monitoring

Agent vs Agentless Monitoring: Why We Chose Agentless

This post was originally published by upguard. When we set out to create a cloud-based tool for configuration monitoring, we used the tools we knew and wrote UpGuard using JRuby. For our application, JRuby had many good qualities: getting started only required a one line install, the agent only needed to talk out on port […]

How to run configuration security monitoring scans with Halo

This post was originally published here by leslie devlin. Building off our first configuration security monitoring (CSM) tutorial, today we’re diving into how to run a CSM scan in the Halo interface and examine the results. If you followed the above link, you will notice that our previous explainer video showed you how to clone a […]

Share this page