IT systems management and monitoring
Learn about the tools and technologies that enable more visibility into IT infrastructure, integration between IT management tools, tailored alerts for IT professionals and new areas of performance monitoring and management.
Top Stories
-
News
11 Apr 2025
Atlassian Data Center stops multiyear license renewals
The company confirmed that new on-premises product licenses are now limited to one year as it adds high-security cloud offerings. Users see the writing on the wall. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
10 Apr 2025
Using AI and machine learning for APM
Discover how organizations can streamline operations and improve operational analytics by using AI and machine learning in their application performance monitoring environments. Continue Reading
By
-
Tip
10 Apr 2025
Using AI and machine learning for APM
Discover how organizations can streamline operations and improve operational analytics by using AI and machine learning in their application performance monitoring environments. Continue Reading
By -
News
09 Apr 2025
Exploited Windows zero-day addressed on April Patch Tuesday
Microsoft delivers fixes for 121 vulnerabilities with 11 rated critical this month. Admins will have extra mitigation work to correct three flaws. Continue Reading
By- Tom Walat, Site Editor
-
News
09 Apr 2025
Google Gemini 2.5 Pro extends on-prem GenAI support
Google Gemini is the first proprietary frontier model that can be run on-premises via Google Distributed Cloud for privacy- and cost-conscious enterprises. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
08 Apr 2025
AI agents raise stakes in identity and access management
IT vendors roll out fresh tools to take on identity and access management for AI agents as enterprises deploy them internally and battle malicious ones externally. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Podcast
07 Apr 2025
OpenTelemetry adapts to AI observability
A core contributor and governing board member for the CNCF project reflects on how AI is changing observability, programming and business. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
04 Apr 2025
Distributed tracing vs. logging: Uses and how they differ
Distributed tracing and logging help IT teams identify performance issues in systems in different ways. But they also complement each other to pinpoint problems. Continue Reading
By- Donald Farmer, TreeHive Strategy
-
Feature
02 Apr 2025
Explore these 7 popular API gateway tools
Plenty of vendors have jumped on the API gateway trend, which can make it difficult to choose the right one for you. We examine the key features of seven popular gateway tools. Continue Reading
By- Twain Taylor, Twain Taylor Consulting
-
Definition
01 Apr 2025
What is synthetic monitoring?
Synthetic monitoring is a proactive monitoring approach that uses scripted simulations of user interactions to assess the performance and availability of websites, applications and services. Continue Reading
By- Kinza Yasar, Technical Writer
- Chris Tozzi
-
Tip
28 Mar 2025
Follow Patch Tuesday best practices for optimal results
Microsoft releases most security updates on Patch Tuesday, a day that brings anxiety to many sys admins. Learn how to develop a strategy to test and deploy these fixes. Continue Reading
By -
Tip
27 Mar 2025
APM vs. observability: Key differences explained
If you're debating using application performance monitoring and observability to gather system data and improve the user experience, consider these differences between them. Continue Reading
By -
News
27 Mar 2025
Bluesky, Squarespace pros give incident, project postmortems
Bluesky saw a massive surge in requests per second after the 2024 U.S. election, while Squarespace engineers had 10 months to migrate 9 million domains from Google. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
27 Mar 2025
What is IT automation? A complete guide for IT teams
IT automation is the use of instructions to create a clear, consistent and repeatable process that replaces an IT professional's manual work in data centers and cloud deployments. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
- Ron Karjian, Industry Editor
- Kinza Yasar, Technical Writer
-
Feature
27 Mar 2025
Compare 8 tools for IT monitoring in 2025
Effective monitoring is a cornerstone of any IT environment. Examine the available tool options for IT monitoring, and compare their features, benefits and costs. Continue Reading
By- Emily Foster, Former Associate Site Editor
- Will Kelly
-
Podcast
27 Mar 2025
A visual future: GraphRAG and AI observability
In the eyes of one CNCF leader, GNNs, knowledge graphs and GraphRAG will boost IT operations and create 3D views of apps and infrastructure. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
26 Mar 2025
Site reliability engineers weigh MLOps vs. LLMOps
Some of the same lessons -- and unsolved problems -- from supporting machine learning apps in production carry over to generative AI apps, but not all. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
25 Mar 2025
SREs map uncharted territory with LLMOps
Generative AI apps upend longstanding reliability engineering principles, mindsets and skill sets -- how experts weather the disruption. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
25 Mar 2025
What is IT operations (IT ops)?
The term IT operations (IT ops) describes the many processes and services an IT department manages and maintains within an organization. Continue Reading
By- Kinza Yasar, Technical Writer
- Paul Kirvan
- Kate Brush
-
Definition
24 Mar 2025
What is reliability, availability and serviceability (RAS)?
Reliability, availability and serviceability (RAS) are related operational activities that must be considered when designing, manufacturing, purchasing and using a computer product or component. Continue Reading
By -
Podcast
20 Mar 2025
Charity Majors on AI observability and the future of SRE
The observability maven reflects on 'Observability 2.0' and urges site reliability engineers to embrace AI agents, despite their perceived threat -- before it's too late. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
20 Mar 2025
What is continuous monitoring?
Continuous monitoring constantly observes the performance and operation of IT assets to help reduce risk and improve uptime instead of taking a point-in-time snapshot of a device, network or application. Continue Reading
-
Tip
19 Mar 2025
6 open source workflow engines and how to use them
When evaluating open source workflow engines, learn their features and strengths, then view top platforms that streamline data pipelines, roll out microservices and automate tasks. Continue Reading
-
Tip
19 Mar 2025
The Microsoft patch management guide for admins
Microsoft recently added WSUS to its deprecation list. Now that the battle-tested patch management tool's days are numbered, what are the alternatives from the company? Continue Reading
By -
Tip
18 Mar 2025
Learn how the Windows Server 2025 editions differ
See what's been gained -- and lost -- in Microsoft's latest version of its server OS before you plan a migration from your existing workloads. Continue Reading
By -
Tip
18 Mar 2025
APM vs. distributed tracing: How they differ
Application performance monitoring and distributed tracing help IT teams identify performance problems in different but complementary ways, as explained here. Continue Reading
By- Donald Farmer, TreeHive Strategy
-
Definition
18 Mar 2025
What is security automation?
Security automation uses technology to remove high-volume manual processes from security operations to detect cyberthreats, which saves time by integrating different workflows into repeatable processes. Continue Reading
-
Tip
18 Mar 2025
Kubernetes automation: Use cases and tools to know
Kubernetes automation simplifies the configuration, deployment and management of prepackaged container components supporting business apps, but it's not recommended in all cases. Continue Reading
-
News
17 Mar 2025
GitHub Actions supply chain attack spotlights CI/CD risks
Experts say a GitHub Actions vulnerability should renew enterprises' attention to securing build pipelines the same way they secure production environments. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
17 Mar 2025
8 service desk automation examples to enhance IT support
NLP-powered chatbots, escalation algorithms, data insights, onboarding, SLA monitoring and faster response times are service desk automation examples boosting IT support. Continue Reading
-
Tip
17 Mar 2025
IT automation vs. orchestration: Key differences
As complementary technologies, automation defines each repetitive task to be performed, while orchestration assembles arrays of individual tasks to accomplish complex workflows. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Definition
17 Mar 2025
What is pipelining?
Pipelining is the process of a computer processor executing computer instructions as separate stages. Continue Reading
-
Tip
14 Mar 2025
11 tools that facilitate developer productivity
Development teams have a better experience when they use tools that integrate well together and facilitate collaboration. Continue Reading
By -
News
11 Mar 2025
March Patch Tuesday fixes 6 Windows zero-day exploits
All the vulnerabilities that had been actively exploited in the wild will get resolved quickly by deploying the Windows cumulative update for this month. Continue Reading
By- Tom Walat, Site Editor
-
Definition
11 Mar 2025
What is an automation engineer and how do you become one?
An automation engineer designs and develops autonomous systems to manage repetitive tasks and improve efficiency and productivity. Continue Reading
-
News
10 Mar 2025
Analysts: IBM-LzLabs suit a cautionary tale for IT buyers
A U.K. court ruled that an LzLabs subsidiary breached IBM license terms, a reminder to IT orgs to do careful research before choosing a vendor, according to industry watchers. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
07 Mar 2025
Benefits and challenges of IT automation
Adopting IT automation comes with improved process efficiency, greater scalability, lower costs and the power of AI, yet implementation, integration and maintenance issues persist. Continue Reading
-
Definition
05 Mar 2025
What is tool sprawl? Explaining how IT teams can avoid it
Tool sprawl is the accumulation of many IT tools by an organization, leading to inefficiency and data siloing. Continue Reading
By- Madeleine Streets, Senior content manager
-
Definition
04 Mar 2025
What is root cause analysis?
Root cause analysis (RCA) is a method for understanding the underlying cause of an observed or experienced incident. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Robert Sheldon
-
News
04 Mar 2025
JFrog integrates with Hugging Face, Nvidia; intros JFrog ML
The partnership aims to give developers a clearer guide on safe models. It also aims to ensure enterprise-grade safety and security with the deployment of open models. Continue Reading
By- Esther Shittu, News Writer
-
Tip
03 Mar 2025
10 steps to develop your IT automation strategy
Setting business goals, establishing governance practices, identifying and deploying the right tools, and providing training are the foundations of a sound IT automation strategy. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Definition
03 Mar 2025
What is a word in computing architecture?
In computing architecture, a word is a fixed unit of data containing a specific number of bits that can be addressed and moved between storage and the computer processor. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Paul Kirvan
-
Tip
27 Feb 2025
The top AIOps tools and platforms to consider in 2025
As AIOps approaches become more common among IT teams, the AIOps tools and platforms market has expanded. Compare leading options to decide which fits your needs. Continue Reading
By -
Definition
27 Feb 2025
What is network analytics?
Network analytics is the application of big data principles and tools to the data used to manage and secure data networks. Continue Reading
By- Rahul Awati
- John Burke, Nemertes Research
-
News
25 Feb 2025
New Relic takes partnership tack for agentic AI
New Relic users say its collaborative approach to agentic AI, revamped AIOps tools and pricing model will make it easier to explore fresh forms of automation. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
20 Feb 2025
Zero-CVE Chainguard Images gain customization option
Chainguard opens its container image builder factory to let users mix and match hardened container components while preserving a zero-vulnerability SLA. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
20 Feb 2025
What is function as a service (FaaS)?
Function as a service (FaaS) is a cloud computing model that enables cloud customers to develop applications and deploy functionalities and only be charged when the functionality executes. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Stephen J. Bigelow, Senior Technology Editor
- Sarah Lewis
-
Tutorial
18 Feb 2025
Deploy a read-only domain controller for security, speed
A read-only domain controller requires a fair amount of work for a proper deployment, but it can be a great option for quicker logins for users in branch offices. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
News
13 Feb 2025
IT orgs expand business observability beyond their own walls
Business observability could soon become a part of your IT environment, even if you're not the one who originally thought of it. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
11 Feb 2025
Microsoft plugs two zero-days for February Patch Tuesday
The company corrects active exploits in vulnerable Windows systems, one of which could give the attacker complete control if successful. Continue Reading
By- Tom Walat, Site Editor
-
Tip
10 Feb 2025
Data center temperature and humidity guidelines
ASHRAE maintains a recommended list of humidity and temperature level standards for data centers. Discover which range of guidelines is best for each equipment class. Continue Reading
By -
Tip
10 Feb 2025
Top observability tools for 2025
Observability tools can help developers and IT administrators improve the delivery, performance and customer experience of applications and avoid potential issues. Continue Reading
-
Definition
07 Feb 2025
What is cognitive automation?
Cognitive automation describes diverse ways of combining artificial intelligence (AI) and process automation capabilities to improve business outcomes. Continue Reading
-
Definition
06 Feb 2025
What is serverless computing?
Serverless computing is a cloud computing execution model that lets software developers build and run applications and servers without having to provision or manage the back-end infrastructure. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Linda Rosencrance
-
News
05 Feb 2025
Dynatrace drops dev observability gauntlet for Datadog
Dynatrace and Datadog both plan to ship live debugging tools as they vie for developer attention in the observability market. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
05 Feb 2025
Dynatrace ups AIOps ante with log analytics refresh
Updates to Dynatrace CoPilot and log analytics for AIOps prompt users to dump other tools, but migrations can be a challenge. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
04 Feb 2025
How to properly implement Exchange Extended Protection
This security feature can better protect Exchange Server deployments to prevent a wide range of attacks and safeguard sensitive data transmitted over the network. Continue Reading
By- Helen Searle-Jones, Tritech Group
-
News
29 Jan 2025
CISO enlists agentic AI reinforcements for SecOps
AI agents are already in the hands of adversaries. One aerospace CISO has begun to use them to augment his SecOps staff and even the score. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
27 Jan 2025
What is cloud orchestration (cloud orchestrator)?
Cloud orchestration (cloud orchestrator) is the use of programming technology to manage the interconnections and interactions among workloads on public and private cloud infrastructure. Continue Reading
By- Kinza Yasar, Technical Writer
- Alan R. Earls
-
News
23 Jan 2025
EU, U.S. at odds on AI safety regulations
The U.S. under the new Trump administration changes course on AI safety, in contrast with the EU, as uncertainty lingers about other Biden-era federal cybersecurity efforts. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Podcast
23 Jan 2025
Review and predictions for open source software in 2025
Sigstore creator, Chainguard CEO, OpenSSF TAC member and Season 1 guest Dan Lorenc returns to review 2024 and make predictions for 2025. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
22 Jan 2025
A guide to software design documentation and specifications
Software design documents still rank as important SDLC components -- even in the age of DevOps. Learn why they are important, how to write one and who should contribute. Continue Reading
By -
Podcast
22 Jan 2025
Cybersecurity expertise gaps: More than meets the eye
An S&P Global analyst charts the past, present and future of SecOps, where demand continues to outpace the supply of advanced skills. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
17 Jan 2025
Biden order gives CISA software supply chain 'teeth'
The outgoing administration makes a Hail Mary attempt to salvage work it began in 2021 to require specific software supply chain security information from software suppliers. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
16 Jan 2025
Tech industry experts digest cybersecurity executive order
IT pros assess a last-minute cybersecurity executive order with new directives on a broad swath of topics, from cybercriminal sanctions to AI and identity management. Continue Reading
By- Beth Pariseau, Senior News Writer
- Arielle Waldman, News Writer
-
News
15 Jan 2025
Cisco AI cybersecurity launch touts shadow AI defense
Cisco wields the power of incumbency to weave AI security into existing cloud access management tools, including algorithmic validation testing on AI models. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
14 Jan 2025
January Patch Tuesday resolves 3 Hyper-V zero-days
The number of vulnerabilities corrected for January Patch Tuesday is one of the highest in recent memory and includes three Hyper-V vulnerabilities exploited in the wild. Continue Reading
By- Tom Walat, Site Editor
-
Podcast
14 Jan 2025
Rethinking business continuity before the next big IT outage
For one industry analyst, the most significant gap exposed by the CrowdStrike outage is between IT and business -- not Sec and Ops. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Opinion
10 Jan 2025
5 ways enterprise AI will transform IT infrastructure in 2025
Enterprise AI will take a massive step forward in 2025. Don't let the year slip by without a strategy to turn the AI hype into real value for your IT organization. Continue Reading
By- Scott Sinclair, Practice Director
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
Feature
18 Dec 2024
Top data center infrastructure management software in 2025
DCIM tools can improve data center management and operation. Learn how six prominent products can help organizations control costs, manage energy and track assets. Continue Reading
By- Robert McFarlane, Shen Milsom & Wilke LLC
-
News
18 Dec 2024
AWS, Red Hat hybrid cloud wares court VMware converts
Broadcom has softened some of its stances on VMware licensing and public cloud, but competitors stay poised to pounce on customers looking to defect. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
10 Dec 2024
December Patch Tuesday shuts down Windows zero-day
Microsoft addresses 72 vulnerabilities, including 17 rated critical. Administrators should focus on patching the Windows OS to stop a flaw that has been exploited in the wild. Continue Reading
By- Tom Walat, Site Editor
-
Tip
26 Nov 2024
Microsoft Teams monitoring tips for admins
Learn how to use PowerShell to set up an automated way to check for suspicious activity in the Microsoft chat service to avoid security and compliance issues. Continue Reading
By- Liam Cleary, SharePlicity
-
Definition
26 Nov 2024
What is managed detection and response (MDR)?
Managed detection and response (MDR) services are a collection of network-, host- and endpoint-based cybersecurity technologies that a third-party provider manages for a client organization. Continue Reading
By- Nick Barney, Technology Writer
- Kinza Yasar, Technical Writer
- Ben Lutkevich, Site Editor
-
Definition
25 Nov 2024
What is a configuration file?
A configuration file, often shortened to config file, defines the parameters, options, settings and preferences applied to operating systems (OSes), infrastructure devices and applications in an IT context. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Definition
22 Nov 2024
What is an information system (IS)?
An information system (IS) is an interconnected set of components used to collect, store, process and transmit data and digital information. Continue Reading
By -
Podcast
21 Nov 2024
Rethinking 'secure by design' amid slippery SecOps shifts
An expert discusses the fallout from a CISA report that raised doubts about the last decade's DevSecOps trend, and where the industry goes from here. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
15 Nov 2024
Guide to the advantages of using the Windows Terminal app
Admins who manage a wide range of resources will want to try this Microsoft app that integrates with Windows machines, cloud services and Linux systems from a single interface. Continue Reading
-
Podcast
14 Nov 2024
CEO: GenAI changes multi-cloud security, network equation
Aviatrix CEO Doug Merritt sees generative AI apps forcing a more distributed approach to cloud infrastructure, but he believes it will also help SecOps catch up with threats. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
12 Nov 2024
Microsoft halts 2 zero-days on November Patch Tuesday
The company addressed 88 vulnerabilities, including an Exchange Server spoofing flaw and a significant number of SQL Server bugs, this month. Continue Reading
By- Tom Walat, Site Editor
-
Podcast
12 Nov 2024
Lines blur between enterprise SecOps and cyberdefense
One expert predicts AI will ultimately benefit attackers more than defenders and, instead, urges businesses to take a page out of military and government cyberdefense handbooks. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
12 Nov 2024
What is firmware?
Firmware is a type of software program embedded into hardware devices to help them function smoothly and effectively. Continue Reading
By- Rahul Awati
- Ben Lutkevich, Site Editor
-
Tip
08 Nov 2024
Data center cooling systems and technologies and how they work
Extreme heat and cold can keep equipment from operating at peak efficiency. Explore cost-efficient and cost-effective cooling technologies and smart options for your facility. Continue Reading
By- Julia Borgini, Spacebarpress Media
-
News
01 Nov 2024
IBM Apptio preps FinOps link with Terraform via GitHub
IBM drops another hint about its plans for HashiCorp with a shift-left FinOps integration in private beta, while tie-ins with Red Hat remain an open question. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Podcast
01 Nov 2024
Could SBOMs save lives? SecOps in critical infrastructure
'We live in glass houses,' said a seasoned cybersecurity expert of the U.S. water supply, healthcare and other lifeline services. 'And people are about to start throwing rocks.' Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
28 Oct 2024
What is AIOps (artificial intelligence for IT operations)?
Artificial intelligence for IT operations (AIOps) is an umbrella term for the use of big data analytics, machine learning (ML) and other AI technologies to automate and enhance IT operations. Continue Reading
By- Kinza Yasar, Technical Writer
- Stephen J. Bigelow, Senior Technology Editor
-
Podcast
25 Oct 2024
Relearning past lessons in assessing cloud risk
Those who do not learn from history are doomed to repeat it -- even when that history is only about a decade or two old, according to one security analyst in this podcast episode. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
23 Oct 2024
Continuous delivery vs. continuous deployment: Which to choose?
Continuous delivery and continuous deployment both compress and de-risk the final stages of production rollout. Learn how to choose the proper path for your organization. Continue Reading
By- Matt Heusser, Excelon Development
- Clive Longbottom
-
Opinion
23 Oct 2024
Blueprint for hybrid observability: AI and its 4 key enablers
There are four elements that create a foundation for AI-driven observability. The ability to automatically detect new or updated components is just one of them. Continue Reading
By- Jim Frey, Principal Analyst
- Torsten Volk, Principal Analyst
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
Definition
23 Oct 2024
What is Jira?
Jira is an application lifecycle management (ALM) and Agile project management tool from Atlassian. Continue Reading
By -
Answer
22 Oct 2024
How to deploy an Exchange Server cumulative update
Cumulative updates give the Exchange Server platform stability and security. This guide explains how to perform this maintenance properly to avoid a major service disruption. Continue Reading
By- Helen Searle-Jones, Tritech Group
-
Podcast
21 Oct 2024
Security observability, AI require data hygiene in DevSecOps
Sound data management is the heart of observability for security, which guides DevSecOps practices and determines the usefulness of AI apps, New Relic CISO says. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
16 Oct 2024
What is black box AI?
Black box AI is any artificial intelligence system whose inputs and operations aren't visible to the user or another interested party. Continue Reading
By- Rahul Awati
- Kinza Yasar, Technical Writer
-
News
16 Oct 2024
Terraform Stacks, HCP Waypoint prompt migration questions
HashiCorp fends off challengers that sell ease of use with fresh infrastructure-as-code abstraction, while Terraform users grapple with a potential move to cloud-first services. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Definition
15 Oct 2024
What is a command prompt?
A command prompt is the input field in a text-based user interface screen for an operating system (OS) or program. Continue Reading
-
Tip
15 Oct 2024
The benefits of network asset management software
Network asset management software helps network teams keep track of network devices and software to ensure timely upgrades, accurate inventory and updated documentation. Continue Reading
By- David Jacobs, The Jacobs Group
-
Tip
11 Oct 2024
How to evaluate AI for Windows Server environments
Organizations tasked with assessing AI workloads on Windows Server must weigh all the variables to determine the best approach to adopt this budding technology. Continue Reading
By- Dwayne Rendell, Triskele Labs
-
Podcast
11 Oct 2024
SecOps from the IT infrastructure operations perspective
The CrowdStrike outage capped a decade of deepening divide between SecOps and the rest of IT ops -- and should bring about its end, according to one industry veteran. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
08 Oct 2024
Microsoft repairs 2 zero-days on October Patch Tuesday
Administrators will have to tackle 117 new vulnerabilities, including three rated critical, in this month's batch of security updates. Continue Reading
By- Tom Walat, Site Editor
-
Tip
08 Oct 2024
What's new in System Center 2025?
The key management tool for enterprises with a heavy investment in on-premises infrastructure is set for its next major release to coincide with the arrival of Windows Server 2025. Continue Reading
By -
Feature
07 Oct 2024
Configuration management vs. asset management simplified
Configuration management and asset management are sometimes used interchangeably. While similar in certain ways, they are not the same thing. Discover where the two diverge and where they overlap. Continue Reading
By -
Podcast
03 Oct 2024
Microsoft security overhaul offers blueprint for SecOps
Better late than never: Microsoft lags major cloud competitors in making security a top priority. But other enterprises might learn from how the company is catching up. Continue Reading
By- Beth Pariseau, Senior News Writer