Solsys Embarks on a Strategic Alliance with Boomi, a Gartner Magic Quadrant Leader in Integration Platform as a Service
TORONTO, ONTARIO, CANADA,November 15, 2023 /Read the full press release at EINPresswire Solsys, a pioneer in API Management…
Top Practices to Shield Your APIs from Attack!
In today’s rapidly evolving digital landscape, software serves as the cornerstone of organizational success. The nature of modern…
Solsys Labs – Practical Learning for Applicable Success
“Let me show you what that looks like,” is a powerful phrase when it comes to showcasing technology. …
Practices to Shield Your APIs from Attack
Did you know that 50% of organizations have experienced an API Security incident in the past 12 months?*…
Are You Protecting Your Data From Bots
In today’s world, bots are becoming increasingly common. In fact, in 2022 bots made up more than 40%…
Leveraging GEN AI for Splunk Development
By: Marek Suchomski AI has been in the forefront of technology news headlines for the past several months. …
15 Practices to Shield APIs from Attack: #8 – And Finally, Getting Started
In this series we have looked at 15 practices to shield your APIs from attack, and shown how…
How to Proactively Detect Attacks: Using Splunk Attack_Data to Simulate Attacks
With data breaches negatively impacting business costs year over year, many companies are turning to advanced techniques to…
15 Practices to Shield APIs from Attack: #7 – OWASP Top 10, Injection
Every few years, the Open Worldwide Application Security Project (OWASP) updates its top attack vectors. To illustrate how our…
How Kong Gateway’s Rate Limiting Plugin Can Protect Your Organization from DDoS Attacks
By Nicky Carlisle Distributed Denial of Service (DDoS) attacks are a growing concern for organizations of all sizes with…
15 Practices to Shield APIs from Attack: #6 – OWASP Top 10, Cryptographic Failures
Every few years, the Open Worldwide Application Security Project (OWASP) updates its top attack vectors. To illustrate how our…
15 Practices to Shield APIs from Attack: #5 – OWASP Top 10, Broken Access Control
Every few years, the Open Worldwide Application Security Project (OWASP) updates its top attack vectors. To illustrate how our…
15 Practices for Shielding Your APIs from Attack: #4 – Tools & Systems
This post shares experiences from our multi-year journey working with a Canadian client to help them improve their…
15 Practices for Shielding Your APIs from Attack: #3 – Concepts, Cryptography, & Credentials
This post shares experiences from our multi-year journey working with a Canadian client to help them improve their…
15 Practices for Shielding Your APIs from Attack: #2 – Teams & Tests
This post shares experiences from our multi-year journey working with a Canadian client to help them improve their…
15 Practices for Shielding Your APIs from Attack: #1 – APIs at Risk
One of our customers, a leader in the Canadian Telecom Market, found that the need for a single…
Leveraging Splunk’s Toolkit to Begin Mastering Observability
By: Marek Suchomski Splunk’s recent acquisition of SignalFX introduced Splunk Observability Cloud as a powerful new tool in…
North American Telecom Leader Saves $3 Million+ Annually by Migrating to Next-generation API Connectivity
North American Telecom Leader saves 3 Million+ annually by migrating to next generation API connectivity We help businesses…
Why you need Observability-as-Code
By Nicky Carlisle As IT professionals, one of the key considerations in our field is how to effectively…
Convergence of Observability and Security
The Benefits and Approaches to Better and Safer Applications and Services What kind of information needs to be…
Observability & Security: The Benefits and Approaches to Better and Safer Applications and Services
Observability and Security are undoubtedly related. Security exposures and compromises happen in the dark, where no one is…
Yielding Optimized SPL Using TERM()
By Leor Roynsky SPL (Splunk Processing Language) is the fundamental way through which users interact with data in…
Splunk Cloud & Product Thinking
In part one of this post, we talked about Product Thinking, what it is, and why it’s valuable…
Splunk as a Product Enabler for Security
In part one of this post, we talked about Product Thinking, what it is, and why it’s valuable…
Splunk as a Product Enabler for Observability
In part one of this post, we talked about Product Thinking, what it is, and why it’s valuable…
Thinking about Splunk as a Product
What is Product Thinking and How Does it Relate to Splunk? In this blog, the first of a…
Why Agile Works
Through my continued association with the Toronto agile community and as an organizer with the AgileTO meetup team…
ESI Technologies Welcomes Solsys to its Family of Affiliated Companies
Toronto, ON, May 25, 2021 – ESI Technologies announces today an important partnership and significant investment in Solsys…
A Coherent API Lifecycle Management Strategy
Without your CIO establishing a coherent API strategy, APIs are just another middleware software lacking any transformational value…
Telecom – API Economy in the COVID World
It has been more than a year living through COVID where we have witnessed significant uptick in digital…
The Case for API Gateway Self Service
Your API GW (or Gateways) are hard at work in your organization, securely sharing APIs or services to…
Solsys and Kong Announce Strategic Partnership
At Solsys, we build data-driven solutions to enable Digital Transformation for large enterprises. We are a premier consulting…
The Importance of APIs in the Online Travel Industry
There was a time when booking a trip meant going to a travel agent or directly to the…
A Quick Guide to Hiding Certain Splunk Fields
Alerts must be sent to the monitoring teams, but fields with sensitive information cannot be included. In a…
Fraud Management: Identifying and Alerting for an IP Threat
Scenario Data breaches affecting consumer data are notoriously common for businesses. In 2017, for instance, credit reporting agency…
Reporting Web Services Data Using KV Store Operations
Scenario In one of our customer implementations, one requirement was to pull data from a web service as…
Predictions for IT Trends in 2020 and Beyond
Technological advancements are coming at us at an alarming rate, and they come with benefits and risks that…
Debunking the Myth That Splunk is Too Expensive for Small Businesses
For years, Splunk’s reputation involved being only accessible to large enterprises with substantial budgets. A large part of…
Cloud Migration: What You Need to Know to Make Your Migration Successful
Cloud technology isn’t a new concept anymore—but still—some companies are delaying their migration in favor of inefficient legacy…
Solsys @ Splunk .conf19: What We Learned
Converting massive amounts of data into tangible business benefits has always been a primary challenge for the digital…
Solsys Signs New Cloud Integration Partnership With IBM
New partnership will improve delivery and integration of cloud technology Toronto, ON, October, 2019 – Solsys announced today…
The Importance of APIs for Your Business
Collaborating with others can help companies create new business opportunities, gain competitive advantage and foster innovation. Coupled with…
Are You Leveraging Predictive Analytics to Modernize Your IT Monitoring?
IT operations provide the necessary infrastructure that businesses rely on to reliably offer their core services. But managing…
Solsys’ Azure EventHub Application
Solsys is a technology service organization delivering business and technology services to Canadian market leaders. Solsys delivers agile…
What’s a Drop in the Bucket Worth to Your Company?
Candy giant Hershey saves millions of dollars per year by monitoring and measuring the tiniest drops of sweet…
Securing Enterprise API’s – the core of API Management
Those poor Kardashians. Although they already have more media exposure than any family could wish for, a few…
2019 Predictions for Cloud, IAM and Digital Intelligence
What will 2019 bring? Although no one knows for certain, it never stops IT analysts, researchers and pundits…
How to Manage the Cost, Performance and Security of Multi-Clouds
Do you have a clear view of what’s going on in your company’s cloud services? If your business…
Is Your Organization Prepared for Insider Threats?
Utilizing the power of Splunk combined with identity and access management solutions can prevent security breaches before they…
No post found