After a welcoming introduction, you’ll get to know all the news and strategic info about NetEye and Cyber Security. Our partner Atlassian will talk about Enterprise Service Management, while our Technical Consultant, Nicola Degara will introduce you to data-driven IT Service Management. Würth Phoenix’ Cyber Security expert, Massimo Giaimo, will dive into our platform CTI (Cyber Threat Intelligence); followed by a partner speech from Elastic.
After a nice lunch break at the Plaza Restaurant, the afternoon holds interesting success stories for you as well as time for proper feedback from your side! ✌🏼😉 … and you surely don’t want to miss out on the delicious pastries from Iginio Massari – Alta Pasticceria 🧁and the prize drawing at the end of this amazing day’s event.
You can find the registration and further details here.
A safer way to run privileged Windows checks with SystemRunner If you’ve been monitoring Windows for a while, you’ve probably seen this pattern: some checks must run as LocalSystem (S-1-5-18), and the “quick fix” is to run the Icinga Agent Read More
With the upgrade to NetEye 4.44, we've added a lot of new features (https://www.neteye-blog.com/2025/10/neteye-4-44-release-notes/) and, from my point of view, one of the most relevant is the introduction of Elastic Stack 9. This Elasticsearch major release (https://www.elastic.co/guide/en/elastic-stack/9.0/elastic-stack-release-notes.html) includes some new Read More
Insights into how project managers perceive AI reshaping the project management. At the Threshold of a New Project Management Era Over a decade ago, when I first read about how AI could reshape jobs, my main question was how it Read More
In NetEye, 'business processes' is a module used to model and monitor the business process hierarchy to obtain a high-level view of the status of critical applications. In short, they allow monitoring controls of individual components to be aggregated into Read More
If you've worked with Elastic APM, you're probably familiar with the APM Server: a component that collects telemetry data from APM Agents deployed across your infrastructure. But what happens when you need to segregate that data by tenant, especially in Read More