Blog

June 10, 2022 | by James Truslow
Incident Response Systemd

Crossing “The Last Mile” with an Incident Response System

IT Teams Are Losing in the “The Last Mile” For IT organizations, the last mile is the all-important final communication relaying automated notifications of system failure to the human team members who can solve them. Despite advances in monitoring technology, your IT team could still be losing in the last mile without an incident response … Continued

read more
June 3, 2022 | by Ritika Bramhe
xmatters alternatives

Evaluating xMatters Alternatives in 2024 (Updated)

(Blog Updated on July 22, 2024): Seconds count when mission-critical IT systems break down. Customers are accustomed to seamless experiences, and any impact on the end-user experience due to system breakdown can drive them away. In parallel, the digital technology estate is becoming increasingly complex as organizations continue to grow their tech stack to bring … Continued

read more
June 1, 2022 | by Ritika Bramhe

Email & SMS: Not Good Enough for IT Monitoring

Are you an IT Administrator staring at your phone’s screen all day waiting for an email or text?  Have you ever missed a CRITICAL email or text because it didn’t grab your attention? Using email and SMS for network alerts has been a widely used practice since the early 90’s, but is not an effective … Continued

read more
May 3, 2022 | by Ritika Bramhe
SIEM tools

SIEM: Introduction to SIEM and 4 Top SIEM Tools

Security Information and Event Management (SIEM) technology has become a fundamental part of identifying and guarding against cyber attacks. It is one of the essential technologies powering the modern security operations center (SOC). SIEM is an umbrella term that includes multiple technologies, including log management, security log aggregation, event management, event correlation, behavioral analytics, and … Continued

read more
March 21, 2022 | by Christopher Gonzalez
HIMSS 2022

Top 5 Takeaways From HIMSS 2022

The HIMSS 2022 conference, hosted in Orlando, was an enjoyable, insightful experience with sessions that covered many healthcare topics, such as business operations, data and information, care delivery, policy and technology. Education sessions were led by renowned thought leaders who examined challenges and trends in modern healthcare. Here are five takeaways from our HIMSS 2022 … Continued

read more
March 10, 2022 | by Ritika Bramhe
handoff communication

Handoff Communication in Healthcare

Handoff communication occurs when a patient is transitioned from one care setting to another. Communication is central to handoffs, and clinical staff are expected to share comprehensive details about the patient’s health to the next care provider in charge. During handoff, sensitive information is passed in real time to another care provider during changes in … Continued

read more
March 9, 2022 | by Christopher Gonzalez
Azure Sentinel

What Is Microsoft Azure Sentinel and Why Is It Important?

Microsoft Azure Sentinel is an intelligent, next-generation security information and event management (SIEM) solution designed to detect threat anomalies. Azure Sentinel is also categorized as a security orchestration automated response (SOAR) service that expedites the incident detection and event response process for cybersecurity teams. Azure Sentinel provides an extra layer of security to protect critical … Continued

read more
February 25, 2022 | by OnPage Corporation
Forbes Technology Council

Judit Sharon Accepted Into Forbes Technology Council

Forbes Technology Council Is an Invitation-Only Community for World-Class CIOs, CTOs and Technology Executives.   WALTHAM, Mass., Feb. 25, 2022 — Judit Sharon, founder and CEO of OnPage Corporation, a Boston-based incident alert management and pager replacement company, has been accepted into Forbes Technology Council, an invitation-only community for world-class CIOs, CTOs and technology executives. Sharon was … Continued

read more
February 24, 2022 | by OnPage Corporation
endpoint detection

Can Endpoint Protection Keep up With Modern Threats?

Endpoint protection is a security approach that focuses on monitoring and securing endpoints, such as desktops, mobile devices, laptops, and tablets. It involves deploying security solutions on endpoints to monitor and protect these devices against cyber threats. The goal is to establish protection regardless of the endpoint’s location, inside or outside the network. In this … Continued

read more
February 23, 2022 | by Ritika Bramhe
Cloud Incident Management

Cloud Incident Management Guide

Cloud Incident Management – An Introduction It is a well-established fact that companies looking to grow in the digital age can facilitate this mission by adopting the cloud. When pursued with the right intent and implementation strategy, cloud adoption acts as a powerful force multiplier, yielding a cutting-edge IT powerhouse for businesses and helping them … Continued

read more

OnPage