Get the premiere industry report that quantitatively defines the state of the modern application stack and the shift in technology used by enterprises adopting Cloud and DevSecOps. Cloud Architects, Operations/DevOps teams as well as Security Operations teams and practitioners can leverage this report as they look to effectively and securely build, run and secure modern applications and cloud infrastructures.
As cloud infrastructure grows and develops, reliable and safe management of containers across multiple cloud providers grows increasingly important - accelerating the adoption of Kubernetes (K8s). Orchestration technologies like Kubernetes (K8s) automate the deployment and scaling of containers, and they also ensure the reliability of applications and workloads running on containers.
Clorox is a $6 billion global consumer packaged goods (CPG) company that has operations in 25+ countries, approximately 8,800 employees across 83+ sites, with 33 manufacturing plants globally. Their computing environment is composed of approximately 1400 to 1500 Windows servers, ranging everywhere from 2003 all the way up to 2019. They run about 300 Linux servers in the environment with direct internet access at each of their locations, with a firewall at each of those sites. They have about 7,500 PCs, mostly laptops—predominantly Windows—with about 200 max in the environment.
Open source has come a long way. One of my favorite reports on the subject is Red Hat’s State of Enterprise Open Source. For 2020, 95% of respondents said that open source is strategically important to their business needs. Here, I will be recapping my recent Illuminate presentation about embracing open source data collection and I thought it’s important to first talk about how open source has changed.
In the wake of the widely publicized FireEye breach and the alarming SolarWinds supply chain attack, this presents an ideal opportunity for reflection on the broader shift taking place across the world—the transition from legacy on-prem infrastructures to the cloud. When a sophisticated nation-state obtains utilities intended for Red Team activities-- all but assuring nefarious intent-- it should give our community pause as to the collective state of security readiness should an attacker leverage such tools.
With almost every blog you read about monitoring, troubleshooting, or more recently, the observability of modern application stacks, you’ve probably read a statement saying that complexity is growing as a demand for more elasticity increases which makes management of these applications increasingly difficult.
Troubleshooting incidents in a modern AWS app is challenging given the diversity of AWS services in use and the dependencies between them. This customer session will lead AWS infra/DevOps engineers and SREs through a root cause exploration methodology and best practices that will reduce time to resolution.
Ever wondered how you compare with the rest of the industry when it comes to AWS services and security? Come see what Sumo Logic has to offer with our Global Intelligence Service for AWS. If you attended either our “Getting started with security at Sumo Logic” or “Leveraging the Sumo Logic platform for security and compliance” sessions, you’ll definitely want to see this unique capability in action!
Discover new ways to leverage Sumo Logic to assist your organization with achieving compliance toward cyber security frameworks, including NIST 800-53/171, HIPAA, ISO 27001, NIST CMMC, PCI-DSS, and SOX. By simply leveraging text panels within dashboards, you can simplify compliance by highlighting control elements covered by Sumo Logic queries. Save time spent on audit walkthroughs and measuring control effectiveness by using real-time compliance dashboards which can be easily shared with your internal and external auditors.