Datadog vs SignalFx for Continuous Monitoring

Continuous monitoring is critical for ensuring that IT assets and controls meet business requirements and expectations—constantly assessing and validating them for quality, integrity, and security. This involves not only identifying ...

Tripwire vs Industrial Defender for Compliance

When it comes to compliance, passing audits means providing adequate documentation that you've taken the necessary steps to secure your environment. Sometimes creating this documentation can be just as difficult as enacting the security ...

Core Security vs Rapid7 for Continuous Security

Despite espousing a common, layered approach to security these days, most enterprise security suites have taken markedly divergent paths to essentially arrive at the same location. For example, some solutions started out as intrusion ...

AppDynamics vs Dynatrace for Application Performance Monitoring

Most of us take SaaS availability and uptime for granted: we assume that our favorite cloud-based tools will always be available when we need them. For cloud service providers, however, meeting these expectations is a magnanimous effort, ...

Tenable vs Qualys

Continuous security and vulnerability detection—both Tenable and Qualys have built industry-leading suites around these two cybersecurity disciplines. The latter in particular serves as a focal point for both vendors, with Tenable ...

TeamCity vs Jenkins for Continuous Integration

Continuous Integration (CI) is one of the formative concepts behind DevOps, driven by a need to regularly integrate new and changed code back into the master repository, and is often combined with Continuous Delivery (CD) to achieve faster ...

Splunk vs Sumo Logic Revisited

Log analysis and security incident and event management (SIEM) tools have become staples of enterprise cyber resilience programs. For vigilant organizations, having infrastructure visibility into the transactions occurring behind the ...

Datadog vs New Relic

Monitoring tools have come a long way since the early days of Big Brother. Today's solutions have evolved into powerful software troubleshooting and performance analytics platforms capable of deconstructing and analyzing the entire ...

ITIL vs DevOps

People seem to have a hard time deciding what DevOps even is, much less how (or whether) it compares to a highly structured methodology like ITIL. To answer the big questions up front: no, you don’t have to choose between DevOps and ITIL; ...

AlienVault vs Tenable for Continuous Security

As perimeter-based cyber protection falls to the wayside, a new breed of continuous security solutions are emerging that combine traditional endpoint protection with newer technologies like security information and event management  (SIEM) ...

How-to: Master Your Unruly Services

Services are the programs that run in the background on servers. All OSes come with a set of base services and most software utilizes services as well. Effectively managing servers means controlling these services—knowing what is there, ...

How-to: Fix Your Horrifically Inconsistent IT State

This article is part of our ongoing How-to series that focuses on ways to keep your environment ready and yourself sane in real world scenarios.

DevOps and Goliath: The Microsoft Toolchain

Most people associate DevOps with open source platforms and applications and with good reason. In the forward for the book Continuous Delivery with Windows and .NET, Dave Farley, who literally wrote the book on continuous delivery, writes, ...

UpGuard 101: Verifying Windows Groups

This article is part of our ongoing UpGuard 101 series that focuses on ways to use UpGuard to keep your environment ready and yourself sane in real world scenarios.

Cisco vs FireEye for Continuous Security

Who provides better continuous security: the world's largest maker of networking equipment or the first cybersecurity firm certified by the U.S. Department of Homeland Security? Due to key acquisitions over the years, both Cisco and ...

UpGuard 101: SSL Certificate Expiration

This article is part of our ongoing UpGuard 101 series that focuses on ways to use UpGuard to keep your environment ready and yourself sane in real world scenarios.

Tripwire vs Puppet

  In terms of what they do and how they work, Tripwire and Puppet have little overlap. Tripwire is for monitoring changes and Puppet is for configuring servers. The reason for tracking changes and configuring servers, however, brings them ...

UpGuard 101: Managing IIS Server Configs

This article is part of our ongoing UpGuard 101 series that focuses on ways to use UpGuard to keep your environment ready and yourself sane in real world scenarios.

Tenable vs McAfee...er Rapid7

Users of Intel Security’s McAfee Vulnerability Manager (MVM) have a choice to make before that product hits end-of-life in early 2018. They can either follow Intel Security to Rapid7’s Nexpose vulnerability monitor, or reassess their needs ...

Top 10 Ways To Harden Nginx For Windows

With 13% of the overall web server market share, the high performance open source HTTP server Nginx is a rising star in the pantheon of web server heavyweights. Even the most hardcore of Microsoft aficionados are dropping IIS in favor of ...
All posts