Operations | Monitoring | ITSM | DevOps | Cloud

Puppet

Puppet Delivers Secure Infrastructure Automation Required for a New Operating Reality

Puppet by Perforce today announced a significant enhancement to the capabilities of its commercial offering with the addition of new security, compliance, and continuous integration/continuous delivery (CI/CD) capabilities.

Strengthen Your Security in the Cloud: Privacy and Data Security

Managing security in the cloud and throughout hybrid environments is a challenge with high stakes — customer data, sensitive information, access privileges, and other cloud-based assets are all at risk when an organization uses the cloud. Let’s explore some common cloud-based security concerns and learn how to keep your cloud environment secure.

Puppet + Penacity: Secure Critical Infrastructure with Compliance as a Service

Compliance as a Service (CaaS) can help you tackle some of your biggest compliance challenges like quick policy changes, evolving security risks, and talent shortages. In this blog, we’ll give you options for handling compliance (and ultimately, security) based on your current needs, and help you assess next steps toward a more compliant and secure infrastructure.

NIS2: Compliance Requirements, Deadline + Instructions for the NIS2 Directive

The compliance landscape for organizations in the European Union (EU) is heating up again – this time with the second landmark Network and Information Security (NIS2) Directive, set to take effect on October 17, 2024. But what does NIS2 compliance entail? What's the difference between the original NIS1 vs. NIS2? Who needs to comply with NIS2, and what are the penalties for not complying with the new directive?

4 Key Reasons to Switch from SaltStack to Puppet

At first, the differences between common configuration management tools might seem marginal. But choosing the right solution for automated configuration management can make a huge difference. Some tools will have features that align with your organization’s goals, while others won’t. The choice between Puppet vs. SaltStack is one such decision, and it’s a little more nuanced than you might think.

Don't Redo the Work: How to Migrate OS the Easy Way

So, you think you want to migrate OS (AKA operating systems)? In (most) everyone’s life there comes a time where you look toward migrating to another operating system. There are a variety of reasons why — take for instance the recent trouble with CentOS and RedHat. This process change has broadened adoption of new Enterprise Linux variants like Rocky, Alma Linux, or even Ubuntu.

xz Backdoor: What to Know + What to Do About the XZ Utils Vulnerability

The xz backdoor is a vulnerability in XZ Utils, a popular data compression library. The xz backdoor can let unauthorized users gain admin-level access to systems, endangering data security and much more. Read on to learn more about the xz backdoor, who’s affected, and what you can do now to find out if your systems are at risk.

Patch Management Software: Your Guide to Picking a Patch Manager (with Examples)

Patch management software automatically applies updates to software, firmware, and other system components. Patching makes sure resources are up to date with the latest security and performance improvements to keep software protected and performing as expected.

Critical Platform Engineering Metrics: KPIs that Matter for Success

Platform engineering metrics and/or platform engineering KPIs (Key Performance Indicators) can help us measure the success of this evolving approach and its impact on DevOps. According to our 2024 State of DevOps Report: The Evolution of Platform Engineering — 43% of organizations report that they have had a platform team from 3-5 years already. With this maturity, it’s important to measure what’s working and what isn’t working using the same indicators of success across the board.

SOC 2 Compliance Requirements: Examples, Use Cases + More

SOC 2 compliance requirements (Service Organization Controls Type 2) ensure that customer data stays private and secure — essential for any business that stores or processes sensitive data. In this blog, we’ll explore the specifics of SOC 2 compliance, and provide a solution to help you automate and enforce SOC 2 compliance going forward.