Resources

Article

Perspectives on the Changing Linux Ecosystem

Media Image Text In the early 1990s the Open Software Foundation formed a committee to select and standardize a new Management Platform Toolset for and from the UNIX ecosystem....
Case Study

Robot HA Keeps Nesco Resource Out of Harm’s Way

Nesco Resource is one of the leading national staffing and employment agencies offering services in temporary staffing, direct hire, and a host of other staffing and recruiting solutions. Through its 100+ branches, the Cleveland, Ohio-based company has 60,000 people annually on its paycheck roster. ...
Datasheet

Robot HA

Robot HA is a software-based high availability solution that allows you to replicate your important data and keep business running even when your production environment goes down.
Guide

Controlling SSH for Security and Compliance

SSH is nearly ubiquitous in today’s enterprises, and is the predominant tool for managing unix and linux servers, and the applications and data that they host. Poor practices around the deployment and management of the SSH infrastructure could easily leave your enterprise vulnerable to a breach. Are you in control? SSH, Secure Shell protocol, is now nineteen years old and...
Article

Sudo or SuDon't: Manage Your Privileged Command Execution and Sudo Policies

System admins need root level authority at all times, system operations staff needs periodic database and application account authority, and security admins needing to protect the environment are some of the few of the challenges of managing privilege in the enterprise server infrastructure. Read this article to learn more about Sudo alternatives.
Article

Managing IT Access Privileges

Image THE UNSOLVED PROBLEM Secure, private, effective use of computers by a company (including hosted, cloud and other services as well as the company’s own systems) relies on managing access privileges. The problem isn’t unique to computers. Office buildings, hotels, apartments and college dorms, for example, typically have “master...
Article

Solving Healthcare Security Concerns

According to a recent KPMG report, four-fifths of executives at healthcare providers and payers say their information technology has been compromised by cyberattacks. That same report presents how the increased risk to healthcare organizations relates to the richness and uniqueness of the information that health plans, doctors and hospitals handle. Apart from typical financial...
Article

New Approaches to the SWIFT and PCI-DSS Framework

Image THE WORLD OF COMPLIANCE At the official start of summertime 2016 in Britain we are starting to consume the labour of last autumn, five gallons of alcoholic homemade cider (yum!) made from eight apple varieties grown in mine and my neighbors’ gardens. I’m very VERY careful sterilizing glassware, containers, and buckets: there...
Article

Pros and Cons for Puppet's Configuration Management & Security

Image THE GOOD, THE BAD AND THE UGLY I was at the Red Hat Summit in Boston at the end of June. We had a lot of activity at our exhibitor stand, and a lot of discussions being passed on to me by our sales team I continued to have the same conversation again and again over the three days. This seems to be the year people have finished...
Blog

How DR Compliance Requirements Impact HA Decisions

Disaster recovery requirements are part of the geographic and industry regulations that affect our organizations. Having the right solutions in place can help to avoid penalties and make audits go smoothly. Read on to create a complete compliance toolkit.
Article

How Recoverable Is My IBM i?

See how a two-pronged approach using data backups and a high availability solution could deliver the strongest disaster recovery strategy for your organization.