premium 5 guiding principles to follow for modernizing the data center network

New technologies like 5G, AI, and IoT, are driving companies to reconsider the way their data centers are structured. But from the smallest companies all the way up to the largest cloud providers, we’ve seen that service uptime remains a challenge for even the largest and most sophisticated companies – some citing that an outage … continue reading

premium OpenVPN: IT security considerations for remote workers

Despite the fact that remote work can cause security risks, a majority of IT professionals are in favor of employees working remotely. According to research by OpenVPN, 90 percent of IT professionals believe remote workers are a security risk. 92 percent also believe that the benefits of remote work outweigh the risks. Benefits of allowing … continue reading

premium Container Security Guide

ITOps Times Container Security Buyer’s Guide Sections: Moving parts mean more complexity Containing App Vulnerabilities “Doomsday” flaw found in RunC underscores potential for critical container vulnerabilities 9 security best practices for Kubernetes you should be following A guide to container security tools … continue reading

premium IPv6 deployment and the global internet

IPv6 deployment has been a topic of discussion amongst network engineers for many years. Although first standardized in the late 1990s, we didn’t start to see really significant levels of deployment pick up until 2012, helped in part by World IPv6 Launch. Depletion of IPv4 address space was and remains a significant driver for IPv6 … continue reading

premium AIOps: A Self-Healing Mentality

The first time I watched Minority Report back in 2002, the film’s premise made me optimistic: Crime could be prevented with the help of Precogs, a trio of mutant psychics capable of seeing crimes before they happen, enabling police to stop murderers before they act. What a great utopia! I quickly realized, however, that this “utopia” … continue reading

premium The top 5 tips to prevent cyberattacks in 2019

Cyberattacks have become an anticipated part of the IT world, regularly striking businesses both large and small. These attacks consistently infiltrate networks and expose an organization’s valuable data, and cause brand embarrassment and irate customers. Yet, the one way cybercriminals are inconsistent is the most damaging; their attack methods evolve each year in new and … continue reading

premium 9 security best practices for Kubernetes you should be following

One month after a major security flaw was discovered in Kubernetes, the Cloud Native Computing Foundation (CNCF) has shared a list of nine best security practices for the popular container orchestration tool Kubernetes. “As organizations accelerate their adoption of containers and container orchestrators, they will need to take necessary steps to protect such a critical … continue reading

premium For a successful AIOps integration, avoid these four common problems

The explosion in operational data and machine-learning compute capacity is finally enabling AIOps — Artificial Intelligence for Operations. But like many other technologies, AIOps fits within a larger organizational and systems context, and enterprises need to ensure that they are ready for the shift. Successfully implementing an AIOps solution requires an awareness of the potential … continue reading

premium Five considerations when moving toward cloud native

Building applications had rapidly become the easy part of development. Whether on the web or mobile, these applications need a place to live, and that place is constantly changing. From local servers in closets to colocation facilities to the cloud, we’ve seen rapid change over just the last few years. Now we have containers and … continue reading

premium Is security killing your digital transformation?

Hackers love traditional security. So do your competitors. Want to ruin their day? Forget what you know about how faster development increases risk. If your approach to security is slowing you down, it’s only a question of which you’ll lose faster—your data or your customers. To begin, let’s agree on one fundamental principle: In the … continue reading

premium Taking a cloud-native approach to security

We all know that infrastructures at most organizations are now oriented around the cloud, and that the cloud has introduced major changes to the way applications are designed, built, deployed and monitored. But what security experts may not realize is how significantly the cloud changes the security game. While you surely recognize that the cloud … continue reading

premium Defining a new network landscape

The latest advances in software-defined networking (SDN) promise to enable automation of IT operations, particularly among enterprises shifting to DevOps, application modernization initiatives and hybrid and multi-cloud architectures. Network systems providers such as Arista, Big Switch Networks, Cumulus, HPE, Nicira and Juniper were among the earliest to deliver on the concept of SDN at the … continue reading

premium The challenges of developing and maintaining software in critical infrastructure

Over the past decade, enterprise software investments have increased significantly, and don’t show any signs of slowing down. Gartner Group recently predicted 9.5 percent growth in enterprise software spending in 2018, with another 8.4 percent growth in 2019, totaling $421 billion. Driven by the fast pace of improvement in what software can do, it is … continue reading

premium Why it’s time to finally ditch the Big Four in ITOM

In July 2018, Broadcom announced its plan to acquire CA Technologies for nearly $19 billion. While analysts have furiously debated the merits of a chip manufacturer buying an enterprise software company, the CA acquisition heralds a momentous shift in the $25 billion IT operations management (ITOM) software market. For more than two decades, four technology … continue reading

Next Page »

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!