Network automation – To plan or not to plan is the question

“A man who does not plan long ahead will find trouble at his door.” – Confucius As the network evolves into a more dynamic environment due to the introduction of new concepts such as virtualization and software-defined everything, it is becoming imperative that operators automate as much as possible. Whether it be software-defined WAN, data …

IT Ops news digest: OpenPOWER comes to the Linux Foundation, Storj Labs V3 beta, and Sisense cloud-native architecture

IBM has announced the OpenPOWER Foundation will move under the Linux Foundation. The foundation believes in collaboration with the open-source community to advance open hadware technology and accelerate opportunity.  In addition, the company is opening the POWER Instructuion Set Architecture to help hardware and software work together on POWER. IBM will also contribute other technologies …

Splunk to acquire cloud monitoring company SignalFx for $1.05 billion

Splunk is taking its cloud offerings to new heights with the acquisition of real-time cloud monitoring for infrastructure, microservices, and applications solution provider SignalFx. The company has agreed to acquire SignalFx for approximately $1.05 billion.  According to Splunk, once the deal closes it will be focused on APM at every stage of an organization’s cloud …

Report: 94 percent of ITSM personnel aren’t fully integrated into DevOps

While the burgeoning of DevOps environments in enterprises has brought development teams together and sped up software delivery, only 6 percent of IT service management personnel state that they are fully involved in their company’s DevOps activities and ambitions, according to a survey by Sysaid. This number is down from the 13 percent who felt …

Latest News

Puppet releases vulnerability remediation solution for IT Ops teams

Infrastructure automation and delivery provider Puppet is giving IT teams the ability to find, prioritize and remediate mission-critical vulnerabilities with the announcement of Puppet Remediate. The new vulnerability remediation solution aims to reduce the time it takes to detect vulnerabilities, and enable immediate action without agent technology on the vulnerable systems.  According to Forrester, 58 …

Report: Companies underestimate the challenges of deploying a SD-WAN

Companies are struggling to fully understand the cost, complexity, and time it will take to build and maintain an SD-WAN. A new report revealed even when companies are working with an operator to get it set up there are still many challenges. Aryaka’s 2019 State of the WAN report surveyed 795 IT and network practitioners …

IT Ops Times news digest: CNCF archives rkt, Rancher Labs Platinum Partner Program, and Singularity Enterprise

The Cloud Native Computing Foundation (CNCF) announced it has voted to archive the rkt project. The project is an application container engine that was developed by CoreOS for cloud-native environments. According to the CNCF, while rkt was popular when it was created in December 2014, user adoption has severely declined.  CNCF hosts other container runtime …

Shadow IT doesn’t have to be as dark as it sounds

It’s no secret that IT teams are overwhelmed. Sometimes they don’t have the time or resources required to get everything that needs to be done done. And when employees have to wait long periods of time for IT to approve something, sometimes they decide to take IT matters into their own hands.  Shadow IT is …

ITOps Times Open-Source Project of the Week: Open vSwitch

Open vSwitch is a virtual switch designed to allow for massive network automation. It can support distribution across multiple physical servers.  According to the team, the project can operate as a soft switch that runs within the hypervisor and the control stack for switching silicon.  Currently a Linux Foundation project, Open vSwitch is used in …

Report: 1 in 7 organizations suffer from lateral phishing attacks

Email phishing is nothing new, but lateral email phishing is continuing to grow and evolve. Lateral phishing occurs when an attacker is able to compromise an internal email address and send phishing attacks. Because it looks like the email is coming from a trusted source, it can be hard for organizations to defend against it.  …

ITOps Times news digest: NS1 and Salesforce’s DNSSEC implementation, StackRox Kubernetes Security Platform now on GCP Marketplace, and Ipswitch WhatsUp Gold 2019.1

NS1 and Salesforce have announced that they have collaborated on the first implementation of multi-signer DNSSEC. This enables the cryptographic signing of DNS records across zones with multiple DNS platforms. According to NS1, DNSSEC prevents DNS spoofing and cache-poisoning attacks. They believe that this implementation is well-timed because cybercriminals have been increasingly targeting DNS lately. …

Protect Against Cyberattacks with a Digital Stoplight

Crime no longer is confined to seedy back alleys or only takes place during the dead of night; the internet has become a playground for cybercriminals who don’t have the constraints of time or location. Cybercrime has seen a significant increase in recent years, and along with that has come growing damage recovery costs. The …

Cloudflare’s Magic Transit aims to make networks smarter and more secure

Cloudflare has announced a new tool meant to simplify IT operations. Magic Transit is a new networking solution that brings the benefits of Cloudflare’s network to its customers’ on-premise and data center networks.  Specific benefits of Magic Transit include Layer 3 DDos mitigation, improved performance, and lower total cost of ownership.  Deployed in front of …

ITOps Times news digest: Barracuda acquires InfiSecure, Kontena Lens generally available, and ManageEngine adds two-factor authentication for macOS logins

Security company Barracuda has announced its acquisition of InfiSecure. With this acquisition, Barracuda will now be able to expand its bot protection capabilities. Barracuda plans on combining this new technology with data points from its Global Threat Intelligence Infrastructure. Together, the two technologies will be able to identify and block advanced bots, Barracuda explained. “This …

Learning Center

  • White Papers

    Pay the price to mitigate ransomware attacks

    Ransomware attacks against organizations are on the rise, and one study puts the cost of downtime at $8 billion! But your applications and data don’t have to be held hostage. When an attack is discovered, the goal is to minimize further infection and restore to a safe state as quickly as possible (low RTO). Read this …

  • Webinars

    Breakthroughs and Best Practices in Disaster Recovery

    Wednesday, August 21,2019 at 1:00 pm E.T. Disaster Recovery (DR) has never been more important. Natural disasters such as hurricanes, wildfires, and floods are on the rise. According to the U.S. National Oceanic and Atmospheric Administration the total cost of last year’s natural disasters was approximately $91 billion. FEMA has stated, “the need for forward-leaning …

  • White Papers

    Monitoring your network with time-series data

    Today’s applications are architectured to work on hybrid, componentized, containerized, distributed, mobile/sensor environments, and so do the networks that sustain all these applications together. Complexity, traffic volume, intolerance to performance degradation and inefficiency will only increase, demanding real-time and holistic monitoring. …

  • White Papers

    Container Security: More moving parts mean more complexity

    Securing containerized applications is quite a bit more challenging than securing traditional monolithic applications. The use of open-source components in code, the microservices within containers, and the containers themselves, all need to be secure to ensure vulnerabilities do not make their way into the deployed application. This guide to container security looks at the issue …

  • White Papers

    Application Performance Management: A Guide for Buyers

    Changes in software architecture and transition to the cloud have forced the way organizations monitor their applications to change as well. Because of increased complexity of applications — code written in-house, couple with services brought in via APIs, scaling in the cloud, much more data being processed — APM has become more important than ever. …

ITOps Times Newswire

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!