Now Available: QuickStart Cloud Installer (QCI) 1.1

We’re pleased to announce the availability of QuickStart Cloud Installer (QCI) 1.1! This is the second release of QCI since its introduction on September 14, 2016.

Included with both Red Hat Cloud Suite and Red Hat Cloud Infrastructure entitlements, QCI is designed to simplify provisioning your private cloud infrastructure by orchestrating installation workflow across different products. Instead of installing each product in the suite separately, QCI provides an intuitive web-based graphical user interface for provisioning a fully functional cloud using any combination of components in

Continue reading “Now Available: QuickStart Cloud Installer (QCI) 1.1”

PCI Series: Requirement 2 – Do Not Use Vendor-Supplied Defaults for System Passwords and Other Security Parameters

This article is third in a series dedicated to the use of Identity Management (IdM) and related technologies to address the Payment Card Industry Data Security Standard (PCI DSS). This specific post covers the PCI DSS requirement related to not using vendor-supplied defaults for system passwords and other security parameters. The outline and mapping of individual articles to the requirements can be found in the overarching post that started the series.

The second section of the PCI-DSS standard applies to defaults – especially passwords and other security parameters. The standard calls for the reset of passwords (etc.) for any new system before placing it on the network. IdM can help here. Leveraging IdM for centralized accounts and policy information allows for a simple automated provisioning of new systems with

Continue reading “PCI Series: Requirement 2 – Do Not Use Vendor-Supplied Defaults for System Passwords and Other Security Parameters”

Identity Management and Related Technologies and their Applicability to PCI DSS

The Payment Card Industry Data Security Standard (PCI DSS) is not new. It has existed for several years and provides security guidelines and best practices for the storage and processing of personal cardholder data. This article takes a look at PCI DSS 3.2 (published in April of 2016) and shows how Identity Management in Red Hat Enterprise Linux (IdM) and related technologies can help customers to address PCI DSS requirements to achieve and stay compliant with the standard. If you need a copy of the PCI DSS document it can be acquired from the document library at the following site: www.pcisecuritystandards.org

In October of 2015 Red Hat published a paper that gives an overview of the PCI DSS standard and shows how Red Hat Satellite and other parts of the Red Hat portfolio can help customers to address their PCI compliance challenges. In this post I would like to expand on this paper and drill down into more detail about

Continue reading “Identity Management and Related Technologies and their Applicability to PCI DSS”

Cloud Solutions Made Simple

The recent release of Red Hat Cloud Suite marked a new milestone for Red Hat and our customers.  First, it is the first in what will become a family of suites. Second, it enables enterprise IT to transform their application development and operations toward an agile, innovation center based on hybrid cloud and devops technologies.  Curating a broad set of open source technologies, Red Hat Cloud Suite offers a turnkey Cloud solution with a container-based app-development platform, private-cloud infrastructure, and a common management framework.  Specifically, Red Hat Cloud Suite includes

Continue reading “Cloud Solutions Made Simple”

What is Deep Container Inspection (DCI) and Why is it Important?

The format of container images is at the center of industry attention because it is so important to the adoption of containers.  With the advent of the Open Container Initiative (OCI), it seems appropriate to compare container images to network protocols.  Before TCP/IP became the defacto standard network protocol stack, each vendor was left to devise their own.  Some leveraged IPX/SPX, while others standardized on AppleTalk.  This made it difficult to create robust tooling.  Much like network protocols, standardizing the bit level format of a container image, allows the industry to focus on higher level business problems, and more importantly, their respective solutions.

Continue reading “What is Deep Container Inspection (DCI) and Why is it Important?”

Exploring Red Hat Access Insights

With the release of Red Hat Enterprise Linux 6.7, we’re happy to also announce general availability of Red Hat Access Insights, a new hosted service from Red Hat designed to help customers proactively identify and resolve issues that could impact business operations.

Given the complexity and scale of modern IT environments, we recognize that it can be increasingly complicated to monitor, maintain, and secure enterprise infrastructure.  By tapping into Red Hat’s collective experience

Continue reading “Exploring Red Hat Access Insights”