Just last year, both the U.S. Federal Reserve and the Basel Committee published reports on “Sound Practices to Strengthen Operational Resilience” and “Principles of Operational Resilience.” Both highlighted the increasing need to improve vulnerable infrastructures in a hostile online environment. The Current State of Compliance Automation Now, the Bank of England is introducing its own… Continue reading How Automation Simplifies Network Compliance in the Financial Sector
Category: Security
How Automation Simplifies Network Compliance in the Financial Sector
Operational Resilience has always been the goal of any financial institutions IT Team but achieving “always available” and “always secure” is more complicated to achieve than many would expect. With new regulatory rules coming into force that compels financial institutions to demonstrate their ability to recover from service outages and security breaches, a big spotlight… Continue reading How the UK Financial Services Sector Should Prepare for Operational Resilience
How the UK Financial Services Sector Should Prepare for Operational Resilience
What is SecOps? Security operations, or SecOps, is an approach to enterprise IT management that facilitates collaboration between an organization’s IT operations and IT security teams. SecOps recognizes that the security of an enterprise is enhanced when infrastructure is operating at peak efficiency, systems are discovered and monitored in real-time, and all data related to IT operations is accurate. Today’s enterprises… Continue reading SecOps for Safer, More Efficient ITOps
SecOps for Safer, More Efficient ITOps
Entertainer Jim Stafford had a hit song in 1974 entitled “Spiders and Snakes.” I was thinking that would be a good song to put on a playlist for the ScienceLogic crew that takes the road trip to the Department of Defense Test Integration Center (TIC) in Fort Huachuca, located in the desert of southeast Arizona.… Continue reading ScienceLogic’s DoDIN APL Certification Journey: Watch out for Spiders & Snakes
ScienceLogic’s DoDIN APL Certification Journey: Watch out for Spiders & Snakes
ScienceLogic invests a lot of time and resources into the processes required for approval as a Department of Defense Information Network (DoDIN) vendor. There’s a lot at stake for a high-tech military that relies on its network for managing the demands of modern warfare, including keeping critical systems and information safe. We need to continuously… Continue reading DoD-Worthy Interoperability & Cybersecurity Standards: What Does It Mean to Our Customers?
DoD-Worthy Interoperability & Cybersecurity Standards: What Does It Mean to Our Customers?
Over the past few releases, the ScienceLogic SL1 platform has assembled a foundation for building and executing workflow automations including: A scalable automation workflow framework (SL1 PowerFlow) Out-of-the-box workflows for automated ticketing, case management, event management, service onboarding, noise reduction, and CMDB upkeep (Synchronization PowerPacks for ServiceNow and other ticketing platforms) A low-code workflow authoring… Continue reading SL1 Duomo Release: Fueling Your Flight to AIOps with Workflow Automations
SL1 Duomo Release: Fueling Your Flight to AIOps with Workflow Automations
DoDIN Approved Product List (APL) Overview The role of the U.S. government as a major consumer of enterprise technology hadn’t gotten much attention, until the last few years. It would be easy to assume that selling and integrating technology in federal environments was not a focus for technology vendors, or that federal enterprises were the… Continue reading Department of Defense Information Network (DoDIN) Approved Products List (APL): What is it and Why it Matters
Department of Defense Information Network (DoDIN) Approved Products List (APL): What is it and Why it Matters
Security is a fundamental tenet for any organization that develops technologies for deployment in today’s enterprises. It’s not enough to have a good idea and to build an appliance, create a service or application, or write code that manifests that idea for customers that find it worthwhile. The product must be hardened against the many… Continue reading Modernizing Your IT Operations with a Secure Foundation
Modernizing Your IT Operations with a Secure Foundation
These teams design, plan, test, configure, deploy, monitor, and adjust critical network devices on a frequent basis so their traffic loads and service levels are continuously met. In the world of hybrid cloud, this includes managing a complex fabric of edge and core routers/switches as well as key connection points between data centers, WAN providers,… Continue reading Facebook Outage: The Case for Configuration & Change Management
Facebook Outage: The Case for Configuration & Change Management
Over the weekend, a major data breach occurred—leaving government agencies and enterprises vulnerable. What can we learn from this event?