Operations | Monitoring | ITSM | DevOps | Cloud

How Puppet Enterprise Does Desired State Automation at Scale

Learn how Puppet Enterprise keeps infrastructure secure, compliant, and efficient with desired state automation and configuration management. This video demonstrates how Puppet Enterprise simplifies infrastructure management by grouping nodes, using facts to assign servers automatically, and continuously enforcing desired configurations on every server based on system parameters.

Phil Gervasi on Network Observability and Cisco Live | Network AF Episode 20

Phil Gervasi, Kentik's Head of Technical Evangelism stops by Network AF today to speak with host Avi Freedman about all things network observability and to recap their experiences at Cisco Live. Phil was a network engineer for 15 years before switching to marketing and finding his way into technical evangelism. In this conversation the two focus on building a foundation for data mining and collecting information that could better inform network intelligence and insights from observability platforms like Kentik.

Voice Network Fraud: How to Fight Back with Automated Threat Prevention

Telecommunications fraud is estimated to be a $39 billion a year problem according to the Communications Fraud Control Association. Despite that, less than 50% of enterprises* have implemented any sort of strategy to address fraud in their voice infrastructure. Firewalls and SBCs are not enough to provide a secure voice network. Enterprises need a more complete approach to network security—one that encompasses the unique vulnerabilities of real-time communications systems—to preempt issues and protect the organization as a whole.