Operations | Monitoring | ITSM | DevOps | Cloud

New Feature: Number of Users Affected by a Crash

We've just released a way to track the number of users affected by a crash! If you navigate to the Summary page, you'll now see a column labeled 'Users Affected’, this column shows how many unique users have been affected for each row in the crash summary table. With the data provided by this new column, you’ll have additional information available for prioritizing fixes. The ‘Count’ column is unchanged, and reports the total number of crashes reported by all users.

Your Top 3 AIOps Questions Answered

Artificial intelligence for IT Operations (AIOps) still sounds like something from the future to a lot of IT professionals. Maybe you’ve heard about the benefits but don’t think your organization is ready. In these three short, informative videos, Kia Behnia, Vice President of IT Operations, addresses three key questions IT pros still have when it comes to AIOps.

Anomaly detection 101

What is anomaly detection? Anomaly detection (aka outlier analysis) is a step in data mining that identifies data points, events, and/or observations that deviate from a dataset’s normal behavior. Anomalous data can indicate critical incidents, such as a technical glitch, or potential opportunities, for instance a change in consumer behavior. Machine learning is progressively being used to automate anomaly detection.

Densify Achieves Red Hat Operator Certification

Toronto, Ontario – October 10, 2020 – Densify, a leader in cloud and container cost management, today announced that its product has been Red Hat Operator Certified and can be purchased in the Red Hat Marketplace. The Marketplace is a one-stop shop to find, try, buy, and manage enterprise applications across an organization’s hybrid IT infrastructure.

Build a resilient cybersecurity framework by transforming your IT team into a security team

More organizations than ever before have shifted to a hybrid work culture to reduce the impact of COVID-19. This unprecedented change has not only given rise to new security challenges, but has also considerably increased the surface area available for an attack. A blend of personal and corporate endpoints in use, geographical spread of resources, and a sharp spike in the overall number of security threats have further complicated the already labor-intensive security landscape.

Five worthy reads: Every month should be Cybersecurity Awareness Month!

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. Organizations on a global scale observe Cybersecurity Awareness Month to educate and instruct their employees on cybersecurity best practices. This week we highlight some cybersecurity trends that are shaping the industry today.

Why the difference between hosted & contained relationships matters with ServiceNow

Are you designing or working with structured configuration management data? No matter the technology platform, you will have come across relationships between various objects. These relationships are critical to keep your data points in perspective and build the bigger picture. One question that often comes up, when working with relationships is: What is the difference between Hosting and Containment relationships?

Security misconfiguration prevention | ManageEngine Vulnerability Manager Plus

ManageEngine Vulnerability Manager Plus is a prioritization driven threat and vulnerability management solution for enterprises with built-in remediation. This video covers how you can utilize Vulnerability Manager Plus' security configuration management feature to continually detect security misconfigurations in your endpoints using a pre-defined set of baselines, and bring them back to compliance.

How to estimate your AWS costs

Amazon Web Services (AWS) is pretty much ubiquitous these days, with everyone from tiny startups to large enterprises using the cloud service to run their apps, websites, and processes. For small businesses, being able to predict your budgets is paramount. Unfortunately, AWS costs can be very difficult to forecast. In this blog, we’ll go over the pros and cons of the tools available to help you estimate your AWS costs.