Glad You're Ready. Let's Get Started!

Let us know how we can contact you.

Thank you!

We'll respond shortly.


Encrypting Data-at-Rest In Pivotal Greenplum With Protegrity

Data breaches and regulatory concerns have increased the need for companies to protect sensitive data, and this applies to big data as well. For large data warehouses and data science platforms, like Pivotal Greenplum, the same security concerns apply. In this post, Pivotal Greenplum experts Scott Kahler and Ian Redzic explain how Protegrity’s encryption works in the context of Pivotal Greenplum.

Read More

How Pivotal Web Services Just Improved The Security Of Your Platform

How up-to-date are your application environments? When's the last time you updated the operating system or loaded the latest Java runtime? If your team is like most, the answer is "not often enough." The Pivotal Web Services (PWS) team has come up with a new, built-in service for PWS users that uses Concourse continuous integration pipelining and buildpacks to automatically update known environments as quickly as the patches are made available, helping to curtail vulnerability for security breaches in your apps.

Read More

Pivotal Cloud Foundry’s Roadmap For 2016

This post and video recaps Pivotal's Onsi Fakhouri’s, vice president of cloud research & development, overview and roadmap for Pivotal Cloud Foundry. An edu-taining presentation that is in a style closer to Pixar than Powerpoint, Onsi explains how Pivotal is transforming how the world builds software and is eliminating the lion share of the burden of software development—letting developers and operators return their focus to just the code.

Read More

Quotas Vs. Trust

Often the needs of developers clash with the fiscal responsibilities of budget owners. Developers want to move quickly, acquiring their resources as fast as possible and moving onto addressing the software needs for the business. Meanwhile, those with fiscal responsibility are looking to safeguard spend and want to ensure those resources are used efficiently. How do we best handle that tension? What capabilities exist within Pivotal Cloud Foundry® (PCF) to help with this? In this episode, host Simon Elisha explores these concepts and recommends best practices for handling it effectively.

Read More

How Cloud Native Platforms Help With Compliance And Security

In this post, Pivotal’s Cloud Native expert, Michael Coté, recaps a recent post he wrote in FierceDevOps. While compliance, security, and audits are very annoying processes for many development teams, there are good reasons these controls are put in place. The good news is, cloud application platforms can actually help make these processes better for everyone.

Read More

Graph Mining For Detecting Coordinated Network Attacks

In this series of blog posts, Pivotal’s Jin Yu and Anirudh Kondaveeti discuss how data science techniques can be used to detect network security threats. This post introduces the use of graph mining techniques to discover suspicious domain interaction structures, which may not necessarily be captured in sequential patterns. Specifically, we are interested in detecting highly connected domain social networks to flag potential coordinated attacks such as watering hole attacks and also small isolated networks that resemble a botnet-like structure.

Read More

A Quick Tour Of Partner Services In PCF

One of the great things about Pivotal Cloud Foundry® (PCF) is how easy it is for 3rd parties to add in new capabilities. In particular, by using the Operations Manager to easily import, install and expose new services to users of the platform. In this episode, host Simon Elisha look at some of the new services available including products for source control, artifact repositories, log management and more.

Read More

Enterprise-Grade Single Sign-On For Pivotal Cloud Foundry Applications

We are pleased to announce the general availability of the Pivotal Single Sign-On service for Pivotal Cloud Foundry. This service allows applications running on Pivotal Cloud Foundry to integrate with enterprise identity providers for authentication and SSO with extraordinary simplicity.

Read More

Sequential Pattern Mining Approach for Watering Hole Attack Detection

As malware techniques continue to evolve, it becomes increasingly challenging to detect network security threats, especially Advanced Persistent Threats (APTs) that are orchestrated by sophisticated adversaries. An increasingly common strategy adopted by APT actors to carry out targeted attacks is the watering hole technique. Watering hole attacks target a group of users in an organization by infesting the websites that are most often visited by these users. In this blog post, Anirudh Kondaveeti and Jin Yu discuss the application of sequential pattern mining to detect coordinated network attacks such as watering hole attacks.

Read More

Pivotal Perspectives—Pivotal Cloud Foundry 1.4: A Potted Tour

A platform is only useful to developers if it is kept up to date. This week, host Simon Elisha updates us on the new features and capabilities in the PCF 1.4 release. Goodies include logging changes, security updates, AutoScaling and many more.

Read More