Operations | Monitoring | ITSM | DevOps | Cloud

Puppet

Why You Should Avoid Windows Group Policy Management for CIS Compliance

Windows Group Policy Management is the default — but that doesn’t mean it’s the right fit for your organization when it comes to cybersecurity and compliance. In this blog, we’ll look specifically at the current standard for compliance through CIS benchmarks and offer up a new way to approach policy management without the default.

Get Started with Puppet: A Tutorial Guide for First-Timers

So you’re ready to get started with Puppet and you don’t know where to begin. That’s alright – this short, easy Puppet tutorial will help you get started with Puppet Enterprise. This tutorial blog walks through the first few steps you'll need to take to get Puppet Enterprise up and running so you can start automating your organization's IT infrastructure.

DoD Compliance + DoD Configuration Management: How to Get Compliant with Less Effort

DoD compliance is a set of rules and expectations for IT cybersecurity in organizations that do business with the US Department of Defense (DoD). Discover everything you need to know about DoD compliance and DoD configuration management in this blog – plus how to manage DoD compliance better and faster with Puppet.

Platform Engineering Tools: 12 Types of Tools to Use in Your Platform

Platform engineering tools are the apps and services in an internal developer platform (IDP), like configuration management, provisioning, testing, automation, CI/CD, and more. Your actual IDP should comprise tools your team actually needs: Your choice of platform engineering tools matters because it defines what your dev team can do on their own.

What is Event-Driven Automation? Event-Driven Automation Programming Examples

Event-driven automation can turn repetitive, manual, daily tasks into something that you set and forget. It’s a great way to trigger automatic events and prevent human error. In this blog, we'll explore a few event-driven automation programming examples, from sending an email to a certain group of users when a file has been uploaded to a server to generating reports.

Managing Compliance: Tips + Strategies for Breaking the Vicious Scan-Fix-Drift Cycle

Managing compliance can seem like a losing game. It seems like you'll never be ahead – like you'll always be fixing drift after it happens, only for your configurations to inevitably slip again. Managing compliance becomes a vicious cycle of scanning to hunt down drift, fixing it as best you can, and waiting for it to happen again.

Government Risk Management: How Agencies Balance the Risks vs. Benefits of Digital Transformation

Digital transformation is happening all around us: for every business sector, across every type of organization. For government agencies, keeping up with digital transformation is riskier due to the large number of legacy systems still in use. Government risk management and digital transformation go hand-in-hand.

DevOps Self-Service: How Developer Self-Service Eliminates the Things Devs Hate

Developer self-service can sound like a dream: A platform that developers can use to freely develop – unburdened by sprawling IT, tools they shouldn’t need to know how to use, and tickets that take forever to complete. But in DevOps, self-service is becoming a differentiator for organizations with growth goals, widening skill gaps, a need for visibility, or just an appetite for better DevOps efficiency.