author:


Security

Three SIEM Must-Haves

December 19, 2018

Many businesses need to increase their security game. You can put all the preventive measures in place that you want—like patching, antivirus, mail protection, and firewalls—yet threats can still slip past defenses. According to the recent Ponemon 2018 Cost of a Data Breach report, …



itil alternatives

author:


ITSM

ITIL Alternatives: What Are Other ITSM Frameworks?

December 18, 2018

In this post, we will examine the rise and domination of ITIL, looking into how prevalent it actually is, and why that may be so. We’ll also take a look at five of the primary ITIL alternatives available and how they differ from and mirror ITIL.



author:


Networks

The Cost of Monitoring – With the Wrong Tool

December 17, 2018

or “It’s not just the cost of buying the puppy, it’s the cost of feeding the puppy that adds up” This is a story I’ve told out loud many times, on conference calls, and around water coolers. But I’ve never written it down fully until now. …


author:


Networks

All I Want For Christmas Is … RESTCONF?

December 13, 2018

As somebody not lucky enough to have a nice clicky interface with which to manage and automate all my equipment, I have to develop my own tools to do so. One aspect of developing those tools that drives me up the wall is the …



Networks Systems

Application Dependency Mapping

December 11, 2018

So far in this series, we have covered Application Performance Monitoring. If you haven’t already, read part one, part two, part three, and part four. In the last post, we stressed the importance of mapping out all dependencies for our application. In this post, we will dig further …


author:


Networks

What is Your IT Legacy?

December 10, 2018

Where are you in your career arc right now? Trusting simple statistics, I can say that the majority of you are either just starting out, or somewhere in the middle. Relatively few of those reading this essay will be at, or near, the end …