Operations | Monitoring | ITSM | DevOps | Cloud

Puppet

VM Configuration: Using IaC to Stand Up Consistent Virtual Machines & Cut Down on Complexity

Configuring virtual machines (VMs) is an important task for any organization. Users across departments depend on sysadmins, engineers, and the rest of the IT ops and infrastructure teams to get VMs secured and ready to use, whether you’re spinning one up for a quick test, a new database server, or standing up a whole fleet of dev-ready machines. That need for variability AND consistency can also make VM configuration one of the most tedious sysadmin tasks, especially at enterprise scale.

Stay Ahead of Known Vulnerabilities with Automated Patch Management

The consequences of not patching are everywhere: remember the Log4j vulnerability that grants hackers complete access to your devices? The best way to prevent this from happening is to use a patched version of Log4j — so why did this become a catastrophic and prolific security vulnerability event? A: Because people hate, forget, or simply dismiss patching as a labor-intensive part of managing their infrastructure.

The Secret to Enterprise Observability: Automation & Configuration Management

Computing environments are more dynamic, distributed, and complex than ever. Observability tools help collect, monitor, and interpret the data they generate — like logs, metrics, and traces — to give IT teams and leaders real-time insights that can help detect issues, troubleshoot solutions, and improve the reliability of their IT systems. But observability tools can’t do their job without a strong infrastructure foundation and the right tools to manage it.

Why You Need Continuous Compliance and Risk Management

Continuous compliance and risk management can help keep your organization safe as the threat landscape changes and expands each year. The IT operations team is no longer just responsible for a few machines; they are managing complex environments that span across technologies, across teams, and at scale. They're expected to work fast while simultaneously considering the often-conflicting requirements of cost, compliance, and even workforce skills gaps.

Software Change Impact Analysis: 3 Benefits of Knowing What Your Code Will Do Before You Merge

When’s the last time you did something without knowing how it could turn out? Surprises can add a little excitement to your day-to-day, but one place they’re not really welcome is in infrastructure code. That’s why we have change impact analysis, a method of predicting the effect one change can have on other parts of a system before you make it. Software change impact analysis, as you might imagine, assesses how changes to a piece of software can affect other parts of the same system.

Platform Engineering Best Practices: Data Security and Privacy

Security is and will always be a huge concern, and Platform Engineering is here to stay: so, what are some Platform Engineering best practices that can support your data security and privacy efforts? You’d be surprised where they overlap, and what you can learn about putting security and productivity together — we’ll explain.

Puppet Delivers Secure Infrastructure Automation Required for a New Operating Reality

Puppet by Perforce today announced a significant enhancement to the capabilities of its commercial offering with the addition of new security, compliance, and continuous integration/continuous delivery (CI/CD) capabilities.

DISA STIGs: Who Needs Them & How to Enforce DISA STIG Compliance

DISA STIGs are an important compliance standard. There’s a security technical implementation guide (STIG) for almost every kind of technology in an IT environment, and each STIG can include hundreds of individual settings, configurations, and recommendations for ensuring compliance and security.

Strengthen Your Security in the Cloud: Privacy and Data Security

Managing security in the cloud and throughout hybrid environments is a challenge with high stakes — customer data, sensitive information, access privileges, and other cloud-based assets are all at risk when an organization uses the cloud. Let’s explore some common cloud-based security concerns and learn how to keep your cloud environment secure.