Itential announced its integration with Red Hat Ansible Network Automation: TFiR HighLights


Itential announced its integration with Red Hat Ansible Network Automation at AnsibleFest 2018. With this integration, both network engineering and IT operations teams would be able to create and execute network automation capabilities without writing code.

By using common APIs to “handshake” Itential and Red Hat Ansible technologies, organizations can apply low-code methods and intelligent capabilities to networking automation. This can help teams to accelerate their organization’s movement toward a software-driven network operations practice, the company said.

Source: Itential

SUSE Enterprise Storage 5.5 is now available. The easy-to-manage software-defined storage solution, powered by Ceph technology, contains performance, stability and management improvements – including openATTIC enhancements and OpenStack integration – that help customers reduce costs and give them confidence to deploy open source enterprise storage at scale.

Production support for CIFS/Samba for Ceph is also included, further expanding SUSE Enterprise Storage’s ability to service non-Linux environments, particularly Windows. Version 5.5 has industry-first support for heterogeneous Ceph deployments (non-SUSE RBD and CephFS clients), enhanced security with embedded support of Linux kernel security module AppArmor, and the ability for the system to notify customers of events that are pre-determined and configured by the user. Documentation has been translated into additional languages reflecting SUSE’s growing global market.

Source: SUSE

Majority of enterprises are highly vulnerable to security events caused by cloud misconfiguration, according to Fugue’s Cloud Infrastructure Misconfiguration Report. Critical data breaches and system downtime events were among the many reported negative outcomes of misconfiguration, revealed the survey of more than 300 IT professionals.

The survey found that while 92 percent of IT and security professionals reported concerns about security risks due to misconfiguration, fewer than a third are continuously monitoring for misconfiguration. And while 82 percent reported security and compliance incidents due to cloud infrastructure misconfiguration, few enterprises have automated remediation processes that can prevent them. While 51 percent of teams report a frequency of 50 or more misconfigurations daily, half of the teams surveyed only review alerts and remediate issues on a daily – or even longer – timeframe, leading to dangerously long infrastructure vulnerability periods. Very few believe their Mean Time to Remediation (MTTR) for cloud misconfigurations is where it should be to keep infrastructure secure and compliant.

Among the top causes of cloud misconfiguration cited were human error (64 percent), lack of policy awareness (54 percent), and challenges in governing multiple interfaces to cloud APIs (47 percent). And, while teams are often devoting the equivalent of at least one full-time engineer to managing cloud misconfiguration, 68 percent report delays in remediation critical issues, and 79 percent report that critical misconfiguration events are still being missed.

Source: This has come via mail. What should be the source here?