Remove Blog Remove Disaster Recovery Remove Firewall
article thumbnail

Continuous Monitoring – Part 2

CTOvision

“Making sense” means a number of things here – understanding and remediating vulnerabilities, detecting and preventing threats, estimating risk to the business or mission, ensuring continuity of operations and disaster recovery, and enforcing compliance to policies and standards. This post first appeared at George Romas’ HP blog.

article thumbnail

Fountainhead: Infrastructure Orchestration in use within SPs.

Fountainhead

Today, the service provider houses over 1,425 virtual servers running on 70 industrystandard Egenera servers, 370 terabytes of storage and 1,250 virtualized firewalls. Along with enabling server consolidation, the software is delivering superior high availability (HA) and disaster recovery (HA). Subscribe to this blog.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Linux Academy Monthly Update – October

Linux Academy

If you have stories like that, leave them in the comments for this blog, or in the comments section on our YouTube channel for this month’s video. Backup and Recovery Using RSync . Securing a Virtual Network with Azure Firewall . Using Ansible Firewalls Rules. Configuring Azure Storage for Backups . Ansible Cron.

Linux 13
article thumbnail

Technology Short Take 132

Scott Lowe

” Speaking of Linux networking…Marek Majkowski of Cloudflare digs deep into conntrack , used for stateful firewalling functionality. This Docker blog post has more details. ” Ivan Pepelnjak attempts to answer the question, “How much do I need to know about Linux networking?” Servers/Hardware. Programming.

article thumbnail

Technology Short Take #35

Scott Lowe

A discussion of “statefulness” brought me again to Ivan’s post on the spectrum of firewall statefulness. His follow-up article on disaster recovery of DCE VM with vCHS is also pretty good. Art Fewell takes a deeper look at the increasingly important role of the virtual switch. Very good stuff!

Vmware 60
article thumbnail

Domains of Cybersecurity : A Brief Overview | Hacking into Cybersecurity

Linux Academy

Think about all the controls we have in place on our networks today: firewalls, authentication systems, intrusion detection and prevention systems (network- and host-based), router and switch security, operating system security, data encryption — the list goes on and on. It’s in this domain that we lump the following: Firewalls.