Operations | Monitoring | ITSM | DevOps | Cloud

New Feature: Manage Your session.id in Honeycomb's Web SDK

The session.id field is special in Honeycomb for Frontend Observability. It’s a default option for filtering and grouping, and it’s the basis for session timeline analysis (in Early Access). Now you can control how session.id is set. In prior releases (< 0.15.0) of the Honeycomb Web SDK, we used our own UUID generator for session.id, and it was not accessible outside of the Web SDK itself. As of version 0.15.0, we give you full control.

Why Puppet Vulnerability Remediation is a Game-Changer for Enterprise Infrastructure Ops

Effective vulnerability management has become a growing priority for organizations. Aided in part by AI, threats and vulnerabilities grow in speed and sophistication while IT environments become more complex. The skill gap for cybersecurity keeps widening (further worsened by a sprawling toolkit), exposing critical systems to exploitation. Managing secure infrastructure manually just isn’t possible at the scale and speed today’s enterprises demand.

Ensuring Compliance & Business Continuity with Automated Backup & Recovery

Every organization has two non-negotiables: stay compliant and stay online. But achieving both—especially at scale—isn’t easy. Many IT teams still rely on manual processes for backups, documentation, and recovery. And when something goes wrong? The cost isn’t just measured in downtime, but in regulatory penalties, lost trust, and business disruption. What if network compliance wasn’t a separate process—but could naturally integrate into your recovery strategy?

The Top 4 Kubernetes Misconfigurations You Can Avoid on Cycle

Most cloud infrastructure and deployment misconfigurations start innocently enough: a dev under pressure to ship quickly tweaks a configuration file or adjusts a permission setting to make something work. It's not malicious and it might even be well thought out, but these small changes can cause a cascade of reactions that bring down production in seconds.

One year in: How Flex Licensing is transforming log management and visibility

A year ago, we set out to transform log analytics pricing by making it as flexible, transparent, and as customer-friendly as possible. We built a model that aligns cost with business value, charging only for data storage and analytics executed. With Flex Licensing, customers can scale usage up or down without breaking the bank, eliminating hidden costs and inefficient licensing structures. There is no more pre-planning or tiering of log data; there is just log ingest with sensible pricing.

Innovator Preview What's coming in Ivanti Neurons for ITSM, ITAM and LOB 2025.2

Innovator Preview What’s coming in Ivanti Neurons for ITSM, ITAM and LOB 2025.2 Edit the recording titled "Innovator Preview What’s coming in Ivanti Neurons for ITSM, ITAM and EWM 2025.2." Remove pre- and post-meeting chatter, as well as customer faces and names. Add standard buffers at the beginning and end.

What's New with Ivanti Neurons 2025.2

What's New with Ivanti Neurons 2025.2 To view the schedule for upcoming meetings, Click here. Hear about what’s new in Ivanti’s Neurons DEX / UWM 2025.2 and how it provides value to you and your organization. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

Innovator Preview Ivanti's Exposure Management and Endpoint Security Portfolio 2025.2

Innovator Preview Ivanti's Exposure Management and Endpoint Security Portfolio 2025.2 To view the schedule for upcoming meetings, Click here. Description: Hear about what’s new in Ivanti’s Exposure Management and Endpoint Security Portfolio 2025.2 and how it provides value to you and your organization.