Transform your API Management Practice with SOLSYS’ API Strategy Workshop

Resource Library

oswap 2023 top 10 explained

OSWAP 2023 Top 10 Explained

What is OWASP? OWASP is the “Open Web Application Security Project.” It is a non-profit organization that focuses…
enabling agile systems featured

Service-Minded Security: Enabling Agile Teams in a DevSecOps World

Organizational transformation affects teams in every specialization. More than ever, organizations are transforming towards Agile and DevOps Product…
governance

From Data Trails to Governance Tales: The Critical Role of Transaction Logging in API Governance

APIs (Application Programming Interfaces) are the backbone of software systems, enabling applications to communicate with each other seamlessly…
splunk cluster migration featured

Lessons Learned from a Splunk Cluster Hardware Migration

There are many reasons why you may choose to migrate hardware within your Splunk cluster. These could include aging…
Instrumenting Applications for Enhanced Observability

Instrumenting Applications for Enhanced Observability

Being able to observe applications is not just about debugging specific issues, but also about being able to…
splunk-launch.conf

Harnessing the Power of splunk-launch.conf to Customize Your Splunk Environment

Splunk, the industry-leading platform for real-time operational intelligence, helps organizations collect, analyze, and visualize their machine data. When…
boomi alliance featured

Solsys Embarks on a Strategic Alliance with Boomi, a Gartner Magic Quadrant Leader in Integration Platform as a Service

TORONTO, ONTARIO, CANADA,November 15, 2023 /Read the full press release at EINPresswire Solsys, a pioneer in API Management…
shield your apis from attack

Top Practices to Shield Your APIs from Attack!

In today’s rapidly evolving digital landscape, software serves as the cornerstone of organizational success. The nature of modern…
solsys labs

Solsys Labs – Practical Learning for Applicable Success

“Let me show you what that looks like,” is a powerful phrase when it comes to showcasing technology. …
shield your apis from attack

Practices to Shield Your APIs from Attack

Did you know that 50% of organizations have experienced an API Security incident in the past 12 months?*…
protect your data from bots

Are You Protecting Your Data From Bots

In today’s world, bots are becoming increasingly common.  In fact, in 2022 bots made up more than 40%…
leveraging chatp gpt

Leveraging GEN AI for Splunk Development

By: Marek Suchomski AI has been in the forefront of technology news headlines for the past several months. …
best practices to shield apis

15 Practices to Shield APIs from Attack: #8 – And Finally, Getting Started

In this series we have looked at 15 practices to shield your APIs from attack, and shown how…
attack data

How to Proactively Detect Attacks: Using Splunk Attack_Data to Simulate Attacks

With data breaches negatively impacting business costs year over year, many companies are turning to advanced techniques to…
api security

15 Practices to Shield APIs from Attack: #7 – OWASP Top 10, Injection

Every few years, the Open Worldwide Application Security Project (OWASP) updates its top attack vectors. To illustrate how our…
kong

How Kong Gateway’s Rate Limiting Plugin Can Protect Your Organization from DDoS Attacks

By Nicky Carlisle Distributed Denial of Service (DDoS) attacks are a growing concern for organizations of all sizes with…
security lock

15 Practices to Shield APIs from Attack: #6 – OWASP Top 10, Cryptographic Failures

Every few years, the Open Worldwide Application Security Project (OWASP) updates its top attack vectors. To illustrate how our…
api security

15 Practices to Shield APIs from Attack: #5 – OWASP Top 10, Broken Access Control

Every few years, the Open Worldwide Application Security Project (OWASP) updates its top attack vectors. To illustrate how our…
essential startup tools

15 Practices for Shielding Your APIs from Attack: #4 – Tools & Systems

This post shares experiences from our multi-year journey working with a Canadian client to help them improve their…
what is owasp security

15 Practices for Shielding Your APIs from Attack: #3 – Concepts, Cryptography, & Credentials

This post shares experiences from our multi-year journey working with a Canadian client to help them improve their…
shield apis from attack

15 Practices for Shielding Your APIs from Attack: #2 – Teams & Tests

This post shares experiences from our multi-year journey working with a Canadian client to help them improve their…
shield your apis from attack

15 Practices for Shielding Your APIs from Attack: #1 – APIs at Risk

One of our customers, a leader in the Canadian Telecom Market, found that the need for a single…
there's a lot to keep track of in modern software

Leveraging Splunk’s Toolkit to Begin Mastering Observability

By: Marek Suchomski Splunk’s recent acquisition of SignalFX introduced Splunk Observability Cloud as a powerful new tool in…
telecom saves money with api

North American Telecom Leader Saves $3 Million+ Annually by Migrating to Next-generation API Connectivity

North American Telecom Leader saves 3 Million+ annually by migrating to next generation API connectivity We help businesses…
why you need observability

Why you need Observability-as-Code

By Nicky Carlisle As IT professionals, one of the key considerations in our field is how to effectively…
convergence of observability and security

Convergence of Observability and Security

The Benefits and Approaches to Better and Safer Applications and Services What kind of information needs to be…
AWS and cloud monitoring

Observability & Security: The Benefits and Approaches to Better and Safer Applications and Services

Observability and Security are undoubtedly related. Security exposures and compromises happen in the dark, where no one is…
yielding optimized splunk results

Yielding Optimized SPL Using TERM()

By Leor Roynsky SPL (Splunk Processing Language) is the fundamental way through which users interact with data in…
cloud computing

Splunk Cloud & Product Thinking

In part one of this post, we talked about Product Thinking, what it is, and why it’s valuable…
cybersecurity

Splunk as a Product Enabler for Security

In part one of this post, we talked about Product Thinking, what it is, and why it’s valuable…
splunk as a product

Splunk as a Product Enabler for Observability

In part one of this post, we talked about Product Thinking, what it is, and why it’s valuable…
splunk as a product

Thinking about Splunk as a Product

What is Product Thinking and How Does it Relate to Splunk? In this blog, the first of a…
agile delivery

Why Agile Works

Through my continued association with the Toronto agile community and as an organizer with the AgileTO meetup team…
esi logo

ESI Technologies Welcomes Solsys to its Family of Affiliated Companies

Toronto, ON, May 25, 2021 – ESI Technologies announces today an important partnership and significant investment in Solsys…
api

A Coherent API Lifecycle Management Strategy

Without your CIO establishing a coherent API strategy, APIs are just another middleware software lacking any transformational value…
telecome api economy

Telecom – API Economy in the COVID World

It has been more than a year living through COVID where we have witnessed significant uptick in digital…
api gateways

The Case for API Gateway Self Service

Your API GW (or Gateways) are hard at work in your organization, securely sharing APIs or services to…
solsys and kong

Solsys and Kong Announce Strategic Partnership

At Solsys, we build data-driven solutions to enable Digital Transformation for large enterprises. We are a premier consulting…
importance3 of apis in the travel industry

The Importance of APIs in the Online Travel Industry

There was a time when booking a trip meant going to a travel agent or directly to the…
hide code

A Quick Guide to Hiding Certain Splunk Fields

Alerts must be sent to the monitoring teams, but fields with sensitive information cannot be included. In a…
ip security

Fraud Management: Identifying and Alerting for an IP Threat

Scenario Data breaches affecting consumer data are notoriously common for businesses. In 2017, for instance, credit reporting agency…
reporting web services

Reporting Web Services Data Using KV Store Operations

Scenario In one of our customer implementations, one requirement was to pull data from a web service as…
it trends

Predictions for IT Trends in 2020 and Beyond

Technological advancements are coming at us at an alarming rate, and they come with benefits and risks that…
splunk for smb

Debunking the Myth That Splunk is Too Expensive for Small Businesses

For years, Splunk’s reputation involved being only accessible to large enterprises with substantial budgets. A large part of…
cloud migration

Cloud Migration: What You Need to Know to Make Your Migration Successful

Cloud technology isn’t a new concept anymore—but still—some companies are delaying their migration in favor of inefficient legacy…
conference

Solsys @ Splunk .conf19: What We Learned

Converting massive amounts of data into tangible business benefits has always been a primary challenge for the digital…
solsys new cloud deal

Solsys Signs New Cloud Integration Partnership With IBM

New partnership will improve delivery and integration of cloud technology Toronto, ON, October, 2019 – Solsys announced today…
importance of apis

The Importance of APIs for Your Business

Collaborating with others can help companies create new business opportunities, gain competitive advantage and foster innovation. Coupled with…
predictive analytics

Are You Leveraging Predictive Analytics to Modernize Your IT Monitoring?

IT operations provide the necessary infrastructure that businesses rely on to reliably offer their core services. But managing…
solsys azure event

Solsys’ Azure EventHub Application

Solsys is a technology service organization delivering business and technology services to Canadian market leaders. Solsys delivers agile…
analytics

What’s a Drop in the Bucket Worth to Your Company?

Candy giant Hershey saves millions of dollars per year by monitoring and measuring the tiniest drops of sweet…
securing enterprise apis

Securing Enterprise API’s – the core of API Management

Those poor Kardashians. Although they already have more media exposure than any family could wish for, a few…
predictions for tech in 2019

2019 Predictions for Cloud, IAM and Digital Intelligence

What will 2019 bring? Although no one knows for certain, it never stops IT analysts, researchers and pundits…
cloud

How to Manage the Cost, Performance and Security of Multi-Clouds

Do you have a clear view of what’s going on in your company’s cloud services? If your business…
visibility

Is Your Organization Prepared for Insider Threats?

Utilizing the power of Splunk combined with identity and access management solutions can prevent security breaches before they…

No post found

SOLSYS INC. © 2024 ALL RIGHTS RESERVED