Operations | Monitoring | ITSM | DevOps | Cloud

%term

Sponsored Post

EventSentry v4.0 - Introducing ADMonitor

Since Active Directory is the foundation of all Windows networks, monitoring Active Directory needs to be part of any comprehensive security strategy. Up to version 3.5, EventSentry utilized Windows auditing and the security event log to provide reports on: User Account Changes, Group Changes and Computer Account Changes.

An Introduction to Big Data Concepts

Gigantic amounts of data are being generated at high speeds by a variety of sources such as mobile devices, social media, machine logs, and multiple sensors surrounding us. All around the world, we produce vast amount of data and the volume of generated data is growing exponentially at a unprecedented rate. The pace of data generation is even being accelerated by the growth of new technologies and paradigms such as Internet of Things (IoT).

Everything You Need to Know About the OSS Licensing War, Part 2.

Where we left off: AWS had taken the Elasticsearch software and launched their own cloud offering in 2015, and Elastic N.V. had doubled down on an “open core strategy.” Once AWS decides to offer a project like Elasticsearch, it immediately becomes a truly formidable competitor to anyone trying to do the same, even the company behind the software itself. AWS has huge scale, operational expertise, and various network effects that really compound.

Zero Trust Security: Supporting a CARTA approach with Continuous Monitoring

Learn how to support a continuous adaptive risk and trust assessment (CARTA) approach leveraging accurate Kubernetes flow logs. 5-tuple logging is commonly used to monitor and detect anomalies and produces unreliable data that cannot accurately identify anomalies nor prove enforcement of security policies.

Zero Trust Security: Supporting a CARTA approach with Anomaly Detection

Learn how Anomaly Detection supports, what Gartner has termed, a continuous adaptive risk and trust assessment (CARTA) when building a CaaS platform using Kubernetes. Anomaly Detection expands the zero trust network security model and continuously assess the application and network risk that enables adaptive policy adjustments.
Sponsored Post

A New Approach to Traffic Balancing: PerfOps Announces Smart Internet Routing

Network traffic expert PerfOps just announced FlexBalancer, an innovative approach to load balancing. FlexBalancer is a cloud-based solution that dynamically routes traffic in real time. It does so by leveraging CDN and Cloud performance data and combines it with user-defined parameters.

The changing role of ITSM in 2019: The five-point cheat sheet to ace digital transformation.

Digital transformation (DX) has taken organizations across the globe by storm by improving operational performance and customer experiences. During this transformation, IT teams need to be prepared to harness the benefits DX has to offer.