Automating Security Compliance with Ease

Organizations today are seeking to increase productivity, flexibility and innovation to deliver services faster without sacrificing security, stability and performance. As hybrid IT environments continue to expand and evolve, security must be automated to scale and mitigate risks to achieve compliance and meet the needs of the business.

Why should security and compliance be automated? According to the 2017 Verizon Data Breach Report, “81% of hacking-related breaches leveraged either stolen and/or weak passwords”. Ensuring protection against stolen and/or weak passwords is preventable by defining and implementing strong password policies using automation. In this article by Gartner, “99% of the vulnerabilities exploited by the end of 2020 will continue to be ones known by security and IT professionals at the time of the incident”.  Automation can help enforce and ensure security and compliance and help protect against security vulnerabilities and security breaches.

Continue reading “Automating Security Compliance with Ease”

Application Modernization with Enterprise Linux

Special guest blogger: Ashish Nadkarni, Program Vice President, Worldwide Infrastructure Practice, IDC

Applications are crucial to the functioning of a modern enterprise. Firms that constantly evolve and update their application strategy are the ones that are successful at expanding their competitive differentiation in the digital economy. They infuse their applications portfolio with new-generation applications that run in the cloud, are delivered as microservices, leverage open-source technologies, and are increasingly (infrastructure) platform independent. During application design, the choice of database management systems (DBMS) and operating system environments (OSE) heavily influences the scalability and reliability of the overall stack.

Continue reading “Application Modernization with Enterprise Linux”

Sync vs. Trust: Red Hat Enterprise Linux Identify Management Integration with Active Directory

Identity Management in Red Hat Enterprise Linux (IdM) supports two different integration options with Active Directory: synchronization and trust.

I recently got a question about comparison of the two. I was surprised to find that I haven’t yet covered this topic in my blog. So let us close this gap!

Continue reading “Sync vs. Trust: Red Hat Enterprise Linux Identify Management Integration with Active Directory”

Immerse Yourself in Open IT Infrastructure at Red Hat Summit

Every year, Red Hat brings customers, partners, and some of the most knowledgeable Red Hatters to our annual event – Red Hat Summit. Next week in San Francisco, May 8-10, we expect thousands of people to join us to learn more about the latest technology trends and our product portfolio, to participate in various sessions, panels and labs, and to take part in numerous fun activities.

Continue reading “Immerse Yourself in Open IT Infrastructure at Red Hat Summit”

Red Hat Virtualization at Red Hat Summit 2018

Hi folks, in this post I wanted to share with you some of the cool activities we have happening next week at the Red Hat Summit in San Francisco. For virtualization there’s a ton of things going on – to say that we are ‘RHV’ed up is an understatement! (sorry, @RedHatRex wrote that joke…) Here’s a short video that will get you goin on RHV:

Continue reading “Red Hat Virtualization at Red Hat Summit 2018”

Red Hat Virtualization

Welcome to the fourth installment of the ITO series on the Red Hat Enterprise Linux blog. I started the IT Optimization saga with the basics- what does it mean to optimize IT? Then, I illustrated how having the right platform can help modernize your IT infrastructure by not only maintaining stability but also poised towards innovation. Last week, I talked about another key component of every IT infrastructure- Storage and how Red Hat Storage solutions can help your organization modernize storage and reduce cost. This week, let me walk you through a Red Hat offering that can dramatically decrease your IT spending- Virtualization.

Continue reading “Red Hat Virtualization”

How Red Hat Storage Fosters IT Optimization and Modernization

Happy Tuesday! Welcome to another new week and brand new post in the IT Optimization series. If you are new here, check out my first post, on what IT Optimization is and the latest post on the demand for a Modern OS. In this post, I will walk you through optimizing another key piece of your infrastructure – storage.

In my first post about IT Optimization, I likened IT infrastructure to a car. Let’s talk about trunk space for a second. Imagine that you are going camping with a couple of friends. You need a car with enough trunk space to fit all your gear, tents and backpacks. In this situation, you would do one of three things – own, rent or borrow an SUV. Owning an SUV for the sake of the occasional camping trip is expensive; a rental or borrowed car won’t have the same ease of driving as your own car. Now, what if you had a sedan, that could magically transform into an SUV, only when you needed it? Seems like a dream, right?

Continue reading “How Red Hat Storage Fosters IT Optimization and Modernization”

Red Hat Virtualization 4.2 Beta 3 is Available

We are pleased to announce the Beta 3 release of Red Hat Virtualization 4.2, the latest version of our Red Hat Virtualization platform. This follows the release of the Beta 2 on February 16 of this year, as we push closer to the public release of Red Hat Virtualization 4.2 in May.

While many of the new features were highlighted in the previous announcements in January and February, it is worth noting the addition of some additional new features to this beta release.

Continue reading “Red Hat Virtualization 4.2 Beta 3 is Available”

A Modern Operating Platform Fuels Innovation

In my last post, I walked you through my quest of understanding IT optimization and why there is a need to pursue it. I also hinted at how Red Hat products and solutions can help you both optimize and innovate. Before we dive into the specifics of optimization, let’s start where we left off last time–infrastructure. Now, there are a lot of different ways to slice and dice your It infrastructure, but, it’s elementary, my dear Watson (I guess that makes me the ITO Sherlock)! The first slice is the platform, which is the foundation of your entire infrastructure. The second is the storage, which hosts all your data and applications. The final slice is the deployment footprint of choice, which determines how your infrastructure is utilized and managed. In this post, I will talk about the foundational piece, which is the platform, and how Red Hat Enterprise Linux can help you modernize your platform.

Continue reading “A Modern Operating Platform Fuels Innovation”