Diagram showing the components of AI-on-5G

NVIDIA and other companies collaborate on AI-on-5G platform

NVIDIA has announced a new collaboration with Fujitsu, Google Cloud, Mavenir, Radisys, and Wind River. Together the companies will work to develop solutions for NVIDIA’s AI-on-5G platform and help accelerate the creation of smart cities, smart factories, advanced hospitals, and intelligent stores.  “In this era of continuous, accelerated computing, network operators are looking to take … continue reading

NVIDIA releases Morpheus framework to detect security threats

NVIDIA has announced the release of its Morpheus framework that uses AI to detect and prevent security threats. It can detect leaks of unencrypted sensitive data, phishing attacks, and malware. According to NVIDIA, the Morpheus framework can be used together with NVIDIA AI computing and NVIDIA BlueField-3 DPUs to provide end-to-end protection.  When used along … continue reading

Graphic showing the benefits of Skybox's Security Posture Management Platform

ITOps Times news digest: Skybox updates Security Posture Management Platform, Synopsys to acquire MorethanIP, and Red Hat and NEC announce collaboration

Skybox has announced updates to its Security Posture Management Platform. The platform enables IT teams to visualize and analyze their hybrid and multi-cloud networks to get a better sense of their attack surfaces. New capabilities include advanced analytics, optimized attack simulation, and increased dashboard customization.  “Digital transformation demands a new approach to security posture management,” … continue reading

ITOps Times Open-Source Project of the Week: Kubesploit

CyberArk recently announced a new open-source project, Kubesploit, for testing Kubernetes environments. The goal of the project is to assist pen testers with performing comprehensive security assessments that mimic real-world attack scenarios, CyberArk explained.  “To help protect Kubernetes clusters from attacks, we need to face the technology and the organizations being targeted. Yet, most of … continue reading

Aiden logo

ITOps Times news digest: Aiden launches, HighByte Intelligence Hub version 1.4, VMware’s container workload protection

Aiden emerged from stealth today with the release of its DevOps for Windows solution, which will enable companies to automate their endpoint management processes. According to the company, its solutions will help bridge the gap between security and IT and enable teams to patch and deploy software, firmware, and drivers to Windows devices.  “IT teams … continue reading

Gluware logo

ITOps Times news digest: Gluware’s intelligent network automation capabilities, Threat Stack and Liquid Web partnership, and Ensono acquires Amido

Gluware has announced new intelligent network automation capabilities for Cisco SD-WAN and Cisco Meraki. New capabilities include the ability to securely automate complex deployments, so customers will now be able to automate networks without significant time or resources to build infrastructure.  “As more enterprises move to the public cloud, they find that legacy processes and … continue reading

How Consul-Terraform-Sync works

ITOps Times news digest: Consul-Terraform-Sync, Platform9’s new managed Kubernetes offering, and Ericsson Open Lab

HashiCorp has announced the release of Consul-Terraform-Sync. The solution is part of the company’s larger Network Infrastructure Automation solution.  IT operators can define a set of tasks that Consul-Terraform-Sync then executes whenever a new service is registered or deregistered with Consul. Example tasks include applying firewall policies and updating load balancer member pools.  The solution … continue reading

VMware Cloud visualization

VMware Cloud platform launches to give more flexibility over modernization efforts

VMware has announced the release of its new VMware Cloud platform. According to the company, this new offering will enable developers to build and deploy to any cloud, and provide IT with capabilities for modernizing infrastructure and operations.  “We are on the cusp of the next evolution of cloud and apps. Architectures are becoming distributed … continue reading

Cisco Plus logo

Cisco Live: Cisco Plus, improved endpoint protection, and more

Cisco announced a number of new updates at its Cisco Live! event, which started on Monday. Here are a few highlights of new solutions, such as Cisco Plus and Duo passwordless authentication: Cisco Plus offers as-a-service models With Cisco Plus, customers will be able to pick and choose the solutions that best suit their needs.  … continue reading

Sysdig launches Cloud Security Posture Management to deal with cloud lateral movement

ITOps Times news digest: Sysdig’s Cloud Security Posture Management, iSite’s Planned Maintenance module, and Accenture to acquire Cygni

Sysdig has announced the release of continuous cloud security posture management for AWS, which automatically discovers cloud services and flags misconfigurations and compliance violations. Cloud security posture management builds on Cloud Custodian, which is a cloud infrastructure security tool.  The company also announced support for cloud threat detection for AWS and GCP. Customers will be … continue reading

ITOps Times news digest: Red Hat OpenShift on AWS, TruSTAR and ServiceNow integration, and Elastic Observability 7.2

Red Hat has announced OpenShift is now available on AWS. Red Hat OpenShift on AWS (ROSA) will make it easier for OpenShift customers to build, scale, and manage containerized applications on AWS.  Key benefits include the ability to use familiar APIs and tools, pay-as-you-go pricing, and the elimination of the need to manage two vendor … continue reading

Report: Fusion of security and network planning is accelerating

The fusion of security and network planning has been accelerating over the past year, according to Aryaka’s recently released 2021 Global State of the WAN report. According to the report, almost a third of companies surveyed are already deploying secure access service edge (SASE) architectures. This close integration of networks and security will become even … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!