Security issues are currently at the forefront of a comprehensive monitoring attention: the performance of business-critical IT applications must be guaranteed even against the background of increasing cyber attacks. This was the main topic of our first Live Meeting session, with Security Auditor Günter Aigle presenting how availability, integrity and confidentiality create more security in a more vulnerable IT-world through a well thought-out Data Protection & Network Monitoring. Afterwards Georg illuminated the current approach of more data security against the background of increasing cyber attacks with NetEye SIEM.
Thank you all for joining, see here the presentations!
Today we continue our journey into monitoring automation in NetEye. In my previous post we discussed the possibility of automating Business Processes. As you may remember, for those of us working on NetEye Cloud monitoring dozens of clients, it's important Read More
When performance degradation occurs within a complex system, understanding the root cause can be extremely challenging. If the issue happens sporadically, this difficulty increases even more. This is because modern systems involve numerous components that interact in complex ways. For Read More
At first glance, rebuilding an RPM may sound like a purely mechanical task: take a patch, rebuild the package, ship it. In reality, that small fix goes through a much longer journey that touches reliability, security, trust, and long-term maintainability. Read More
Introduction to NetApp and S3 NetApp offers a unified data storage system. NetApp's ONTAP operating system supports a combination of file, block, and object protocols. We can use common storage (disk array), such as NetApp AFF or FAS, and operate Read More
A safer way to run privileged Windows checks with SystemRunner If you’ve been monitoring Windows for a while, you’ve probably seen this pattern: some checks must run as LocalSystem (S-1-5-18), and the “quick fix” is to run the Icinga Agent Read More