IT Monitoring: Getting Above the Noise, Part 1 – Accuracy & Alerts

Every now and again, our team comes across industry research papers that might as well have been commissioned specifically for us. Q: Did you order a market research survey from Forrester? A: Who me? No. I think they just read our minds and went ahead and did it! Sadly, Forrester (probably) doesn’t have ESP. It’s our friends at Zenoss that asked Forrester Consulting a little while back to find out…

Read more

IT Compliance: Let Us Help Ease the Headache

Many security compliance standards such as the Health Insurance Portability & Protection Act (HIPPA) and the Sarbanes-Oxley Act (SOX) require detailed information about the use of and access to IS/IT resources. Interpretations and applications of these and other compliance standards can vary but one constant remains: system activity logs must be kept for auditing purposes.

Read more

Error Notifications: How to Get Notified of System Failure

Monitoring data is essential to many IT-related business decisions. On an operational level however, getting promptly notified of business impacting problems can make the difference between a minor hindrance and disaster. Error notifications are of particular interest to system administrators because system errors can often cascade from minor to severe in the blink of an eye.

Read more

5 IT Risk Management Problems Solved

IT risk management and budgeting are perhaps the two biggest stress points for any IT leader. Forbes recently compiled a five-point list of often overlooked IT risks and each point, we believe, should be of interest to SentinelAgent users and prospective buyers. 1. Reliability Question: How reliable is your third-party service? SentinelAgent has mitigated this IT risk by building its software entirely on a cloud-based architecture. We use Microsoft Azure…

Read more

Walking the Line: Cloud Security & Monitoring Data

The topic of cloud security has generated a kind of never ending debate that’s usually reserved for socioeconomic and political issues. Is our data safe? How safe is safe? How do we balance security and accessibility? What needs to be protected and what doesn’t? These questions could just as easily be the ravings of a nihilist or a Fortune 500 CIO. They’re all good questions with many right answers and…

Read more