After a welcoming introduction, you’ll get to know all the news and strategic info about NetEye and Cyber Security. Our partner Atlassian will talk about Enterprise Service Management, while our Technical Consultant, Nicola Degara will introduce you to data-driven IT Service Management. Würth Phoenix’ Cyber Security expert, Massimo Giaimo, will dive into our platform CTI (Cyber Threat Intelligence); followed by a partner speech from Elastic.
After a nice lunch break at the Plaza Restaurant, the afternoon holds interesting success stories for you as well as time for proper feedback from your side! ✌🏼😉 … and you surely don’t want to miss out on the delicious pastries from Iginio Massari – Alta Pasticceria 🧁and the prize drawing at the end of this amazing day’s event.
You can find the registration and further details here.
On Neteye environment we use Tornado to collect, elaborate and notify events from a lot of sources (syslog, email, SNMP traps and so on) . In this article we want suggest a different use case, how to use tornado to Read More
Managing user access in Atlassian Cloud can become complex, especially when integrating with Identity Providers (IDPs) for user provisioning via SCIM (System for Cross-domain Identity Management). A common challenge arises when users who were initially synchronized through your IDP become Read More
As technology continually evolves, keeping our software stack up to date is essential for performance, security, and access to new functionalities. In this post, I want to share how we upgraded MariaDB from version 10.3 to 10.11 as part of Read More
A brief introduction to Whiteboards, a new tool that facilitates a new form of collaboration between people. Why are we still talking about the documentation problem? In my previous post, we discussed the challenging topic of documentation management within a Read More
In some test or development environments, you may need to simulate the presence of GSM modems without having an actual physical device. This can be useful for example when testing monitoring checks, SMS management systems, or creating new notification rules. Read More