Monitoring and Observability

Latest Posts in

7 Steps to Build an Effective Cyberincident Response Process

As an IT security professional, you work hard to prevent cyberattacks. You patch your systems regularly, update antivirus libraries, run user trainings, and lock down user access to sensitive systems…

How to Choose a Cloud Platform – What to Consider in 2019

One is spoiled for choice when it comes to choosing a cloud provider. Cloud platforms have come a long way since their humble beginnings and now offer a myriad of…

Real World Experiences of Hybrid IT – Part 4

Welcome back to this series of blogs on my real-world experiences of hybrid IT. If you’re just joining us, you can find previous posts here, here, and here. So far,…

The Ins and Outs of Microservices

Microservices are a development architecture that can help DevOps teams innovate faster, iterate more efficiently, and create a better end-user experience by democratizing language and technology choice across independent service…

After the Great Cloud Debate, What’s Next?

This month, we’ve spent time discussing how cloud will affect traditional on-premises IT operations staff. Many IT pros have given feedback on how their organizations view cloud computing, whether it’s a…

How to Pick the Best Data Center Monitoring Tools for Your Business

Many organizations grow each year in business scope and footprint. When I say footprint, it’s not merely the size of the organization, but the number of devices, hardware, and other…

What Is Digital Transformation? And Why Do You Need a Strategy?

In this blog series, we’ve been looking at various methods of utilization with cloud infrastructure. While cloud adoption can be beneficial to almost any organisation, change for change’s sake can…

You Can’t Fix What You Don’t Measure

All successful cloud migration projects start with up-to-date knowledge of a company’s current infrastructure and application landscape. While it may seem obvious, many organisations don’t have a clear picture of…

A Frank Discussion of Multifactor Authentication

Someone steals credentials from one of your client’s executives. They guess the username and password to their email account. From there, the cybercriminal can send out targeted phishing emails to…

Real World Experiences of Hybrid IT – Part 3

If you’re just joining the series now, you can find the first two posts here and here. Last time, I talked about the various decision points and considerations when using…