ITOps Times Open-Source Project of the Week: Kubesploit

CyberArk recently announced a new open-source project, Kubesploit, for testing Kubernetes environments. The goal of the project is to assist pen testers with performing comprehensive security assessments that mimic real-world attack scenarios, CyberArk explained.  “To help protect Kubernetes clusters from attacks, we need to face the technology and the organizations being targeted. Yet, most of …

Aiden logo

ITOps Times news digest: Aiden launches, HighByte Intelligence Hub version 1.4, VMware’s container workload protection

Aiden emerged from stealth today with the release of its DevOps for Windows solution, which will enable companies to automate their endpoint management processes. According to the company, its solutions will help bridge the gap between security and IT and enable teams to patch and deploy software, firmware, and drivers to Windows devices.  “IT teams …

Report: digital transformation initiatives are causing increased adoption of SRE in ITOps

A new study found that the increased need for process automation and SREs has been fueled by companies’ increase in digital transformation initiatives as well as remote and hybrid work policies.  Industries have seen a 90% increase in customer-affecting issues and 68% of businesses reported an increased cost of downtime since the pandemic began.  Now, …

Puppet launches cloud-native workflow automation platform: Relay

Puppet’s cloud-native workflow automation solution Relay is moving out of its public beta and into general availability this week. Relay is designed for CloudOps teams building and sharing automated workflows. With Relay, they can now share workflows in minutes and ensure hybrid cloud environments are secure and compliant, the company explained.  According to Puppet, managing …

Latest News

ITOps Times news digest: Gluware’s intelligent network automation capabilities, Threat Stack and Liquid Web partnership, and Ensono acquires Amido

Gluware has announced new intelligent network automation capabilities for Cisco SD-WAN and Cisco Meraki. New capabilities include the ability to securely automate complex deployments, so customers will now be able to automate networks without significant time or resources to build infrastructure.  “As more enterprises move to the public cloud, they find that legacy processes and …

ITOps Times Open-Source Project of the Week: Kubestr

Kasten by Veeam announced a new community project to help DevOps and PlatformOps optimize Kubernetes storage resources. Kubestr is an open-source project designed to evaluate Kubernetes cluster storage configurations and performance.  While the introduction of Container Storage Interface (CSI) has enabled more cloud-native storage offerings, the company explained there is an overwhelming amount of options …

ITOps Times news digest: Consul-Terraform-Sync, Platform9’s new managed Kubernetes offering, and Ericsson Open Lab

HashiCorp has announced the release of Consul-Terraform-Sync. The solution is part of the company’s larger Network Infrastructure Automation solution.  IT operators can define a set of tasks that Consul-Terraform-Sync then executes whenever a new service is registered or deregistered with Consul. Example tasks include applying firewall policies and updating load balancer member pools.  The solution …

VMware Cloud platform launches to give more flexibility over modernization efforts

VMware has announced the release of its new VMware Cloud platform. According to the company, this new offering will enable developers to build and deploy to any cloud, and provide IT with capabilities for modernizing infrastructure and operations.  “We are on the cusp of the next evolution of cloud and apps. Architectures are becoming distributed …

Cisco Live: Cisco Plus, improved endpoint protection, and more

Cisco announced a number of new updates at its Cisco Live! event, which started on Monday. Here are a few highlights of new solutions, such as Cisco Plus and Duo passwordless authentication: Cisco Plus offers as-a-service models With Cisco Plus, customers will be able to pick and choose the solutions that best suit their needs.  …

ITOps Times news digest: Sysdig’s Cloud Security Posture Management, iSite’s Planned Maintenance module, and Accenture to acquire Cygni

Sysdig has announced the release of continuous cloud security posture management for AWS, which automatically discovers cloud services and flags misconfigurations and compliance violations. Cloud security posture management builds on Cloud Custodian, which is a cloud infrastructure security tool.  The company also announced support for cloud threat detection for AWS and GCP. Customers will be …

ITOps Times Open-Source Project of the Week: Red-Shadow

Cloud security provider Lightspin developed a new open-source scanner Red-Shadow that reports when user permissions are loosely defined, which opens up an attack path for hackers.  Lightspin released the scanner after it announced the results of its research that discovered a gap between AWS Identity and Access Management (IAM) user group policies that attackers can …

ITOps Times news digest: Red Hat OpenShift on AWS, TruSTAR and ServiceNow integration, and Elastic Observability 7.2

Red Hat has announced OpenShift is now available on AWS. Red Hat OpenShift on AWS (ROSA) will make it easier for OpenShift customers to build, scale, and manage containerized applications on AWS.  Key benefits include the ability to use familiar APIs and tools, pay-as-you-go pricing, and the elimination of the need to manage two vendor …

Report: Fusion of security and network planning is accelerating

The fusion of security and network planning has been accelerating over the past year, according to Aryaka’s recently released 2021 Global State of the WAN report. According to the report, almost a third of companies surveyed are already deploying secure access service edge (SASE) architectures. This close integration of networks and security will become even …

ITOps Times news digest: New Chef releases, Jumio funding, and DataStax partners with IBM

Progress has announced its first releases of Chef Enterprise Automation Stack (EAS) and Chef Infra Client since acquiring the company in October. The latest version of EAS include Chef Infra Compliance Phase, which allows users to automatically perform compliance audits during Chef Infra Client runs; Chef Infras State Management Dashboards, which allow users to view …

Learning Center

  • White Papers

    The Speed of Change: How Fast Are You?

    How fast is your IT? You need speed and adaptability to adjust as big changes in the global economy and our daily lives keep coming. Disruption is the status quo, and the “new normal” is not yet defined. Are you prepared for what’s next? What are IT organizations saying about it all? This spring, 2,200 …

  • White Papers

    Establish an incident management process like an IT Operations Pro

    Incident Management is an IT service management process intended to restore “normal” service operation as quickly as possible, while minimizing any adverse impact on business operations or the end user. To be successful, IT teams must promptly and effectively deal with all Incidents reported by users. So why is Incident Management important? The answer is …

  • White Papers

    2020 State of Incident Management Report

    See how over 500 organizations run their incident management process. Each company has its own version of an incident management process, and some are clearly better than others. Learn how world-class IT Operations and DevOps teams resolve incidents and see how your own internal process compares. …

  • White Papers

    The Gorilla Guide to Why Modern IT Requires Modern Disaster Recovery

    Protecting your data center is your top priority. But, you’re continually faced with the rise of new external threats. That means you need new tools to respond effectively and quickly. Read the Gorilla Guide to Why Modern IT Requires Modern Disaster Recovery, to see how you can improve your backup and disaster recovery strategy. We review the …

  • White Papers

    The Complete Ransomware Recovery Guide

    Using best practices for ransomware prevention, network intrusion, encryption, and anti-phishing tools, plus keeping all endpoints up to date with the latest security patches will put you in a good position to recover your data without paying a ransom. Download this guide to learn: Proactive ransomware prevention What to do when your systems are infected …

  • White Papers

    Observability: A Guide for Buyers

    You’ve likely heard the term observability being passed around for the past few years, and you might have assumed that it is just another marketing buzzword for monitoring. And you wouldn’t be alone in that thinking. Some experts would say that “observability”, “AIOPs” and “application Performance Monitoring (APM)” are just terms used to distinguish between …

ITOps Times Newswire

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!