Operations | Monitoring | ITSM | DevOps | Cloud

Latest Publications

BYOD, Secure Messaging and HIPAA Compliance

69% of healthcare CIOs said their hospitals see mobile strategies as a key initiative to improve clinical and operational outcomes. At the same time, these CIOs are also worried that enabling the use of mobile devices by clinicians, nurses and admins will significantly harm their institution's security and ability to comply with HIPAA.

The US National Security Agency's best practices for cloud security.

To address the confusion surrounding cloud technology, the US National Security Agency (NSA) has published a guide explaining cloud technology and its vulnerabilities. We've made things easier by preparing a guide that gives you the best practices to fix these vulnerabilities, and keep your cloud environment secure.

Cloud Instance Initialisation with cloud-init

Private cloud, public cloud, hybrid cloud, multi-cloud... the variety of locations, platforms and physical substrate you can start a cloud instance on is vast. Yet once you have selected an operating system which best supports your application stack, you should be able to use that operating system as an abstraction layer between different clouds.

The no-nonsense way to accelerate your business with containers

Container technology has brought about a step-change in virtualisation technology. Organisations implementing containers see considerable opportunities to improve agility, efficiency, speed, and manageability within their IT environments. Containers promise to improve datacenter efficiency and performance without having to make additional investments in hardware or infrastructure. Traditional hypervisors provide the most common form of virtualisation, and virtual machines running on such hypervisors are pervasive in nearly every datacenter.

Security Automation & Orchestration Needs a Unified Platform

Today's Security Operations Centers are inherently at risk. Plagued with skill shortages and increasing incident volume, CISOs need to counteract widespread threats-like phishing, exfiltration, ransomware and lost devices-fast. A unified Security Incident Response Platform helps expedite your response by optimizing processes and empowering your security team.