Operations | Monitoring | ITSM | DevOps | Cloud

Prioritize and Investigate Vulnerabilities Identified by OpenVAS with Logz.io

With open source in our roots, we’re always excited about integrations with tools like OpenVAS, a popular open source vulnerability scanner that Greenbone Networks has maintained since 2009. If you’re not currently using OpenVAS, you can find the project here. OpenVAS contains more than 50,000 vulnerability tests with a community constantly updating its feed to adapt to the ever-evolving security landscape.

Getting started with secure DevOps

As you move to the cloud, your focus is on developing and deploying your applications. You may leave some functions for later, thinking they will slow you down. So when challenges appear your team feels unprepared. You need tools that are built for containers and Kubernetes, like the Sysdig Secure DevOps Platform. So your team can build visibility and security together in a secure DevOps workflow, and ship applications faster.

JFrog Log Analytics with Splunk

The JFrog Platform’s unity is powered by many microservices, each with its own log record. When even a small enterprise JPD might record millions of transaction events each day, operators need to be able to connect that data to a powerful analytics tool that can help find insights. JFrog now offers some tools that make that much easier to do, through the analytics and visualization tool you already use.

JFrog Log Analytics with Elasticsearch And Kibana

The JFrog Platform’s unity is powered by many microservices, each with its own log record. When even a small enterprise JPD might record millions of transaction events each day, operators need to be able to connect that data to a powerful analytics tool that can help find insights. JFrog now offers some tools that make that much easier to do, through the analytics and visualization tool you already use, including users of Elastic Stack.

Connecting the World's Travel Trade with Kubernetes

When you book a hotel online or with a travel agent, you’ve probably got a wish list that has to do with the size of the room, view, location and amenities. You’re probably not thinking about the technology in the background that makes it all happen. That’s where Hotelbeds comes in. The business-to-business travel technology company operates a hotel distribution platform that travel agents, tour operators, airlines and loyalty programs use to book hotel rooms.

Graph Analytics Using Splunk and the Machine Learning Toolkit

Almost all data in Splunk can be turned into graphs, and that's possibly something you may not have considered before. In your network traffic data, a source IP connects to a destination IP with attributes like bytes in/out, packets, ports, and other properties. Users log into an interconnected stack of systems, services, devices and applications which are connected with each other. Transactions run from A to B to C and may describe a process that helps you analye user journeys and business processes in general.

5 minutes to onboard secure DevOps

Today, we are excited to announce a faster onboarding for Kubernetes visibility and security. With the SaaS-first approach and new enhancements to the Sysdig Secure DevOps Platform, you can get results after just a five-minute setup. This release includes a new guided onboarding process, out-of-the-box dashboards as part of curated essential workflows, and a new Sysdig Essentials tier.

3 Foundational Elements of Zero Trust You Can't Do Without

While the concept of zero-trust security has many IT organizations thinking in terms of identity, access, and cloud services, zero trust must run on a solid foundation. We should start by talking about the goals of zero-trust security. Zero trust involves creating an environment where each access request is first scrutinized to determine whether it should be allowed.