Operations | Monitoring | ITSM | DevOps | Cloud

%term

AWS EKS Windows Container Support Made Generally Available

Plano, Texas, United States – October 22, 2019 – Last week, Amazon Web Services (AWS) announced the general availability of Windows Container Support on AWS Elastic Kubernetes Service, known as EKS. With this update from AWS, CloudHedge’s enterprise clients who want to modernize their Windows applications to the cloud can now seamlessly deploy them on EKS clusters running Windows Containers out of the box.

The importance of event correlation techniques in SIEM

Event correlation tools are a fundamental instrument in your toolbox to detect threats from all sources across your organization in real time. A wise use of the right event correlation techniques through log management and analysis is the cornerstone of any reliable security information and event management (SIEM) strategy – a strategy that focuses on prevention rather than reaction.

How do you really know if your EHR running on Citrix is ready for the workday?

Healthcare environments must ensure application availability around the clock to serve the needs of their patients. In many hospitals, while they serve patients 24×7, there is typically a lighter overnight load, but by the time the sun rises, healthcare teams start staffing in full force. Oftentimes applications in healthcare are deployed via Citrix. The Citrix infrastructure can be complex and adding an EHR application such as EPIC can make early morning health checks take a long time.

Requirements of a Security Platform in a DevOps World

Businesses today cannot afford to be hacked. Cyber attacks can result in hefty fines and lawsuits, not to mention the reputational damage that can result in long-term revenue loss. Of course, this has always been true. But what has changed over the past few years is both the sheer volume of attacks and the growing sophistication used in them. As a result, there is a need an updated and upgraded kind of SIEM security platform to face them.

12 mobile device features that help ensure corporate data security

Our hearts might skip a beat every time we put our hands in our pocket and can’t find our mobile phone, and we’re filled with dread at the thought of losing the device that contains our personal photos and the corporate data saved on it. But just misplacing a device is not how we put corporate data at risk; small actions in our day-to-day lives can have a major impact on the safety of the corporate data on our devices.

Monitoring Amazon ECS with Blue Matador

Amazon ECS allows you to easily run containers in AWS in units called tasks. Groups of identical tasks are called services, and groups of services running on the same infrastructure are called clusters. Since it is critical to the health of your application, properly monitoring ECS is a top priority for most teams. In this blog post, we will go over how Blue Matador monitors ECS tasks automatically and without configuration.

The Truth About AIOps

If you are in IT Ops or DevOps, hardly a day goes by without someone mentioning AIOps. There are a few who think AIOps can replace IT Ops tools today. Others debate this, saying that AIOps is still a nascent field, and it will take a few more years until we see a full-fledged AIOps platform for IT operations management. But there’s always been a lot of confusion on how AIOps really works.

Kubernetes Master Class: Kubernetes from Zero to Hero

Kubernetes has become the de facto standard for deploying containerized applications at scale on the different cloud providers. Why is this? In this Kubernetes Master Class, we'll discuss the reasons for using Kubernetes (K8s), the core concepts, architecture, real-life scenarios, and the differences betwen using managed vs un-managed K8s solutions, and how to reduce costs by using cloud excess capacity.