Remove Applications Remove Architecture Remove Firewall Remove Linux
article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

The CCA allows overarching enterprise functions and IT shared services to be assessed separately from the business unit’s products/applications that require PCI security compliance. In practice, IT architectural patterns give architects the building blocks to design any IT solution.

Financial 106
article thumbnail

Top Ten Ways Not To Sink the Kubernetes Ship

Linux Academy

As organizations increase their use of Kubernetes in public and Hybrid cloud architectures, it is important not to let a maiden voyage end like a Titanic catastrophe. Application services needed to access other services such as databases may then use these secrets for east-west peer-to-peer sessions within micro services environments.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

COMS002: Next Generation Cloud Infrastructure with Data Plane Virtualization

Scott Lowe

Verplanke believes that DPDK (Data Plane Development Kit) and virtualization are key to virtualizing workloads that move around lots and lots of packets, such as firewalls, routers, and other similar functions. In recent years, we’ve seen more devices running off-the-shelf software (like Linux). Intra-VM communication.

article thumbnail

Microsegmentation – Secure Your Internal Network

CTOvision

The problem is that threat actors are able to get through the castle gates (firewalls) and once in, are able to evade the castle guards (IPS). The argument is that today with the expansion of n-tier distributed systems and massively parallel architectures, east-west traffic has increased exponentially. Microsegmentation will fix this.

Network 150
article thumbnail

DockerCon 2016 Vendor Meetings

Scott Lowe

I’d heard of Plumgrid, but wanted to take this time to better understand their architecture. As it turns out, their architecture is quite interesting. Using eBPF, Plumgrid has created in-kernel virtual network functions (VNFs) that do things like bridging, routing, network address translation (NAT), and firewalling.

Meeting 60
article thumbnail

Technology Short Take #77

Scott Lowe

Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. Operating Systems/Applications. Flatpak is a (relatively) new application packaging/sandboxing mechanism for Linux applications. Not sure what a bastion host is? Read this post.)

Linux 60
article thumbnail

Technology Short Take #63

Scott Lowe

At DevOps Networking Forum 2016, I had the opportunity to share a presentation on some Linux networking options. Russell Pope at Kovarus recently wrote about using security groups to manage the VMware NSX distributed firewall. Operating Systems/Applications. Have fun reading! Networking. Servers/Hardware. Career/Soft Skills.

Vmware 60