Operations | Monitoring | ITSM | DevOps | Cloud

Department of Defense Designates Splunk a Core Enterprise Technology

Last month, as part of its continuing efforts to acquire and secure advanced technology for cyberdefense, data analytics and other mission critical operations, the Department of Defense (DOD) designated the Splunk Enterprise Software Initiative (ESI) Blanket Purchase Agreement (BPA) as a Core Enterprise Technology Agreement (CETA). Of the 100+ OEMs that have been awarded a DOD ESI BPA, only seven have been selected for CETA designation by the DOD.

Network Firewall Security: Monitoring Firewalls 101

Installing a firewall onto your network is “good network firewall security”, right? Let’s be clear, it’s not – it’s the start to good security. While installing a firewall is an important component of security in a network firewall security posture, there’s much more to the process than just dropping in a piece of hardware, or enabling some new software.

TL;DR InfluxDB Tech Tips: Configuring a Slack Notification with InfluxDB

With InfluxDB you can create notifications to make the most out of your alerts. Notifications enable you to send check statuses to the endpoint of your choice. In this TL;DR we set up a Slack Notification Rule and Endpoint through the InfluxDB UI.

The Facebook data breach that affects over 533 million users explained

If you’re a Facebook user, brace yourself for this one. It’s recently come to light that 533 million Facebook users’ details were found on a very suspicious hacker forum. The details found include users’ phone numbers, Facebook IDs, full names, locations, birthdays, and email addresses – all typical information that is stored on a Facebook account.

Workflow Quarterly: The business agility imperative

Businesses need maximum agility to survive these trying times. The Agility Issue of Workflow Quarterly is packed with insights to help your company power through the pandemic and emerge stronger on the other side. The issue presents new research by ESI ThoughtLab and ServiceNow on how the pandemic has affected business agility in enterprises around the world.

Datadog acquires Sqreen to strengthen application security

We began our security journey last year with the release of Datadog Security Monitoring, which provides runtime security visibility and detection capabilities for your environment. Today, we are thrilled to announce that Sqreen, an application security platform, is joining the Datadog team. Together, these products further integrate the work of security, development, and ops teams—and provide a robust, full-stack security monitoring solution for the cloud age.

What is External Monitoring and How does it Differ From Internal Monitoring?

You likely do not own your server, but you do have an interest in making sure the applications you run on your server remain responsive. You need to know the full story, and a combination of external and internal monitoring is how you get there. Marketers understand the word “responsive” to mean “capable of rendering on any screen”, but we can think about responsive in more fundamental terms.

The challenges of monitoring a highly complex database estate at the University of the Sunshine Coast

As the manager for enterprise applications and data at the University of the Sunshine Coast in Queensland, Australia, I face a lot of unique challenges. The university itself has around 25,000 students, 1,000 permanent staff and another 1,000 seasonal staff who assist with key academic sessions. They’re spread out across the flagship campus at Sippy Downs and a number of satellite campuses and research and teaching facilities in other locations.