After a welcoming introduction, you’ll get to know all the news and strategic info about NetEye and Cyber Security. Our partner Atlassian will talk about Enterprise Service Management, while our Technical Consultant, Nicola Degara will introduce you to data-driven IT Service Management. Würth Phoenix’ Cyber Security expert, Massimo Giaimo, will dive into our platform CTI (Cyber Threat Intelligence); followed by a partner speech from Elastic.
After a nice lunch break at the Plaza Restaurant, the afternoon holds interesting success stories for you as well as time for proper feedback from your side! ✌🏼😉 … and you surely don’t want to miss out on the delicious pastries from Iginio Massari – Alta Pasticceria 🧁and the prize drawing at the end of this amazing day’s event.
You can find the registration and further details here.
Atlassian's latest drop at Team '25 Last week, Anaheim (California) was buzzing with energy as Atlassian Team '25 kicked off 💥, and the initial announcements were already generating considerable excitement. From groundbreaking new products to enhanced features designed to streamline Read More
Choosing the right backup solution is critical for system administrators and IT professionals. The upcoming NetEye 4.41 version will bring an update to MariaDB, moving from version 10.3 to 10.11. This makes it especially timely to explore the opportunities offered Read More
In the world of customer support, efficiency is key. And what could be more efficient than a system that allows customers to find answers on their own, and agents to solve problems in record time? The answer is the integration Read More
In NetEye environments we use Tornado to collect events, elaborate on them, and send notifications based on them from a lot of sources (syslog, email, SNMP traps and so on). In this article I'd like to suggest a different use Read More
Managing user access in Atlassian Cloud can become complex, especially when integrating with Identity Providers (IDPs) for user provisioning via SCIM (System for Cross-domain Identity Management). A common challenge arises when users who were initially synchronized through your IDP become Read More