Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Solving financial services regulatory challenges in Australia with Puppet

The recent record-breaking fine of $1.3 billion for money-laundering breaches exposed the dangers of poor systems in the banking industry. Now is the time to get compliance right. In my role, I regularly speak with FS&I clients about their security and compliance challenges, including vulnerability remediation. It’s a complex topic with many pieces that must coalesce to create a holistic solution.

Datadog's AWS re:Invent 2020 guide

In Q4 of every year since 2012, AWS has flooded the Las Vegas strip with thousands of AWS staff, partners, and customers for a week of keynote sessions, announcements, workshops, and more. In a year like no other, we’re gearing up for a re:Invent like no other! As a long-time AWS partner, we look forward to re:Invent every year. We enjoy meeting you face to face, sharing the latest in monitoring and security, and learning a thing or two in the process.

Scaling your IT Monitoring Solution: Complete Guide

Regularly, every company experiences growth in some form or the other. As it grows in every direction, there is an increase in the number of challenges for the IT department. In effect, it is imperative to be able to scale your IT monitoring solution. The idea is to make IT infrastructure monitoring easy and smooth.

Your lookback at Puppetize Digital 2020

That’s a wrap on Puppetize Digital 2020! Our first-ever virtual conference series attracted attendees from all over the world and brought the Puppet community together despite the pandemic’s attempt to keep us apart. With three events happening across three regions — Asia Pacific, Europe, and the Americas — all on the same day, there was something for every one of our users, customers, and partners. Let’s take a spin through the event highlights.

What's Cool in Rancher 2.5? A Partner Perspective from SVA

Since 2014, Rancher Labs has been making it easier for IT professionals to handle containers. Until now, every release of their flagship product, Rancher, brought features that you wouldn’t want to be without. But the latest releases have really taken things up a few notches.

Embracing virtual connections at AWS re:Invent 2020

Get started with Gremlin's Chaos Engineering tools to safely, securely, and simply inject failure into your systems to find weaknesses before they cause customer-facing issues. This year has seen a complete re-imagining of tech conferences. Some were cancelled or postponed, while others have evolved and embraced the opportunity to go virtual. This meant innovating to bring the in-person event experience online.

Deployment Rollbacks via FireHydrant Runbook

FireHydrant has a sophisticated set of response actions for coordinating communications, activities, and retrospectives for incidents that affect your services. Relay helps by automating remediations that involve orchestrating actions across your infrastructure. In this example workflow, an incident that affects an application deployed on Kubernetes can trigger a rollback to a previous version automatically.

Target, Track and Trace your Vulnerabilities

Lock your sights on the black box hiding untold vulnerabilities in your repository and shine a light inside to find out what monsters lurk within. Yes, I'm talking about running on-demand security scans against supported packages within your repository. If you are a Velocity or Ultra customer, you can start making use of security scanning today!

Canonical publishes LTS Docker Image Portfolio on Docker Hub

November 24th 2020: Canonical has published the LTS Docker Image Portfolio, a curated set of secure container application images, on Docker Hub. The LTS Docker Image Portfolio comes with up to ten years Extended Security Maintenance by Canonical. “LTS Images are built on trusted infrastructure, in a secure environment, with guarantees of stable security updates,” said Mark Lewis, VP Application Services at Canonical.

Secure your infrastructure in real time with Datadog Runtime Security

From containerized workloads to microservice architectures, developers are rapidly adopting new technology that allows organizations to scale their products at unprecedented rates. In order to make sense of these complex deployments, many teams are abstracting applications away from the environments in which they run. Because of this trade-off, developers and security teams lose the access to the unified context from infrastructure to application needed to fully secure their services.