Automation course at Parkurbis started this week

Automation course at Parkurbis started this week

August 29, 2022

ITCenter Academy started this week the Automation course at Parkurbis, Covilhã‘s Science and Technology Park.

The academy aims to give trainees skills in new technologies, through theoretical and practical components, so that at the end of the course they will be integrated in ITCenter.

We marked the beginning of the training with a small reception to welcome the trainees. In addition, we had the presence of Isabel Barrau and Adelina Felizardo from IEFP, and Jorge Ramos from Parkurbis.

We would like to thank these two entities for all the support given to launch this course in Covilhã!

Application Control and Traffic Prioritization for Technology Integrators

August 29, 2022

While configuring two Data Centers of a Telecom Operator, we needed a solution that could ensure customer SLAs, guarantee quality of service and experience to end customers even under attack, and minimize network expansion costs.

The Allot Traffic Intelligence and Assurance was the solution of choice, as it allows our customers to have:

  • Centralized management
  • Granular network visibility
  • High availability
  • Traffic control
  • Advanced analysis and real-time traffic monitoring
  • DDoS attack protection and mitigation

Building a future-ready rural broadband infrastructure

December 6, 2022

Networks, both large and small operators, are navigating a series of simultaneous technology transitions.  Operators will have to juggle all those transitions to a great or lesser extent, while also trying to expand substantially into challenging service areas.

The present report explores key considerations facing rural operators as they navigate a massive influx of funding during a time of multiple network technology transitions, and how operators are strategizing to make the highest and best use of those tax dollars in the context of the total cost of ownership (TCO).

Cloud Native Computing Foundation (CNCF)

August 29, 2022

ITCenter was back at the Cloud Native Computing Foundation (CNCF) flagship conference, which took place in Valencia on May 2022.

Better known as KubeCon, this event gives the community the opportunity to present the projects developed, as well as improvements in the areas of infrastructure, cloud and open source.

It allows knowledge sharing and interaction with colleagues, who expose their thoughts on the progress and future of these new technologies.

Stay tuned on our social media networks!

Cloud Pak for Business Automation

End-to-end business automation to accelerate growth and performance
December 14, 2022

IBM Cloud Pak for Business Automation is a solution created by IBM that helps clients accelerate growth and performance with end-to-end business automation.

This solution was built to help business and IT teams to:

  • Identify opportunities for improvement
  • Apply automation to key areas for greater business impact
  • Create business applications to quickly address changing environments
  • Optimize your workforce with AI-powered end-to-end automation

Features and benefits

  • Process mining and modeling
  • RPA and digital employees
  • Operational intelligence
  • Core automation

IBM Cloud Pak for Business Automation is part of the IBM Automation platform. Tap into IBM’s shared automation services to get insight into how your processes run, visualize hotspots and bottlenecks, and use financial impact information to prioritize which issues to address first.

To learn more about IBM Cloud Pak for Business Automation, please get in touch.

Cloud Security Report 2022

December 6, 2022

Organizations continue to shift workloads to the cloud at a rapid pace to achieve faster time to market, increased responsiveness, and cost reductions. With the majority of organizations expected to have more than half their workloads in the cloud within the next 12-18 months, it is no surprise that cloud security remains a top concern.

Consider the insights uncovered in this report:

• Most organizations continue to pursue a hybrid or multi-cloud strategy to integrate multiple services, for scalability, or for business continuity reasons. Seventy-six percent are utilizing two or more cloud providers.

• Cloud users confirm that the cloud is delivering on the promise of flexible capacity and scalability, increased agility, and improved availability and business continuity.

• Security professionals highlight lack of visibility, high cost, lack of control, and lack of security as the biggest unforeseen factors to slow or stop cloud adoption.

• Cloud security continues to be a significant concern for cybersecurity professionals. 

Cost of a Data Breach Report 2022

December 6, 2022

IBM and Ponemon Institute come together every year to build research about keeping up with changing technology and events. The companies also try to form a more relevant picture of the risks and strategies for securing data and responding to a breach, from artificial intelligence (AI) to zero trust.

Can discover a new analysis related the following:

  • Extended detection and response (XDR)
  • The use of risk quantification techniques
  • Impacts of individual technologies that contribute to a zero-trust security framework, such as identity and access management (IAM) and multifactor authentication (MFA)

Furthermore, the report takes a broader look at: 

  • Leading contributors to higher data breach costs and staring at the effects of supply chain compromises and the security skills gap.
  • Examines areas of security vulnerability from the cloud to critical infrastructure. 
  • Take a deeper dive than in past years into the impacts of ransomware and destructive attacks. 
  • Analyzed is the phenomenon of remote work that continues to be a reality for many organizations past the peak of the COVID pandemic.

As companies experience more breaches and costs continue to climb, this report can provide as a tool to help teams better manage risk and limit potential losses.

Creating a modern data lake with PowerScale and PowerFlex

December 6, 2022

Dell needed to consolidate its data analytics databases into a single data lake that would leverage Dell’s modern cloud technology to increase agility, efficiency, and capacity. Dell IT’s data organization is in the midst of a multi-year process to migrate data from the old legacy systems into a new modern environment centered on Dell EMC PowerFlex and Dell EMC PowerScale.

PowerFlex and PowerScale may turn out to be the key to the problems.

Dell aims to achieve results for the general benefit and has the following as its first steps:

  • Ability to tier storage;
  • Improved efficiency in scaling the environment;
  • Non-disruptive node maintenance and replacement.
  • Increased Hadoop service levels and performance while significantly reducing overall Hadoop platform costs.
  • PowerScale allows IT to replicate highest-priority Hadoop workloads, enabling disaster recovery.
  • PowerFlex provides high-performance and low latency for data lake applications and datasets.
  • PowerFlex provides a common platform for applications that complement the data lake.
  • PowerFlex and PowerScale mixed architecture takes up less data center space than traditional servers.

Cyber Attack Trends: 2022 Mid-Year Report

August 29, 2022

Takes a closer look at how cyberattacks have intensified in the first half of this year, with a 42% global increase in attacks, and highlights global trends.

While many organizations have continued to grapple with the security challenges brought about by digital transformation and the race to the cloud, the first six months of 2022 started with the continued fallout of Log4j, one of the most serious zero-day vulnerabilities ever seen. Sadly, one of the most era-defining moments of 2022 so far though, has been the ongoing Russia-Ukraine war. Its impact on the cyber landscape has been unprecedented.

  • Global increase in cyberattacks: In the first half of the year, there was a 42% increase in weekly cyberattacks globally, with every region experiencing a significant escalation.
  • Cyberattacks entrenched as a state-level weapon: Cyber warfare has intensified to become an essential part of the preparation for, and conduct of, actual military conflict. The report delves into what this means for governments and enterprises all over the world, even those that are not directly involved in the war.
  • Ransomware is the number one threat: This year, ransomware actors have stepped up to nation-state level, targeting the entire countries of Costa Rica and Peru. The huge potential for financial gain means that ransomware is going to be around for a long time and will only get worse.
  • Incident Response (IR) perspective: For the first time, we have included a chapter from our Incident Response team. Unlike the analyses and trends discussed throughout the rest of the report, this chapter offers a unique insight as the IR team’s work is vendor-agnostic and looks at the full lifecycle of a cyberattack - not just attempted ones.
  • Cloud supply chain attacks: Supply chain attacks started to meet the cloud arena in 2022 with the breach of cloud-based identity management platform, Okta. The most prominent supply chain risk we are seeing, though, comes from modules in the open-source community that are not properly vetted or managed.
  • Major disruption to everyday lives: Cybercriminals have caused real harm to civic life in 2022. From attacks on essential services including healthcare and stopping medical appointments, to attack on Lincoln College in the US, resulted in the college closing its doors after 157 years.

Check Point’s team of experts have provided their predictions, from a tsunami of state-sponsored attacks to the first malicious activity in the Metaverse, so that we can all get prepared now for what’s to come.