Twistlock introduces hybrid cloud, Kubernetes and serverless capabilities in 18.11

Twistlock announced the latest release of its container and cloud-native security platform with new support and features for hybrid cloud, Kubernetes and serverless. This is the company’s 15th major release in the last three years. “Since we shipped the first version of Twistlock in 2015 we’ve worked on 11,100 issues, pushed 5,800 commits, built Twistlock …

premium Five considerations when moving toward cloud native

Building applications had rapidly become the easy part of development. Whether on the web or mobile, these applications need a place to live, and that place is constantly changing. From local servers in closets to colocation facilities to the cloud, we’ve seen rapid change over just the last few years. Now we have containers and …

Pivotal introduces Pivotal Function Service for serverless

Pivotal is the latest company to jump onboard with serverless technology with the alpha release of Pivotal Function Service (PFS). PFS is a function as a service platform built on Kubernetes and based on the open-source functions project riff. According to the company, PFS is the next step in the its cloud vision. “Today, each …

Spending on automating IT Ops is rising, though many aren’t prepared

Many CIOs and enterprise technology professionals aren’t prepared to automate their IT operations to meet business transformation initiatives, but a growing number are moving forward, based on projected spending. Various studies have made that point. A survey of 1,000 IT operations professionals worldwide who spend more than $500 million per year on infrastructure management, found …

Latest News

CMMI V2.0 expands to include services and supplier management

CMMI Institute has expanded Capability Maturity Model Integration (CMMI) V2.0 to include services and supplier management views, benchmark tools, and appraisal and performance measurement guidance. According to the company, this release will enable organizations to analyze their internal operations and measure themselves against best practices, pinpoint areas of improvement, and achieve higher performance. Other improvements …

Gartner explores IT security in first ever Magic Quadrant for Privileged Access Management

Gartner has revealed its first Magic Quadrant for Privileged Access Management (PAM). According to Gartner, PAM tools enable organizations to “provide secure privileged access to critical assets and meet compliance requirements by managing and monitoring privileged accounts and access.” Gartner predicts that by 2021, more than 50 percent of organizations that use DevOps will be …

Veritas brings NetBackup to containerized workloads

Enterprise data protection company Veritas has announced it’s bringing its enterprise data backup and recovery solution to Docker-certified containers. With a new containerized NetBackup client, users using version 8.1 or later can start using the solution to protect persistent application data, the company explained. “Years ago, most containers were designed to be transient or short-lived …

Gartner: The future of infrastructure is always on, always available

The future of IT infrastructure is about being always on, and always available, everywhere, according to a presentation by Gartner at its IT Infrastructure, Operations and Cloud Strategies, held this week in Las Vegas. With applications so critical to business today, any outage could spell disaster for those companies, according to a number of conference …

HashiCorp Vault reaches 1.0

After years of development, HashiCorp is finally ready to release HashiCorp Vault 1.0 to the public. According to the company, Vault was developed as a tool for managing secrets and protecting sensitive data within an application and/or infrastructure. The 1.0 release includes batch tokens, open-source cloud auto unseal, OpenAPI support, and an updated UI. “Vault …

Kubernetes suffers from security flaw

Yesterday, a critical security flaw impacting Kubernetes 1.10 and higher was discovered. The flaw, CVE-2018-1002105, was publicly disclosed by the Kubernetes community and reported through the Kubernetes vulnerability reporting process. According to Red Hat, the flaw could allow malicious actors or unapproved users to escalate privileges on Kubernetes installations, including the company’s own container solution …

Ansible unveils its roadmap for Ansible Engine, Ansible Tower, and Ansible Galaxy

The IT automation company Ansible dedicated today to automation with its Ansible Automates conference in NYC. Tim Appnel, senior product manager for Ansible Automation at Red Hat, took to the stage to lay out a roadmap for Ansible products. He said that there will be an increased focus on security automation. The new updates will …

Kubernetes 1.13 focuses on simplifying cluster management

The latest release of the container orchestration solution Kubernetes is now available. Kubernetes 1.13 is the fourth and final release of this year. The release focuses on simplified cluster management and makes CoreDNS the default DNS. “Kubernetes 1.13 has been one of the shortest releases to date at 10 weeks. This release continues to focus …

Report: A majority of companies cannot fill the cloud-native skills gap

As companies transition to a cloud-native model, many are struggling to find talent for technical roles. According to OpsRamp’s recent Cloud Skills Survey, this skills gap crisis is inhibiting innovation, impacting productivity, and affecting revenue growth. Of those that responded to the survey, 94 percent stated that they struggled to find candidates with the right …

Envoy graduates from CNCF

The Cloud Native Computing Foundation (CNCF) has announced Envoy is the third project to graduate from its foundation. Envoy is an open-source edge and service proxy for cloud-native apps. The only other two projects to currently have graduated from CNCF are Kubernetes and Prometheus. According to CNCF, graduation makes a maturity level for projects that …

Learning Center

  • White Papers

    A Microservices Reference Architecture

    There are many different approaches to implementing microservices. Many of them or specific to the needs of individual development teams. A model can make it easier for those teams to develop and deliver their own microservices-based applications. This eBook offers a microservices reference architecture that includes a set of models you can use to create …

  • White Papers

    Container Networking: From Docker to Kubernetes

    You’ve built your first containerized application, and now you want to connect it to another container that, say, has a database. And, you don’t want to have to do the manual work of launching the containers and checking to see if they’re still running.. and if not, relaunching them. It’s at this point that you …

  • Webinars

    Leveraging Containers for Improved Security

    RECORED EVENT: As containers become commonplace for delivering and deploying applications, we’ve seen more of our customers taking a “lift-and-shift” approach to migrating their existing applications. In this session, Patrick Maddox, Sr. Director, Twistlock Solutions Architecture, will reveal how an environmental science and engineering consulting company moved its 14-year-old app that models storm surge to containers. …

  • White Papers

    5 Things to Know about Network Monitoring in a Cloud-Centric World

    The move to cloud computing has significant repercussions for network management. Cloud computing environments are dynamic, so your tools need to be dynamic as well. Download this white paper to learn about five best practices for cloud monitoring including: Focusing on service monitoring of your own applications instead of network monitoring Monitoring within the cloud …

  • Webinars

    Embedding security into your cloud-native pipeline

    In today’s modern software factories, organizations are shifting security to the left. No longer just the purview of firewalls, security needs to be built in during development and deployment processes. By doing so, organizations can ensure they are limiting vulnerabilities getting into production while cutting costs of both downtime and code rework. Learn about: How …

  • Webinars

    Redis Enterprise on Kubernetes

    Containers are becoming the basic unit of deployment. Kubernetes is becoming the industry standard for managing containerized applications. In this webinar, we will talk about basic Kubernetes constructs and will show how you can run three pod clustered Redis Enterprise on Kubernetes. You will learn:  Kubernetes primitives  How to deploy Redis Enterprise service on Kubernetes …

ITOps Times Newswire

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!