DevOps

Agent vs Agentless Monitoring: Why We Chose Agentless

This post was originally published by upguard. When we set out to create a cloud-based tool for configuration monitoring, we used the tools we knew and wrote UpGuard using JRuby. For our application, JRuby had many good qualities: getting started only required a one line install, the agent only needed to talk out on port […]

The latest Cyberthreat Defense Report reveals lowered optimism, attacks, and the importance of DevOps

This post was originally published here by casey pechan. We’re a proud sponsor of the Cyberthreat Defense Report, a report that we think should be read by every CISO, CIO, and their teams. What makes this report so special is that it’s vendor agnostic, and it examines exactly how organizations perceive cyberthreats, and how they leverage […]

We’ve been selected as a top three for container management and DevOps vendors by the Enterprise Management Association!

This post was originally published here by casey pechan. We’ve got some great news, hot off the press this morning! The incredible team behind the Enterprise Management Association, or EMA, has included us in the “10 Priorities for Container Management and DevOps in Production and at Scale in 2018 (EMA Top 3)” report based on criteria obtained […]

White paper: A new approach for securing DevOps in the cloud

This post was originally published here by casey pechan. It’s no secret we love the team over at Puppet. We’ve got our approved CloudPassage module on PuppetForge, and we’ve already shown you different ways you can tackle securing DevOps using Puppet and CloudPassage Halo in tandem. Now we’ve put heads together to give you a deep-dive into securing […]

Security considerations in a DevOps pipeline

This post was originally published here by amit gupta. Using DevOps methodologies the goal is to speed up deployment using automation while increasing the predictability and manageability of the development cycle. Too often though – and this may be true more often than not – security is left for last, ultimately slowing down deployment, backing […]

Share this page