Monitoring and Observability

Latest Posts in

Maintaining a Secure Environment: Monitoring Beyond the Log File

This blog series has been all about taking a big step back and reviewing your ecosystem. What do you need to achieve? What are the organization’s goals and mandates? What…

How Security Leaders Might Minimize Human Error

A recent federal cybersecurity survey by SolarWinds found federal IT professionals feel threats posed by careless or malicious insiders or foreign governments are at an all-time high. Worse, hackers aren’t…

Getting to Know vSphere

vSphere, which many consider to be the flagship product of VMware, is virtualization software with the vCenter management software and its ESXi hypervisor. vSphere is available in three different licenses:…

Two Critical Security Tips to Kick Off National Cybersecurity Awareness Month

Brandon Shopp expands on his two tips for National Cybersecurity Awareness Month to help you provide the best security support you can to your users. On October 31, we’ll celebrate…

How Infrastructure as Code Is Driving Virtualization’s Future

So far in this virtualization series, we’ve discussed its history, the pre-eminence of server virtualization, the issues it has created, and how changing demands placed on our infrastructure are leading…

The Best Way to Prepare for Emerging Technologies

Exciting new technologies like artificial intelligence, blockchain, and the Internet of Things are dominating news cycles, but are they dominating federal IT environments? Maybe not. According to the latest SolarWinds®…

What Is VMware NSX?

When purchasing Nicira in 2012, VMware wanted to further establish itself as a leader in software-defined networking, and more importantly, in cloud computing. VMware NSX provides the flexibility network administrators…

Hyperconverged Infrastructure—Summary

Here’s the fifth part of the series I’ve been writing regarding HCI. Again, I don’t want to sway my audience from one platform to another. Rather, I want them to…

Virtualization’s Software-Defined Future

In the first two parts of this series, we looked at both the history of virtualization and the new set of problems it’s introduced into our infrastructures. In part three,…

Assessing the Navy’s New Cybersecurity Program

The Navy’s new Combat to Connect in 24 Hours (C2C24) is an ambitious program with the potential to change naval warfare as we know it. The program is designed to…