Moving data is one essential task for enterprises today, especially if you're using lots of different systems across many locations. One product for this is IBM MQ, which helps you move data dependably with secure messaging. Deploying a highly available IBM MQ cluster...
Category:
What is EDR? (And is it Failing?)
The term EDR - Endpoint Detection and Response - only entered the vocabulary of computer security a few years ago and still causes some confusion among customers entering into the crowded field of enterprise security solutions. What, exactly, is EDR? How is it...
Recursion Pharmaceuticals accelerates drug discovery with Google Cloud
Despite advances in scientific research and medical technology, the process of drug discovery has become increasingly slower and more expensive over the last decade. While the pharmaceutical industry has spent more money on research and development each year, this has...
Exploring container security: How DroneDeploy achieved ISO-27001 certification on GKE
Editor's note: Aerial data mapping company DroneDeploy wanted to migrate its on-premises Kubernetes environment to Google Kubernetes Engine--but only if it would pass muster with auditors. Read on to learn how the firm leveraged GKE's native security capabilities to...
Active EDR – Feature Spotlight
Today we are pleased to announce the revolutionary technology of ActiveEDR. ActiveEDR solves the problems of EDR as you know it by tracking and contextualizing everything on a device. ActiveEDR is able to identify malicious acts in real time, automating the required...
Intel Inside – SentinelOne Cryptominer Detection
Cryptominers are illegally used for Cryptojacking, the process by which an attacker secretly launches cryptocurrency mining software on a target system. The software consumes processor cycles to process cryptocurrency transactions, thus earning the attacker a...
Let Deep Learning VMs and Jupyter notebooks burn the midnight oil for you: robust and automated training with Papermill
In the past several years, Jupyter notebooks have become a convenient way of experimenting with machine learning datasets and models, as well as sharing training processes with colleagues and collaborators. Often times your notebook will take a long time to complete...
OpenVPN: Enabling access to the corporate network with Cloud Identity credentials
Editor's note: Cloud Identity, Google Cloud's identity as a service (IDaaS) platform, now offers secure LDAP functionality that enables authentication, authorization, and user/group lookups for LDAP-based apps and IT infrastructure. Today, we hear from OpenVPN, which...
Reach Me
Request a Call Back by filling out and submitting the following form.







