onpage logo

Category: Monitoring Alerts

February 7, 2022 | by OnPage Corporation
Kubernetes Monitoring

Kubernetes Monitoring: A Beginner’s Guide

What Is Kubernetes Monitoring? Kubernetes monitoring involves tracking application performance and resource utilization across cluster components, such as pods, containers, and services. The goal is to gain visibility into the health and security of your clusters. Kubernetes provides built-in features for monitoring, including the resource metrics pipeline that tracks several metrics like node CPU and … Continued

read more
December 10, 2021 | by Christopher Gonzalez
Mean Time Between Failures

Uncovering the Importance of Mean Time Between Failures

In the IT world, application service providers (ASPs) build customer trust by ensuring the continuous, uninterrupted availability of their services and software. Service availability allows customers to operate normally and generate revenue without being directly impacted by their providers’ system failures.  Though providers work to ensure system uptime, they are often challenged by unexpected technical … Continued

read more
December 6, 2021 | by Ritika Bramhe
retail incident response

Reimagining Retail Incident Response for the Holidays

The holiday season is here, and global retailers are prepared for the biggest retail event of the year. The decrease in new COVID-19 cases, coupled with a rise in vaccination rates, provides a glimmer of hope for shoppers looking to spend for friends and family. Holiday spending is expected to break previous records this year, … Continued

read more
August 11, 2021 | by Christopher Gonzalez
Spending enough on cybersecurity

Are You Spending Enough on Cybersecurity?

Cybercriminals do not discriminate against the organization, people or industry they target. These actors look to exploit vulnerabilities in resources to intercept valuable data from small and medium-sized businesses (SMBs). Cyberattacks are inevitable, and organizations must have the right controls and information security systems to mitigate the impact of an attack. As cyberattacks continue to … Continued

read more
July 22, 2021 | by Ritika Bramhe
Monitoring best practices

Monitoring and Alerting 101: Monitoring Best Practices

An effective monitoring system is paramount to smooth business operations. As the need for a fast, responsive software experience gains momentum, monitoring becomes an indispensable driving force. Monitoring systems enable IT teams to proactively observe the health and responsiveness of critical environments and applications. Without monitoring, organizations must depend on customers or internal departments to … Continued

read more
April 29, 2021 | by Christopher Gonzalez
Automated Incident Management

4 Major Capabilities of Automated Incident Management

Automated incident management ensures that critical events are detected, addressed and resolved in a fast, efficient manner. Automation allows incident management tools to integrate with each other and fosters instant communication across the systems. Automation tears down barriers across IT operations (ITOps) teams and ensures all departments are on the same page. Teams gain full … Continued

read more
April 2, 2021 | by Ritika Bramhe
SOC

Strategies to Reduce Alert Fatigue in Your SOC Team

In a SOC (security operations center), alerts originating from hundreds of systems compete to get attention. What ensues is a security analyst’s battle to beat alert fatigue while effectively defending their organization from cybersecurity threats.  Alert fatigue is a major challenge faced by security operations center (SOC) teams. The stakes are even higher since they … Continued

read more
May 8, 2020 | by Ritika Bramhe
Maze Ransomware attack

Maze Ransomware Attack Hits Cognizant

New Jersey-based service provider Cognizant is the latest victim of the Maze ransomware attack. This is an unfortunate reality check, proving that hackers don’t stop their calculated, malicious activities for COVID-19. Accordingly, managed service providers (MSPs) are still largely vulnerable to these malicious crimes. This post provides insight into the latest Maze ransomware attack, followed … Continued

read more
March 24, 2020 | by Gilad Maayan
Alert overload

How to Avoid Alert Overload From EDR Solutions

In today’s chaotic digital sphere, networks are distributed across an increasingly wide range of hackable endpoints. From smartphones and tablets to Internet of Things (IoT) devices—everything gets connected to the network.  EDR technologies and practices were created for the purpose of providing active endpoint protection and defense. However, if your systems and admins are overloaded … Continued

read more
September 17, 2019 | by Ritika Bramhe
Diamond organization adopts OnPage

Large Diamond Mining Organization Adopts OnPage

Diamond mining is recognized as a dangerous occupation, causing serious accidents for mineworkers across the globe. Often times, these incidents turn out to be fatal because the victim didn’t receive immediate care from first responders. However, significant strides are being made to minimize the impact of these accidents by large, international organizations. In our latest … Continued

read more

OnPage