RSS feed Get our RSS feed

News by Topic

devops processes

Results 1 - 25 of 26Sort Results By: Published Date | Title | Company Name
By: BeyondTrust     Published Date: Sep 24, 2019
HOW TO USE THIS BUYERíS GUIDE Today, privileges are built into operating systems, file systems, applications, databases, hypervisors, cloud management platforms, DevOps tools, robotic automation processes, and more. Cybercriminals covet privileges/privileged access because it can expedite access to an organizationís most sensitive targets. With privileged credentials and access in their clutches, a cyberattacker or piece of malware essentially becomes an ďinsiderĒ.
Tags : 
     BeyondTrust
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"The fast pace of innovation demanded by todayís digital businesses challenges traditional processes for the deployment and governance of application delivery and supporting infrastructure. To address the increased pace of change, many organizations are transforming by adopting DevOps: a set of practices which employs continuous integration processes, breaking down the silos between development and operations teams. As cycle times accelerate, and development teams adopt more Agile delivery methodologies, the traditional model for application security can be a drag on the speed and agility inherent in a continuous integration process. This creates a natural friction. Security teams can be perceived as slowing down or blocking delivery. At the same time, however, the apps are exposed to significant threats. The goal of continuous integration is to deliver more frequent releases with more new capabilities to market, faster. Itís all about speed."
Tags : 
     F5 Networks Singapore Pte Ltd
By: AWS     Published Date: Oct 07, 2019
Software development has evolved from rigid waterfall methodologies to more streamlined approaches, like Agile and more recently DevOps. This evolution has taken place in large part to shorten development life cycles and meet increased business demands. Today, businesses of all sizes have built an advantage by implementing a DevOps culture and processes, which break down silos between development and operations, allowing organizations to create better software faster. As organizations implement DevOps on Amazon Web Services (AWS), they need to understand the security implications. The AWS Shared Responsibility Model makes clear that AWS secures whatís ďon the cloud,Ē while the customer is responsible for securing their assets ďin the cloud.Ē When AWS customers go about securing their DevOps environments, they need to do so in a way that provides robust protection without limiting developer agility.
Tags : 
     AWS
By: AWS     Published Date: Oct 09, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that arenít built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Microô Deep Securityô is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, youíll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
     AWS
By: Puppet     Published Date: Mar 09, 2017
DevOps cuts deep and wide through industries, company sizes, and technology environments. Yet, DevOps is never done ó itís about continual learning and improvement rather than an end state. Puppet is here to help. We draw on the success stories and lessons learned at organizations that are already driving improved performance and better business outcomes with their DevOps initiatives. This handbook captures five essential phases for mapping out a DevOps journey: 1. Build the business case for DevOps. 2. Address the biggest challenges to DevOps success. 3. Develop a performance-driven team structure. 4. Choose the right Tools and processes. 5. Plan your key implementation phases.
Tags : 
     Puppet
By: CA Technologies     Published Date: Jun 04, 2015
There has been growing buzz about DevOps. DevOps is a methodology that unites the often separate functions of software development (Dev) and production and operations (Ops) into a single, integrated, and continuous process. DevOps is about breaking down the barriers between Dev and Ops. It leverages people, processes, and technology to stimulate collaboration and innovation across the entire software development and release process. Dev and Ops should always be part of an integrated process, but thatís not always as easy as it sounds. You may be stuck in what we call ďDysfunction Junction.Ē Read this eBooklet to learn about the pitfalls of DevOps, how you can avoid them, and how to get started on your DevOps journey.
Tags : 
     CA Technologies
By: Puppet     Published Date: May 20, 2016
This July 2015 Forrester Report explores: - Why consistent, automated DevOps processes are essential to closing vulnerabilities and limiting exposure. - Practices, such as infrastructure as code and automated provisioning, for closing holes as soon as patches are available. - How DevOps and security professionals can work together to adopt DevSecOps.
Tags : 
     Puppet
By: Splunk     Published Date: Nov 29, 2018
DevOps allows teams to effectively build, test, release, and respond to your software. But creating an agile, data-driven culture is easier said than done. Developer and devops teams struggle with lack of visibility into application monitoring tools and systems, accelerated time-to-market pressure, and increased complexity throughout the devops lifecycle process. As a Splunk customer, how are you using your machine data platform to adopt DevOps and optimize your application delivery pipeline? Download your copy of Driving DevOps Success With Data to learn: How machine data can optimize your application delivery The four key capabilities DevOps teams must have to optimize speed and customer satisfaction Sample metrics to measure your DevOps processes against
Tags : devops, devops tools, continuous delivery, devops methodology
     Splunk
By: CheckMarx     Published Date: Nov 02, 2018
As DevOps continues to be widely adopted by fast-moving organizations, software security needs to keep pace to help accelerate software delivery and not slow it down. Is your software security program up to the challenge? By integrating security into the entire software development lifecycle, enterprises can manage their business risk and guarantee secure software delivery at the speed of DevOps. Check out these 10 Essential Best Practices for building and maintaining your modern-day software security program -- from your tools, to your processes, to your people. This eBook will cover the top 10 steps you can take today to help your organization move faster and more securely.
Tags : 
     CheckMarx
By: Cybric     Published Date: Oct 30, 2017
Learn how a security rationalization process helps CISOs optimize your security infrastructure while improving the bottom line. Development velocity is accelerating as enterprises adopt DevOps methodologies, yet security is still not integrated into the coding and deployment processes. Security teams are falling further behind as their manual processes and controls canít scale at the same rate as development. This paper discusses: The impact the current approach to application security has on business How shifting security left in the application development process, seamlessly integrating it ďearly and often,Ē can accelerate innovation Questions the Board and C-suite are now asking about security: are you prepared? Read this paper to learn how, by shifting security left in the development process, itís now no longer an obstacle to velocity, innovation and competitiveness. Instead, itís an asset.
Tags : application security, (security) automation, (security) orchestration, security visibility, devsecops, devops, security assurance, security resilience
     Cybric
By: Ahead     Published Date: Jun 05, 2019
Digital transformation will fail without a commitment to automation - what AHEAD refers to as Relentless Automation. With the advent of public cloud and all of its promise, along with the ripple effect from the DevOps mantra of ďautomate everywhereĒ, technology teams must spin up new infrastructure, maintain configurations, and set up and tear down environments much faster than ever before. Of course, no one should automate for the sake of automating, or to simply be ahead of the curve. But while not every activity warrants automation - whether due to the complexity and nuance of the task, or its infrequent occurrence - Relentless Automation means identifying those tasks and processes where the benefits of automation outweigh both its upfront and recurring costs. Thankfully, the business benefits of standardizing and automating IT work are easy to spot: > Freeing up staff for higher value work > Reduction in errors and process variability > More auditability and accountability, helping
Tags : 
     Ahead
By: Tricentis     Published Date: Nov 15, 2018
The following maturity model is designed to help you assess your teamís progress on the journey to BDD maturity. This guide will give you a framework for understanding where your team is now on the road to BDD maturity and help you chart a direct course for taking it to the next level. The transition to BDD often comes with significant bumps in the road, but in our experience it is well worth the effort. Teams with mature BDD practices report higher levels of collaboration across functions and also tend to be more advanced in their DevOps release processes. By shifting testing left with BDD, these teams are delivering faster without sacrificing quality. By downloading this ebook, you will learn: o Five BDD maturity levels based on the adoption patterns weíve seen among our user base and the industry at large o Strategies for achieving the significant process changes that BDD requires, both within and outside the QA team o Where your team is today and the milestones that will get you
Tags : 
     Tricentis
By: Riverbed     Published Date: Nov 02, 2016
"As companies undergo digital transformation, many IT organizations are embracing DevOps to better align with evolving business requirements, foster rapid innovation, and deliver high-performing services. But what IT leaders are failing to grasp is that this cultural shift also requires modifications to the underlying application performance management (APM) technologies and processes that have historically been used to manage IT service delivery. Read this analyst paper to explore: Key challenges IT organizations face as they roll out DevOps practices Additional APM tools and capabilities needed to support DevOps Recommendations for forming the right organizational structure and processes"
Tags : 
     Riverbed
By: Rackspace     Published Date: Jul 23, 2019
Coupling recommendations from the Rackspace DevOps Accelerator engagement with expert advice from Rackspace applications specialists, TotalTrax deployed Fanatical Support for AWS and integrated cloud-based containers to manage customer deployments faster and automate processes.
Tags : 
     Rackspace
By: Infosys     Published Date: Feb 12, 2019
DevOps is fast assuming greater importance in deciding the agility of an enterprise. A robust DevOps setup is crucial for successful agile delivery and minimal risks. It greatly optimizes release management costs and team productivity, resulting in reduced time to market. At the same time, DevOps enables organizations to make rapid product releases with increased quality and manage customers' expectations. In this paper we explore various aspects of DevOps. We look at key success attributes, main processes, tools, and frameworks that play an elementary role in DevOps.
Tags : 
     Infosys
By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that arenít built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Microô Deep Securityô is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
     AWS
By: IBM     Published Date: Apr 01, 2016
Learn about the latest IBM DevOps solutions for IBM z Systems mainframe that can accelerate and simplify deployments. Attend this session to find out about leveraging skills and teams dealing with multiple tools, processes and platforms.
Tags : ibm, z systems, devops, software delivery
     IBM
By: IBM     Published Date: Feb 18, 2015
DevOps processes and tools help retailers compete in fast-paced mobile, digital and physical markets. See what retailers can do to deliver innovation faster. Test virtualization and deployment automation can improve front-end mobile and back-end mainframe development processes.
Tags : ibm, devops, retail industry, devops processes, test virtualization
     IBM
By: Riverbed     Published Date: Apr 14, 2017
"As companies undergo digital transformation, many IT organizations are embracing DevOps to better align with evolving business requirements, foster rapid innovation, and deliver high-performing services. But what IT leaders are failing to grasp is that this cultural shift also requires modifications to the underlying application performance management (APM) technologies and processes that have historically been used to manage IT service delivery. Read this analyst paper to explore: Key challenges IT organizations face as they roll out DevOps practices Additional APM tools and capabilities needed to support DevOps Recommendations for forming the right organizational structure and processes"
Tags : 
     Riverbed
By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that arenít built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Microô Deep Securityô is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
     AWS
By: AWS     Published Date: Oct 07, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that arenít built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Microô Deep Securityô is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, youíll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
     AWS
By: CA Technologies     Published Date: Jul 19, 2017
ē Planning for DevOps implementation encompasses people, processes and technology ē CA Technologies delivers DevOps for Mainframe anchored by CA Application Lifecycle Conductor, which allows organizations to continue using their existing products ē Catch a detailed evaluation of how CA compares to Compuware on Platform Support, Software Development Lifecycle, Integration and Extension of Enterprise Assets, Configuration and Administrative Management
Tags : 
     CA Technologies
By: Veracode     Published Date: Oct 26, 2016
Can DevOps be one of the most disruptive trends ever to hit application security, or even software development? DevOps enables developers to integrate security testing, validation and monitoring into both application development and deployment. Download this free whitepaper now to review the components of the current DevOps framework and how to put security into the processes of DevOps.
Tags : veracode, security, devops, application security
     Veracode
By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate Ė a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organizationís DevOps practice, Tenable encourages you to read the Gartner report, ď10 Things to Get Right for Successful DevSecOps.Ē Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and misconĀgurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : secure devops, gartner, analyst report, container security
     Tenable
By: Tenable     Published Date: Mar 07, 2018
"Learn how you can accelerate development and strengthen security Ė without disrupting your operations. Organizations that effectively meld DevOps and InfoSec can shift security from an afterthought to an integrated, automated, and proactive practice. By reading this paper from IDG, youíll learn three reasons why DevOps is a game-changer for security and steps you can take foster a more collaborative and proactive approach to securing your enterprise. Topics covered include: - Adapting security testing tools and processes to the developer - Automating security into the CI/CD toolchain - The impact of secure DevOps on your bottom line - Increasing security awareness and commitment across teams This paper provides high-level guidance for DevOps and InfoSec professionals seeking collaborative, efficient approaches for strengthening application and information security."
Tags : secure devops, container security, docker, infosec
     Tenable
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics