Monitoring and Observability

Latest Posts in

How to Use Monitoring Tools to Sniff Out the Root Cause

When it comes to IT, things go wrong from time to time. Servers crash, memory goes bad, power supplies die, files get corrupted, backups get corrupted…there are so many things…

Security Monitoring – It’s All About the Data

In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your network and its assets is essential.…

Rear-View Mirror: Looking Back at Four Years as a SolarWinds Head Geek

It was LinkedIn that reminded me how long it’s been. A sudden flood of “Congratulations on your work anniversary” messages (thank you, by the way, to everyone all the well-wishers)…

How TV Viewership Is Like Application Monitoring

Have you ever read about TV ratings? Almost every person that watches TV has heard of the ratings produced by the Nielsen Media Research group. These statistics shape how we watch TV…

Data Protection: Culture, Tools, People, and Roles

In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations), I covered the background of building a culture.  In this post, I’ll be going over the data protection…

What Makes a Thought Leader?

What do The Guru, The Expert, The Maven, The Trailblazer, The Leading Light, The Practice Leader, The Heavyweight, The Opinion Shaper, and The Influencer all have in common? These are…

Cross-Referencing Alarms: Network Security Monitoring and Network Outage Notifications

As anyone that has run a network of any size has surely experienced, with one alert, there is typically (but not always) a deeper issue that may or may not…

It’s 2 a.m., Do You Know Where Your Data Is?

If you are old enough, you might remember that commercial that played late at night and went something like this… “It’s 10 p.m., do you know where your children are?” …

Protection Methods – The Art of Data Analytics

The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although…

Application Mapping: Turn-by-Turn for Your Data Center

When you go on a trip somewhere, you always take a map. When I was growing up, that map came in the form of a road atlas that was bigger…