Glad You're Ready. Let's Get Started!

Let us know how we can contact you.

Thank you!

We'll respond shortly.

A Quick Tour Of Partner Services In PCF

One of the great things about Pivotal Cloud Foundry® (PCF) is how easy it is for 3rd parties to add in new capabilities. In particular, by using the Operations Manager to easily import, install and expose new services to users of the platform. In this episode, host Simon Elisha look at some of the new services available including products for source control, artifact repositories, log management and more.

Enterprise-Grade Single Sign-On For Pivotal Cloud Foundry Applications

We are pleased to announce the general availability of the Pivotal Single Sign-On service for Pivotal Cloud Foundry. This service allows applications running on Pivotal Cloud Foundry to integrate with enterprise identity providers for authentication and SSO with extraordinary simplicity.

Sequential Pattern Mining Approach for Watering Hole Attack Detection

As malware techniques continue to evolve, it becomes increasingly challenging to detect network security threats, especially Advanced Persistent Threats (APTs) that are orchestrated by sophisticated adversaries. An increasingly common strategy adopted by APT actors to carry out targeted attacks is the watering hole technique. Watering hole attacks target a group of users in an organization by infesting the websites that are most often visited by these users. In this blog post, Anirudh Kondaveeti and Jin Yu discuss the application of sequential pattern mining to detect coordinated network attacks such as watering hole attacks.

Pivotal Perspectives—Pivotal Cloud Foundry 1.4: A Potted Tour

A platform is only useful to developers if it is kept up to date. This week, host Simon Elisha updates us on the new features and capabilities in the PCF 1.4 release. Goodies include logging changes, security updates, AutoScaling and many more.

This Month In Data Science—April, 2015

The impact of data science and big data technologies was felt far and wide in May, with applications ranging from determining the latest fashions, to sensor-connected lighting, and even to entirely new forms of food. Here’s our roundup of the biggest data science news of the month, both from within Pivotal and beyond.

Pivotal Data Science Team Iterates Faster, Beats Existing Malware Detection Tools

This post provides a case study in innovative IT security practices for a small, 6-week project. The challenges, approach, and outcomes of this data science-driven effort show how an innovative use of algorithms can do a better job detecting malware than existing, best-in-class malware detection tools and operate much faster than existing customer models within Apache Hive™. Using an accelerated, agile, and iterative development approach with methods borrowed from graph theory, natural language processing (NLP) and anomaly detection, we implemented in a highly parallelized way on Pivotal Greenplum Database, the team from Pivotal Data Labs quickly achieved significant results for this global insurance company.

All Things Pivotal Podcast Episode #17: Pivotal CF–Orgs, Spaces & Roles

In this episode, we take a quick look at how Orgs and Spaces work in Pivotal CF to help you organise all of your development efforts—to implement quotas where required, and to segment environments into development, test, production. In addition, we will also look at the kinds of role-based access control (RBAC) you can implement to ensure that users access just the resources that they need—and no more.

Build Newsletter: Predictions, Security, Mobile, Agile, & DevOps – January 2015

“Build” is the monthly newsletter from Pivotal that provides a snapshot of the most relevant news and trends for architects and developers. This month we look at 2014 year-end reviews and 2015 predictions, top news about breaches, as well as other important news and articles on mobile, agile, and devops in the areas that are making the biggest impact in software development and architecture today.

Taking Security to the Next Level—Application Security Groups

In this post, Abby Kearns, one of our Technical Product Marketers, provides an overview of how Application Security Groups work within Pivotal Cloud Foundry. She explains how every application request goes through the Pivotal Cloud Foundry firewall, allow rules, whitelisting, configuration, deployment lifecycles, and more.

This Month in Data Science

Data science is a hyper-growth environment. In this month’s roundup of the most compelling data science stories in the last month, we cover the perspective of how companies are competing on data science, where research dollars are flowing, how to predict the path of diseases like Ebola based on cell phone data, the top trends in the sector, and plenty of examples of data science being applied at companies like Netflix, Spotify, McLaren as well as a variety of industries and use cases from real-time mobile video to churn prediction.