Trust


Docker in Production with the Trusted Cloud Platform

Docker containers are all the rage these days. These containers offer the speed and flexibility that developers crave, which is why the Docker Hub has received over 2 billion pulls since 2013!

While the hype is well-deserved, Docker containers are used more in test/dev environments—not in production. Why is this?

Mark Thiele States Don't Forget to Invest in Your IT

Quick! Which is cheaper? The public cloud or on-premises infrastructure?

Not so fast. Before you scoff and say “Public cloud, naturally,” you might want to hear what Mark Thiele, Apcera’s Chief Strategy Officer, recently had to say on the subject.

The Policy-Led Approach to Securing Workloads and Infrastructure

Securing and governing workloads and infrastructure have been long-standing challenges for IT organizations. With the adoption of new application environments and architectures, traditional security measures can no longer scale with the speed and complexity of your business.

Why Apcera & Why Now?

You might be wondering, "what is Apcera doing that Mark found so interesting?” Those of you who have been participating in the industry with me, following my twitter feed or reading my blogs will know that I’ve had a fascination with the strategic business value of cloud for many years now. Some of you who were paying closer attention might have noticed that I was a very early adopter of the idea that enterprises would end up needing to manage a heterogeneous application delivery environment (aka hybrid). In fact, I’ve been thinking hybrid since 2009.

Building a Trusted Fabric for Containers with Kubernetes

As you may have read, Apcera will be integrating with Kubernetes to provide a trusted fabric for containers. This is a BIG DEAL for us and a big bet on the future of cloud computing. It comes after I joined the Governing Board of the Cloud Native Computing Foundation - the recently new custodian of Kubernetes - to become more personally involved in the project.

Here’s the backstory.

How Policy Would Have Prevented Target’s Data Breach

In 2013’s highly publicized Target breach, hackers gained access to tens of millions of customer credit card records stored on a point-of-sale (POS) system network belonging to Target Corporation. In this case, as in other similar attacks, the hackers used an open “back door” to access customer data. Target, like any number of large companies, has many partners and suppliers with which it exchanges parts, pricing and related information every day via online data communications. One of Target’s vendors, an HVAC services supplier, unwittingly ended up being the back door the bad guys used.

Pages