Sequitur Labs announced two new options for its EmSPARK Security Solutions with both Base and Advanced packages that allows manufacturers to secure embedded designs for IoT protection. The Sequitur Labs product was essentially broken into two different offerings for people at different stages of their embedded security development. The Base package provides the essential security …
The Cloud Native Computing Foundation has identified top secrets management tools and trends based on its latest end user CNCF Technology Radar, which focused on secrets management in cloud-native settings. Typically CNCF’s Technology Radars gather feedback from the 140+ companies in the foundation’s End User Community to provide insights on tools used by that community. …
Google is adding new ways to work with its Google Kubernetes Engine (GKE) with a new operations solution for managed Kubernetes. GKE Autopilot manages infrastructure so teams can focus on their software. “Until now, Kubernetes still involved a fair bit of manual assembly and tinkering to optimize it for your needs,” Drew Bradstock, group product …
There is no denying that IT complexity increased in 2020 as IT organizations had to quickly transform to accommodate a distributed workforce. Though observability was already gaining traction, this increased complexity further made the case for observability. According to a newly released report from Cisco AppDynamics, 74% of respondents believe that gaining observability into their …
IBM announced the availability of Red Hat software on IBM Power Systems and new IBM Power Systems hardware. Red Hat OpenShift on IBM Power Virtual Server leverages OpenShift’s bare metal installer, Red Hat Runtimes, and newly certified Red Hat Ansible Content Collections. Also, the new IBM Private Cloud Rack Solution provides clients with an optimized, …
Log management company Humio has announced a new log management certification course. The course is divided into six one-hour sessions that will take place between March 4 and April 22. Topics covered will include log management planning and design, centralized log collection, security integration, threat management and forensics using log data, system observability, and cost …
ClusterDuck Protocol is an open-source firmware for wireless IoT devices to build communications, sensors, and custom networks. The ClusterDuck Protocol (CDP) was created by Project OWL in response to the breakdown of communication following Hurricane Maria which destroyed cell towers and generators. The project was built to restore the 1% of communication that is essential …
Grafana Labs has announced the release of Grafana Enterprise Stack, which is an observability platform. The new solution includes Grafana Enterprise, Enterprise Metrics, and Enterprise Logs, which is a log aggregation solution based on Loki. “At Grafana Labs, we’re committed to providing our customers with the choice between cloud-based observability in Grafana Cloud, or the …
Moogsoft and Datadog have announced a new partnership that will provide IT teams with better insights into incidents. The new integration, which is available through the Datadog Marketplace, allows IT teams to view metrics and events collected by Datadog in the Moogsoft Observability Cloud. Customers will be able to use the integration to better understand …
Datadog has announced the acquisition of two companies to help bolster its security and observability portfolio. It is acquiring Sqreen for its cloud security capabilities, and Timber for its data observability capabilities. Sqreen provides capabilities that help companies detect, block, and respond to attacks on the application level. According to Datadog, application security can be …
Juniper Networks is hoping to bring “Experience-First Networking” to the industry with the release of Juniper Paragon Automation. Experience-First Networking comes from the idea that when tools and processes break, consumers are the first to realize — often even before the network operators know something has gone wrong. According to Juniper, this issue isn’t an …
This week’s featured project of the week is pfSense, a free network firewall distribution. It is based on the FreeBSD operating system, includes a custom kernel and provides the same or more functionality of common commercial firewalls with no artificial limitations. It is currently used around the world from companies like Check Point, Cisco PIX, …
VMware and Accenture have announced that they have expanded their current partnership. Accenture is launching a new business group at VMware aimed at helping companies with their digital transformations. Specific benefits of the new group include accelerated transformation, increased IT efficiency, reduced IT operating costs, result-driven engagement, and the ability to unlock power in data …
FogHorn and IBM have announced a collaboration that will bring together FogHorn’s edge capabilities with IBM’s cloud capabilities. “With computing done in so many places—on public and private clouds and the edge–the challenge that businesses face is to connect all these different elements into a cohesive, end-to-end platform,” said Chris Penrose, chief operating officer at …
How fast is your IT? You need speed and adaptability to adjust as big changes in the global economy and our daily lives keep coming. Disruption is the status quo, and the “new normal” is not yet defined. Are you prepared for what’s next? What are IT organizations saying about it all? This spring, 2,200 …
Incident Management is an IT service management process intended to restore “normal” service operation as quickly as possible, while minimizing any adverse impact on business operations or the end user. To be successful, IT teams must promptly and effectively deal with all Incidents reported by users. So why is Incident Management important? The answer is …
See how over 500 organizations run their incident management process. Each company has its own version of an incident management process, and some are clearly better than others. Learn how world-class IT Operations and DevOps teams resolve incidents and see how your own internal process compares. …
Protecting your data center is your top priority. But, you’re continually faced with the rise of new external threats. That means you need new tools to respond effectively and quickly. Read the Gorilla Guide to Why Modern IT Requires Modern Disaster Recovery, to see how you can improve your backup and disaster recovery strategy. We review the …
Using best practices for ransomware prevention, network intrusion, encryption, and anti-phishing tools, plus keeping all endpoints up to date with the latest security patches will put you in a good position to recover your data without paying a ransom. Download this guide to learn: Proactive ransomware prevention What to do when your systems are infected …
You’ve likely heard the term observability being passed around for the past few years, and you might have assumed that it is just another marketing buzzword for monitoring. And you wouldn’t be alone in that thinking. Some experts would say that “observability”, “AIOPs” and “application Performance Monitoring (APM)” are just terms used to distinguish between …