his "Cybersecurity Playbook." Jeff shows Kevin an easier and faster way to respond using automated playbooks from Splunk SOAR (formerly known as Splunk Phantom).