Operations | Monitoring | ITSM | DevOps | Cloud

S3 Security: How to Easily Secure and Audit AWS S3 Buckets?

Amazon S3 is an object storage service widely used for storing many different types of data in the cloud. While it’s inexpensive and easy to set up and maintain S3 buckets, it’s also very easy to overlook S3 security aspects and expose them to malicious attacks. A typical example is accidentally allowing public access to S3 files. Several recent high-profile data breaches were caused by lax S3 security.

Kubernetes as a Service: GKE vs. AKS vs. EKS

Kubernetes (K8s) is a prevalent open-source system for automating the deployment, scaling, and management of containerized applications. However, maintaining the service can be difficult and expensive. For that reason, it is easy to find platforms offering Kubernetes as a managed service. In this article, we will analyze three of the most popular services currently available: Google Kubernetes Engine, Azure Kubernetes Service, and Amazon Elastic Container Service for Kubernetes.

Kubernetes Master Class: How to Secure Production Kubernetes and Service Mesh Workloads on Rancher

As more container deployments move into production there will be an increasing level of attacks on application containers and the orchestration tools to manage them. The success of Kubernetes has been a major enabler for the “service mesh” concept to become a reality, as a “sidecar” container is the ideal form-factor for service mesh functions to be placed together with the service itself. The important thing to remember is that, although a service mesh has security features, it is NOT a security solution. It is not designed to provide the type of network, endpoint and host security required for defense in depth.

ManageEngine recognized as a May 2019 Gartner Peer Insights Customers' Choice for Network Performance Monitoring and Diagnostics Software

2019 continues to be a great year for ManageEngine accolades. This time, we are proud to announce that we’ve been named a May 2019 Gartner Peer Insights Customers’ Choice for Network Performance Monitoring and Diagnostics Software. The consistent performance of our network performance monitoring (NPM) solutions—OpManager, NetFlow Analyzer, and Network Configuration Manager—has been the driving force behind this recognition.

Better Together: DX AIOps and Intelligent Automation

Organizations are rapidly adopting AI first strategies to power digital business models. Hear Broadcom executives Kieran Taylor and Ralf Paschen share our approach for AI-driven automation for the digital business. In this video, you'll learn why having intelligent automation aligned to AIOps enables the promises of delivering AI-driven digital experiences.

Stop Focusing on Time to First Byte and Do This Instead

Metrics are the lifeblood of every data-driven decision. Question after question on forums like Reddit, Stack Overflow and other IT communities ask which metrics teams should focus on for improving website speed and end-user experience. There’s a push in web development circles to focus on Time to First Byte (TTFB) to measure and improve website speed. But every viewpoint has its opposition.

Containerized Air Gapped Edge Platform Architecture

An emerging use case for containerized platforms has been the ability to deploy applications in what is termed as an air-gapped deployment. This deployment pattern is particularly pronounced around edge computing (more on that later in the blog series) – though there exist significant differences between edge clusters and air-gapped deployments. Air-gapped applications are those that run isolated from datacenter or internet connectivity.

Tigera adds eBPF support to Calico

Calico provides users flexibility by detecting and choosing the right tool for the right job. One of our core values at Tigera is Our customer is the hero of our story. We consider the OpenSource users of Project Calico our customers and we intently listen to their needs to continuously deliver new capabilities and enhanced performance.