New & Notable
Server virtualization risks and monitoring News
August 23, 2019
VMWare announced an agreement to acquire endpoint security vendor Carbon Black in an effort to boost its cloud security offerings; the all-cash deal is valued at $2.1 billion.
February 28, 2019
Sensu Go's architecture and monitoring as code prompted NCR to switch away from Zabbix and pass on SolarWinds, as it sought to collect data from 80,000 restaurant customers.
May 25, 2018
Learning the ins and outs of the Chef InSpec product is only half the battle for compliance as code. The thornier task for some enterprises is to bridge the gap between compliance expertise and DevOps execution.
September 12, 2011
VMware has its work cut out for it integrating PacketMotion's hardware-based security appliances. Some virtualization pros say user access management isn’t on their radar yet.
Server virtualization risks and monitoring Get Started
Bring yourself up to speed with our introductory content
Storing log data is an important part of the log management process. Maintain performance, security and backup policies with careful log consolidation. Continue Reading
Logs can produce immense amounts of data, but logging standards, such as standardized formats and security procedures, can help IT professionals minimize information overload. Continue Reading
Log files can contain enormous amounts of potentially useful information, but without log data analysis and log filtering, it can be difficult to sort, prioritize and read. Continue Reading
Evaluate Server virtualization risks and monitoring Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In TechTarget's annual IT Priorities survey, information technology professionals across industries provide a glimpse of their 2018 IT strategy plans and pet projects. Continue Reading
IT organizations hear plenty of myths about isolation and security when they compare containerization vs. virtualization. One DevOps and containerization consultant sets the record straight in this podcast. Continue Reading
Container isolation doesn't cut it in production. Instead, beef up security from the infrastructure to the application code, and be prepared to use some new tools to do it. Continue Reading
Manage Server virtualization risks and monitoring
Learn to apply best practices and optimize your operations.
Last year, the U.S. federal government mandated that by October 2018, all agencies must have DMARC policies in place. Learn how complicated this requirement is with Judith Myerson. Continue Reading
Don't delay maintenance reboots. It's easy to forget to reboot hosts, tools and drivers, so use a reboot schedule to ensure your infrastructure remains functional. Continue Reading
Before implementing virtualization in your data center, assess all of its potential risks -- from system outages to cyberattacks -- and how to manage them. Continue Reading
Problem Solve Server virtualization risks and monitoring Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Efficiently recover from a host crash by maintaining transparency for your stakeholders and evaluating the resources available for a full root cause analysis. Continue Reading
In an increasingly virtualized world, there's always the risk of falling prey to a cyberattack. The best way to prevent an attack is to have a solid security plan in place. Continue Reading
Both containers and VMs offer different ways of meeting an organization's application deployment requirements. And virtualization containers present different security challenges than VMs. Continue Reading