Security issues are currently at the forefront of a comprehensive monitoring attention: the performance of business-critical IT applications must be guaranteed even against the background of increasing cyber attacks. This was the main topic of our first Live Meeting session, with Security Auditor Günter Aigle presenting how availability, integrity and confidentiality create more security in a more vulnerable IT-world through a well thought-out Data Protection & Network Monitoring. Afterwards Georg illuminated the current approach of more data security against the background of increasing cyber attacks with NetEye SIEM.
Thank you all for joining, see here the presentations!
In NetEye, 'business processes' is a module used to model and monitor the business process hierarchy to obtain a high-level view of the status of critical applications. In short, they allow monitoring controls of individual components to be aggregated into Read More
If you've worked with Elastic APM, you're probably familiar with the APM Server: a component that collects telemetry data from APM Agents deployed across your infrastructure. But what happens when you need to segregate that data by tenant, especially in Read More
In the first part we created hosts and services to monitor a sequence of script using Tornado. The Tornado Rule Now let's continue with the creation of a Tornado rule: open the NetEye web interface and select Tornado dashboard, then Read More
Some time ago, my colleague Giuseppe Di Garbo published this article on the NetEye Blog, where he explained how to integrate NetEye notifications with Telegram. It was a great starting point, and in fact many of us used it to Read More
In the latest update to NetEye 4.42, we're excited to announce the introduction of support for the Content-Security-Policy (CSP) header within the Icinga Web 2 interface. This enhancement plays a crucial role in strengthening your system's defenses against cross-site scripting Read More