Glad You're Ready. Let's Get Started!

Let us know how we can contact you.

Thank you!

We'll respond shortly.

Point Of View Blog
Quotas Vs. Trust

Often the needs of developers clash with the fiscal responsibilities of budget owners. Developers want to move quickly, acquiring their resources as fast as possible and moving onto addressing the software needs for the business. Meanwhile, those with fiscal responsibility are looking to safeguard spend and want to ensure those resources are used efficiently. How do we best handle that tension? What capabilities exist within Pivotal Cloud Foundry® (PCF) to help with this? In this episode, host Simon Elisha explores these concepts and recommends best practices for handling it effectively.

Read More

How Cloud Native Platforms Help With Compliance And Security

In this post, Pivotal’s Cloud Native expert, Michael Coté, recaps a recent post he wrote in FierceDevOps. While compliance, security, and audits are very annoying processes for many development teams, there are good reasons these controls are put in place. The good news is, cloud application platforms can actually help make these processes better for everyone.

Read More

Graph Mining For Detecting Coordinated Network Attacks

In this series of blog posts, Pivotal’s Jin Yu and Anirudh Kondaveeti discuss how data science techniques can be used to detect network security threats. This post introduces the use of graph mining techniques to discover suspicious domain interaction structures, which may not necessarily be captured in sequential patterns. Specifically, we are interested in detecting highly connected domain social networks to flag potential coordinated attacks such as watering hole attacks and also small isolated networks that resemble a botnet-like structure.

Read More

A Quick Tour Of Partner Services In PCF

One of the great things about Pivotal Cloud Foundry® (PCF) is how easy it is for 3rd parties to add in new capabilities. In particular, by using the Operations Manager to easily import, install and expose new services to users of the platform. In this episode, host Simon Elisha look at some of the new services available including products for source control, artifact repositories, log management and more.

Read More

Enterprise-Grade Single Sign-On For Pivotal Cloud Foundry Applications

We are pleased to announce the general availability of the Pivotal Single Sign-On service for Pivotal Cloud Foundry. This service allows applications running on Pivotal Cloud Foundry to integrate with enterprise identity providers for authentication and SSO with extraordinary simplicity.

Read More

Sequential Pattern Mining Approach for Watering Hole Attack Detection

As malware techniques continue to evolve, it becomes increasingly challenging to detect network security threats, especially Advanced Persistent Threats (APTs) that are orchestrated by sophisticated adversaries. An increasingly common strategy adopted by APT actors to carry out targeted attacks is the watering hole technique. Watering hole attacks target a group of users in an organization by infesting the websites that are most often visited by these users. In this blog post, Anirudh Kondaveeti and Jin Yu discuss the application of sequential pattern mining to detect coordinated network attacks such as watering hole attacks.

Read More

Pivotal Perspectives—Pivotal Cloud Foundry 1.4: A Potted Tour

A platform is only useful to developers if it is kept up to date. This week, host Simon Elisha updates us on the new features and capabilities in the PCF 1.4 release. Goodies include logging changes, security updates, AutoScaling and many more.

Read More

This Month In Data Science—April, 2015

The impact of data science and big data technologies was felt far and wide in May, with applications ranging from determining the latest fashions, to sensor-connected lighting, and even to entirely new forms of food. Here’s our roundup of the biggest data science news of the month, both from within Pivotal and beyond.

Read More

Pivotal Data Science Team Iterates Faster, Beats Existing Malware Detection Tools

This post provides a case study in innovative IT security practices for a small, 6-week project. The challenges, approach, and outcomes of this data science-driven effort show how an innovative use of algorithms can do a better job detecting malware than existing, best-in-class malware detection tools and operate much faster than existing customer models within Apache Hive™. Using an accelerated, agile, and iterative development approach with methods borrowed from graph theory, natural language processing (NLP) and anomaly detection, we implemented in a highly parallelized way on Pivotal Greenplum Database, the team from Pivotal Data Labs quickly achieved significant results for this global insurance company.

Read More

All Things Pivotal Podcast Episode #17: Pivotal CF–Orgs, Spaces & Roles

In this episode, we take a quick look at how Orgs and Spaces work in Pivotal CF to help you organise all of your development efforts—to implement quotas where required, and to segment environments into development, test, production. In addition, we will also look at the kinds of role-based access control (RBAC) you can implement to ensure that users access just the resources that they need—and no more.

Read More