Georg Kostner itroduces the latest NetEye enhancements at the Open Source Conference in Milan
Georg last week presented its enhanced IT Service Management offer with NetEye at the yearly Open Source Conference in Milan. The breakout session pointed out the advantages in implementing NetEye for the Network Traffic Monitoring and focused also on Al´exa. Al’exa, which has recently been integrated in the NetEye offer simulates the end user behavior to control the availability and reliability of all IT services. With this recent enhancement NetEye allows to identify also on outsourced services which applications are consuming which bandwidth and could be the cause for possible performance losses.
Luca Deri, ntop founder, showed the main features offered by its solution, integrated with NetEye. The network monitoring with ntop allows users to improve their network visibility, extending the standard metrics (i.e., packets, bytes) and analyzing in more detail the protocols used in the network (i.e., email, VoIP, Citrix / RDC).
Elastic 8.16, which comes with NetEye 4.39, made Elastic Universal Profiling generally available for self-hosted installations. This means that NetEye SIEM installations will now be able to take advantage of the continuous profiling solution by Elastic. In this blogpost we'll Read More
In the first part of this series, we explored how Jira Service Management (JSM) helps streamline Incident Management, aligning with ITIL v4 best practices. Incident Management aims to restore normal service operation as quickly as possible after a disruption, ensuring Read More
Hello everyone! Today, I'd like to briefly discuss an improvement to the update and upgrade procedures that we've started to adopt with NetEye 4.39! What we wanted to improve One aspect that made quite an impact was that whenever the Read More
Hello everyone! Today, I’d like to share an exciting improvement we’ve made to the installation and upgrade procedures in NetEye, introducing a faster and more efficient parallel architecture! Why Modernize the Installation and Upgrade Processes? At Würth Phoenix, we strive Read More
Note: This description of a security analyst's daily routine is fictitious. However, the osquery examples have been tested and can therefore be used as a template for your own research. 1. Alarm Detection Today started with a high-severity alarm from our Read More