Minneapolis, MN, USA
2005
  |  By Puppet
Poland’s implementation of the EU’s NIS2 Directive marks a decisive shift in how organisations think about cybersecurity, resilience, and operational risk. With amendments to the Act on the National Cybersecurity System (KSC Act) entering into force on 3 April 2026, enforcement expectations are now real, national, and significantly stricter than many organisations anticipated – including obligations for security controls, incident response, and supply‑chain governance.
  |  By Puppet
The April 2026 update to UK Cyber Essentials marks an important shift. Not because it introduces radically new security concepts, but because it removes tolerance for inconsistency. With the effective date quickly approaching, many UK organizations are focused on meeting the immediate requirements. That matters. But the more durable story is what these changes reveal about how security and compliance are now expected to operate in real world environments.
  |  By Puppet
Over the past few months, Puppet has partnered with Bryxx to host a series of leadership lunches across Europe, bringing together infrastructure, operations, and security leaders for candid, peer‑to‑peer conversations. These sessions weren’t marketing briefings. They were grounded discussions about what teams are facing right now: tighter regulation, rising security pressure, shifting cloud strategies, and the practical realities of automation and AI.
  |  By Puppet
A sovereign cloud is a cloud environment that keeps data, infrastructure, and access under the control of a specific country or region. It lets organizations meet strict data residency and privacy laws without giving up cloud speed, automation, or modern DevOps practices. As regulations tighten and AI adoption grows, sovereign cloud is becoming the go‑to model for governments, regulated industries, and global enterprises that need both compliance and agility.
  |  By Puppet
This tutorial shows how to use GitHub Copilot with the Puppet Model Context Protocol (MCP) server to generate, validate, and refine a Puppet module—even if you’re new to Puppet development.
  |  By Robin Tatam
CMMC requirements have been shifting recently, with a new version of the Cybersecurity Maturity Model Certification (CMMC 2.0) and distinct levels requiring distinct controls. Mandatory for practically any organization doing business with the US Department of Defense (DoD), CMMC is unavoidable all along the DoD’s supply chain.
  |  By Puppet
It is 2:13 a.m. A mobile alert fires due to elevated error rates on a customer facing API. You jump in. Metrics show a spike in auth failures. The service was not deployed recently. The code appears unchanged. But something is different.
  |  By Puppet
Thousands of organizations rely on open source community builds for infrastructure automation. But if you're tasked with certifying, maintaining, and patching those builds yourself, you know the burden firsthand. The reality is that managing open source internally consumes time, introduces risk, and diverts resources from higher-value initiatives. When critical vulnerabilities emerge, your team scrambles to assess, test, and deploy fixes, all while keeping production environments stable.
  |  By Tzvika Shahaf
The “agent vs agentless” debate usually comes up when teams are trying to choose an infrastructure automation approach that will not compromise security, compliance, or impact day-to-day operations. You need to manage a hybrid estate, avoid creating more work for already stretched teams, and ideally do it without stitching together multiple tools. That pressure often turns the conversation into a binary choice: which approach is better?
  |  By Puppet
Infrastructure as code (IaC) is the act of writing infrastructure configurations as code so they can be understood, repeated, and enforced with less manual effort. IaC is also a powerful way to convert institutional knowledge into technical knowledge. It’s a far-reaching and essential part of managing infrastructure at scale, with benefits that have expanded to platform engineering, security and compliance, network administration, and so much more.
  |  By Perforce Puppet
Learn more about Puppet AI by watching the full length video now!
  |  By Perforce Puppet
Is Your DevOps Strategy Ready for the AI Era? AI is accelerating modern software delivery—but it’s also raising the stakes for security, compliance, and auditability. As AI-driven change increases, many organizations are discovering that incomplete DevOps practices are creating new risk. Based on insights from 800+ global IT professionals, the 2026 State of DevOps Report reveals why vendor‑backed, enterprise‑grade DevOps platforms are becoming critical for managing AI‑driven risk and meeting evolving regulatory demands.
  |  By Perforce Puppet
AI adoption in DevOps is accelerating, but trust, accuracy, and real-world usability still matter. In this conversation, Jason St-Cyr sits down with Jessica Gao, Product Manager at Puppet, to unpack how AI is actually being used in infrastructure and operations teams today, and what’s changed over the last 12–18 months. They dive into why enterprises are moving past generic code generation tools and toward domain-specific, MCP-powered AI that integrates directly into existing workflows.
  |  By Perforce Puppet
Revolutionize your infrastructure by leveraging AI tooling in the Puppet ecosystem. In this technical demonstration, we explore how to significantly reduce the time required to create new Puppet modules using Visual Studio Code, GitHub Copilot, and the Puppet Model Context Protocol (MCP) server.
  |  By Perforce Puppet
Struggling to manage automation across too many tools? Puppet Edge Playbook Runner lets you reuse the you already rely on...without rewriting a thing.
  |  By Perforce Puppet
Puppet Edge’s Playbook Runner lets you consolidate automation while keeping the playbooks you already use.
  |  By Perforce Puppet
Are you struggling to manage infrastructure scale with standalone Ansible playbooks? Discover how to consolidate your automation tools without losing your existing investment. In this demo, we explore how Puppet Edge empowers infrastructure teams to seamlessly execute Ansible Playbooks within Puppet workflows.
  |  By Puppet
As organizations move along their digital transformation journey, they will encounter technical challenges and pitfalls along the way. While the destination offers many benefits, getting there can be hard. It takes experience and knowledge, along with technical expertise, to navigate this path to a more agile, flexible organization. Learn how to get there in this white paper.
  |  By Puppet
A primary goal of most DevOps initiatives is to increase the speed and agility of software development and delivery. Unfortunately, this objective often seems to be at odds with good security practices, reducing the window of time for security assessment and introducing new attack vectors. But DevOps and security don't have to be mutually exclusive. In fact, the principles that drive good outcomes for software development can also lead to more secure infrastructure. Read the ebook for guidance on designing a DevOps workflow that incorporates - and enhances - security.
  |  By Puppet
If you're managing an IT team, you may be turning to DevOps as the path to faster delivery of software. DevOps can help your team become more efficient - and your organization more competitive - but you'll need to be able to communicate to your team why things are changing and how their usual working practices are likely to alter. In this guide we tease out the whys and hows of DevOps as you work with your team and the approaches that make a DevOps initiative successful.
  |  By Puppet
Speeding remediation reduces the cost of compliance and vulnerability of the IT estate. When looking for issues that slow remediation, notice the hand off from security to IT. Download this free resource to learn how the interaction between IT and Security can be improved to speed compliance.
  |  By Puppet
With the proliferation of high-profile hacks, data breaches and ransomware, it's easy to feel insecure about your organization's security these days. But not all security issues have to do with purposeful hacks and attacks. For many IT teams, the challenge is maintaining strict rules and regulatory requirements for everything from credit card data to health information privacy. Failing to maintain compliance can put your organization at risk of everything from lost business to substantial fines - or worse.
  |  By Puppet
With the right foundation and optimizations, your teams can successfully adopt continuous delivery practices - and deliver software faster, with fewer bugs and lower risk. If you're getting started with continuous delivery or evolving your approach, there are a few strategic considerations that can keep you on the right path.
  |  By Puppet
In this paper, we talk about four common challenges to today's software delivery automation and discuss how you can overcome those challenges. Continuous delivery (CD) enables organizations to deliver quality software in record time, helping businesses meet rapidly growing and changing demands. As CD practices and tools have matured, more organizations and teams are beginning - or are well down the path of - their own journeys, using automation to speed up software delivery.
  |  By Puppet
Are you looking to migrate from your on-premises data center to AWS - or to accelerate the process? Or would you like a simple and reliable way to manage your infrastructure and applications across all your environments? Puppet can help.

Puppet is driving the movement to a world of unconstrained software change. Our revolutionary platform is the industry standard for automating the delivery and operation of the software that powers everything around us.

It isn’t humanly possible to keep up with the constant innovation and risks that new technology brings. Automation has become a requirement, and Puppet sets the standard for delivering and managing your IT estate predictably and at scale. Our solutions automate how you continuously deliver, make compliant, remediate, and manage your multi-cloud environment. So you can focus on more important things in your life.

Use Cases:

  • Continuous Delivery: Ship more, do more with the right continuous delivery workflows and tools to increase your development and operations teams’ agility. They lower time to value of your infrastructure and the software it runs.
  • Continuous Compliance: The alphabet soup of regulatory standards and security best practices you try to comply with — and the associated penalties for not doing so — are no joke. Auditors expect your teams to implement and abide by operational, security, and regulatory policies 24/7, and to prove it when they show up.
  • Incident Remediation: With the proliferation of high-profile hacks, data breaches, and ransomware, it’s easy to feel insecure about your organization’s security. You have to protect your company like never before — particularly as your infrastructure grows and diversifies, presenting a broader surface for attackers.
  • Configuration Management: Are you spending more time fighting fires than deploying new, innovative services and applications? You are not alone. Most IT teams say it takes weeks, even months, to deploy critical applications. There’s got to be a better way to manage infrastructure. With automation, you eliminate manual work, minimize risk of human error, and make it possible to deploy fast, safely and reliably.

Make infrastructure actionable, scalable and intelligent.