Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Blacklisted again? Why does this keep happening to me?!

Previously, we have introduced one of the “Check site instantly ” board functions - DNSBL - which helps you find out whether your server is blacklisted before it gets out of control. We’re happy to announce that this tool has just got even more awesome! Now you can use our DNSBL check tool as a one-time job or on a regular basis. It means you can keep your IP address in a continuous check against dozens of popular blacklists.

Security Through Automation

Today’s approach to securing IT infrastructure is passé. In a dynamic world of unpredictable and often frequent infrastructure changes, the traditional approach to security falls short. It is no longer sufficient to just scan frequently for vulnerabilities and then try to interpret this data in real time without (human) error. Additionally, despite smart analytics, this approach to illuminating security issues and remediating them is extremely time consuming.

What is Application Performance Monitoring (APM)?

Application performance management (APM)—sometimes referred to as application performance monitoring—is used to refer to monitoring tools that allow IT, developers, and business leaders to monitor their backend application architecture to resolve performance issues and bottlenecks in a timely manner.

Monitor Password Protected Websites for Changes

We’re excited to announce that ChangeTower users can now monitor specific sub-sections of web pages with our new partial-page monitoring tools and visual change detection engine. Our users will now be able to utilize the full power of the ChangeTower engine to monitor specific sub-sections of web pages for a user-selectable degree of change.

RFP Alerts: Get Notified When Websites Publish New Requests for Proposals

There is a tremendous administrative burden places on businesses that rely on responding to (and winning!) RFPs for new business. Not only do you have to go through the painful process of filling out long applications and endure long wait times, it’s also extremely hard to stay on top of if / when new business is put out to bid.

User Story: The CloudSploit CloudFormation Scanning API

At CloudSploit, one of our biggest satisfactions is learning more about how our users actually use our product. While we can look at charts, graphs, and usage statistics, nothing beats an actual walkthrough by an enthusiastic user who has incorporated CloudSploit into his or her company’s architecture.

The Importance of Continual Auditing in the Cloud

The concept of “the cloud” is an amazingly powerful and novel solution for many providers and users. The idea of shifting from physical infrastructure to the digital space is an attractive one, especially when consideration is given to the impact of such a migration in terms of economy, ease of access, and ease of use. Due to this alluring nature, many organizations have rushed to adopt cloud-based solutions in recent years, and have garnered a large amount of success.