ITOps Times news digest: Commvault expands BaaS portfolio, Quantum launches new hybrid storage arrays, InterVision announces cloud cost savings tool

Commvault has announced an expansion to its backup as a service (BaaS) portfolio. New additions include enhanced SaaS application protection, the addition of Oracle and Active Directory to Metallic Database Backup, and the addition HyperScale X as an edge offering for Metallic.  “As we continue our global rollout of Metallic, we’re finding more and more … continue reading

Keylime logo

ITOps Times Open-Source Project of the Week: Keylime

Keylime is an open-source project that developers and users can leverage to bootstrap trust for remote machines, provision encrypted payloads, and run system integrity monitoring.   Key features include remote boot attestation, Linux IMA runtime integrity monitoring, application bootstrapping, secure payload provisioning, revocation framework, and certificate authority integration.  The mission of the project is to make … continue reading

OpsRamp rolls out two new solutions for WFH IT management

OpsRamp is aiming to make network management easier for remote companies. It has announced two new products to do so: OpsRamp NetFlow and OpsRamp Unified Communications monitoring. “As work-from-home became the new normal in 2020, use of digital communications and collaboration systems exploded,” said Ciaran Byrne, vice president of product management at OpsRamp. “IT Operations … continue reading

Delphix ransomware solution

ITOps Times news digest: Delphix updates, HCP Vault beta, and Platform9 updates

Delphix has announced updates to its ransomware protection solution. New capabilities include maximum coverage for high change rates, data immutability, open box data testing and validation, and air gap data isolation. “You can drive a truck through the holes in legacy ransomware solutions,” said Jedidiah Yueh, CEO of Delphix. “Once-a-day backups are insufficient. Companies can’t … continue reading

ITOps Times news digest: IIC RFP Toolkit, Fugue’s new container runtime security capabilities, and Atos and IBM’s partnership

The Industrial Internet Consortium (IIC) has announced it is releasing its IIC RFP Toolkit, which is a collection of tools and best practices for guiding IIoT project managements through the process of procuring components and resources that are required in an end-to-end IIoT solution.  The IIC RFP Toolkit is comprised of six modules: project planning, … continue reading

IBM acquires Taos for hybrid cloud consulting

IBM has entered in an agreement to acquire cloud professional and managed services company Taos. According to the company, this will help advance its migration and cloud transformation efforts.  “Taos adds the deep expertise, public cloud partnerships and innovative solutions needed to drive growth and adoption of IBM’s hybrid cloud platform throughout the Americas,” said … continue reading

Sysdig Container Security report

Report: Container security is shifting left

A recent survey has revealed that container security is shifting left with 74% of organizations scanning container images during the build process. Unfortunately, the report also revealed that the majority of container images are overly permissive. According to Sysdig’s fourth annual Sysdig Container Security and Usage report, 58% of containers analyzed were running as a … continue reading

Otomi logo

ITOps Times Open-Source Project of the Week: Otomi

Earlier this week, Red Kubes open sourced a community version of its container platform Otomi. Otomi is a platform that can be run on top of Kubernetes.  According to the company, Otomi was originally developed using a developer-first philosophy with the 12-factor app methodology. Red Kubes’ goal was to create a management platform for Kubernetes … continue reading

ITOps Times news digest: Malwarebytes integrations, Entrust acquires HyTrust, and xMatters completes SOC 2 examination

Malwarebytes has announced new integrations in its OneView management dashboard. The new additions will help to streamline security operations for MSPs, the company explained.  “Security is an increasing concern for MSPs, particularly as their clients have become more targeted by cybercriminals in the wake of the COVID-19 pandemic,” said Mike LaPeters, vice president of worldwide … continue reading

What Incident Management teaches us about the pandemic

In early 2020, before we realized that the pandemic was surging under our noses and that we were mere months away from global lockdowns, I was sitting in a bar off of Brannan Street in San Francisco talking about building my new company, Kintaba, around modern incident management. At the time, this seemed to be … continue reading

ITOps Times news digest: Red Hat Runtimes, Intel and Cybereason partnership, and Red Kubes open sources Otomi

Red Hat has added new features to Red Hat Runtimes, which is a set of tools for building and maintaining cloud-native applications.  New features include expanded support for Quarkus, JBoss EAP XP 2.0, support for IBM Power Systems, a developer preview of OpenShift Serverless Functions, and more.  In addition, this version brings support for Spring … continue reading

Red Hat to acquire Kubernetes and container security company StackRox

Red Hat has entered into an agreement to acquire StackRox for its container and Kubernetes-native security capabilities. According to Red Hat, bringing StackRox to its container application platform OpenShift will help users build, deploy and securely run apps across the hybrid cloud from a single platform.  In addition, Red Hat plans to use StackRox to … continue reading

Martin Schroeter

Martin Schroeter to lead IBM’s managed infrastructure company NewCo

A few months after announcing its decision to spin off a new managed infrastructure company, IBM has revealed the new CEO for that company. IBM’s NewCo will be headed by Martin Schroeter, as of January 15th. Previously, Schroeter served as IBM’s senior vice president of global markets, where he oversaw global sales, client relationships and … continue reading

4 ways to optimize your network security posture for the remote workplace

The new reality of remote working is driving businesses to re-examine their network security posture. Let’s face it: these networks were originally architected to support a dramatically different work environment. IT now must secure the network by bringing into the fold a myriad of remote, mobile and digital workspace devices, some of which were previously … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!