Security issues are currently at the forefront of a comprehensive monitoring attention: the performance of business-critical IT applications must be guaranteed even against the background of increasing cyber attacks. This was the main topic of our first Live Meeting session, with Security Auditor Günter Aigle presenting how availability, integrity and confidentiality create more security in a more vulnerable IT-world through a well thought-out Data Protection & Network Monitoring. Afterwards Georg illuminated the current approach of more data security against the background of increasing cyber attacks with NetEye SIEM.
Thank you all for joining, see here the presentations!
IPMI (Intelligent Platform Management Interface) has been the standard de facto for managing and monitoring computer hardware for many years, but as Intel explicitly stated here no further updates to the IPMI specification are planned or should be expected. "No Read More
In a previous article I analyzed how you can create effective visualizations in Kibana, and how to apply machine learning jobs with the goal of extracting as much information as possible from our data. However, you can also think of Read More
ITOA ITOA is the NetEye component which represents time series data using the Grafana graphics engine. Data is usually collected by Telegraf agents and stored into an InfluxDB specialized non-relational database. Flux In order to manipulate the time series data, Read More
The Cyber Apocalypse CTF is back with the 2022 edition. It’s a Jeopardy-style competition organized by Hack The Box and is open to everyone. Together as a security-focused guild (a concept taken from the Spotify model) we here at Würth Read More
The correct configuration and scheduling of downtime is an essential element of a monitoring system for several reasons: Mitigating notificationsProviding IT operations and Service Desk teams with timely information about when monitored systems may be subject to faults due to Read More