Sequitur Labs expands EmSPARK Security Suite with Base and Advanced packages

Sequitur Labs announced two new options for its EmSPARK Security Solutions with both Base and Advanced packages that allows manufacturers to secure embedded designs for IoT protection. The Sequitur Labs product was essentially broken into two different offerings for people at different stages of their embedded security development.  The Base package provides the essential security …

CNCF Technology Radar provides recommendations for tools for secrets management

The Cloud Native Computing Foundation has identified top secrets management tools and trends based on its latest end user CNCF Technology Radar, which focused on secrets management in cloud-native settings.  Typically CNCF’s Technology Radars gather feedback from the 140+ companies in the foundation’s End User Community to provide insights on tools used by that community. …

GKE Autopilot takes managed Kubernetes to new heights

Google is adding new ways to work with its Google Kubernetes Engine (GKE) with a new operations solution for managed Kubernetes. GKE Autopilot manages infrastructure so teams can focus on their software.  “Until now, Kubernetes still involved a fair bit of manual assembly and tinkering to optimize it for your needs,” Drew Bradstock, group product …

Report: Observability to be a key challenge in 2021

There is no denying that IT complexity increased in 2020 as IT organizations had to quickly transform to accommodate a distributed workforce. Though observability was already gaining traction, this increased complexity further made the case for observability.  According to a newly released report from Cisco AppDynamics, 74% of respondents believe that gaining observability into their …

Latest News

Red Hat software now available on IBM Power Systems

IBM announced the availability of Red Hat software on IBM Power Systems and new IBM Power Systems hardware. Red Hat OpenShift on IBM Power Virtual Server leverages OpenShift’s bare metal installer, Red Hat Runtimes, and newly certified Red Hat Ansible Content Collections. Also, the new IBM Private Cloud Rack Solution provides clients with an optimized, …

ITOps Times news digest: Humio’s log management course, Platform9 raises $12.5 million, and cloudtamer.io announces integration with AWS Control Tower

Log management company Humio has announced a new log management certification course. The course is divided into six one-hour sessions that will take place between March 4 and April 22. Topics covered will include log management planning and design, centralized log collection, security integration, threat management and forensics using log data, system observability, and cost …

ITOps Times Open-Source Project of the Week: ClusterDuck Protocol

ClusterDuck Protocol is an open-source firmware for wireless IoT devices to build communications, sensors, and custom networks.  The ClusterDuck Protocol (CDP) was created by Project OWL in response to the breakdown of communication following Hurricane Maria which destroyed cell towers and generators. The project was built to restore the 1% of communication that is essential …

ITOps Times news digest: Grafana Enterprise Stack, Solo.io Gloo Mesh Enterprise, and StorCentric QV1020

Grafana Labs has announced the release of Grafana Enterprise Stack, which is an observability platform. The new solution includes Grafana Enterprise, Enterprise Metrics, and Enterprise Logs, which is a log aggregation solution based on Loki.   “At Grafana Labs, we’re committed to providing our customers with the choice between cloud-based observability in Grafana Cloud, or the …

ITOps Times news digest: Moogsoft and Datadog’s extended partnership, Strata Series A, and Pure Storage and Komprise partnership

Moogsoft and Datadog have announced a new partnership that will provide IT teams with better insights into incidents. The new integration, which is available through the Datadog Marketplace, allows IT teams to view metrics and events collected by Datadog in the Moogsoft Observability Cloud.  Customers will be able to use the integration to better understand …

Datadog to acquire new security and observability companies

Datadog has announced the acquisition of two companies to help bolster its security and observability portfolio. It is acquiring Sqreen for its cloud security capabilities, and Timber for its data observability capabilities.  Sqreen provides capabilities that help companies detect, block, and respond to attacks on the application level. According to Datadog, application security can be …

Juniper Paragon Automation enables “Experience-First Networking”

Juniper Networks is hoping to bring “Experience-First Networking” to the industry with the release of Juniper Paragon Automation. Experience-First Networking comes from the idea that when tools and processes break, consumers are the first to realize — often even before the network operators know something has gone wrong. According to Juniper, this issue isn’t an …

ITOps Times Open-Source Project of the Week: pfSense

This week’s featured project of the week is pfSense, a free network firewall distribution. It is based on the FreeBSD operating system, includes a custom kernel and provides the same or more functionality of common commercial firewalls with no artificial limitations.  It is currently used around the world from companies like Check Point, Cisco PIX, …

ITOps Times news digest: VMware and Accenture expand partnership, GigaSpaces InsightEdge Portfolio 15.8, and Diamanti Central free trial

VMware and Accenture have announced that they have expanded their current partnership. Accenture is launching a new business group at VMware aimed at helping companies with their digital transformations.  Specific benefits of the new group include accelerated transformation, increased IT efficiency, reduced IT operating costs, result-driven engagement, and the ability to unlock power in data …

ITOps Times news digest: FogHorn and IBM collaboration, Jetstack Secure, and SentinelOne acquires Scalyr

FogHorn and IBM have announced a collaboration that will bring together FogHorn’s edge capabilities with IBM’s cloud capabilities.  “With computing done in so many places—on public and private clouds and the edge–the challenge that businesses face is to connect all these different elements into a cohesive, end-to-end platform,” said Chris Penrose, chief operating officer at …

Learning Center

  • White Papers

    The Speed of Change: How Fast Are You?

    How fast is your IT? You need speed and adaptability to adjust as big changes in the global economy and our daily lives keep coming. Disruption is the status quo, and the “new normal” is not yet defined. Are you prepared for what’s next? What are IT organizations saying about it all? This spring, 2,200 …

  • White Papers

    Establish an incident management process like an IT Operations Pro

    Incident Management is an IT service management process intended to restore “normal” service operation as quickly as possible, while minimizing any adverse impact on business operations or the end user. To be successful, IT teams must promptly and effectively deal with all Incidents reported by users. So why is Incident Management important? The answer is …

  • White Papers

    2020 State of Incident Management Report

    See how over 500 organizations run their incident management process. Each company has its own version of an incident management process, and some are clearly better than others. Learn how world-class IT Operations and DevOps teams resolve incidents and see how your own internal process compares. …

  • White Papers

    The Gorilla Guide to Why Modern IT Requires Modern Disaster Recovery

    Protecting your data center is your top priority. But, you’re continually faced with the rise of new external threats. That means you need new tools to respond effectively and quickly. Read the Gorilla Guide to Why Modern IT Requires Modern Disaster Recovery, to see how you can improve your backup and disaster recovery strategy. We review the …

  • White Papers

    The Complete Ransomware Recovery Guide

    Using best practices for ransomware prevention, network intrusion, encryption, and anti-phishing tools, plus keeping all endpoints up to date with the latest security patches will put you in a good position to recover your data without paying a ransom. Download this guide to learn: Proactive ransomware prevention What to do when your systems are infected …

  • White Papers

    Observability: A Guide for Buyers

    You’ve likely heard the term observability being passed around for the past few years, and you might have assumed that it is just another marketing buzzword for monitoring. And you wouldn’t be alone in that thinking. Some experts would say that “observability”, “AIOPs” and “application Performance Monitoring (APM)” are just terms used to distinguish between …

ITOps Times Newswire

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!