Skip to main content
Blog

7 Ways Self-Service Automation Speeds Up DevOps & Empowers Platform Users

Self-service automation is a collection of tools that lets almost anyone automate common IT tasks. Here are seven ways it boosts DevOps productivity & satisfaction.
Platform Engineering, Ecosystems & Integrations
Blog

MFA Configuration: How Automation Lets You Configure & Enforce MFA Compliance at Scale

Multi-factor authentication (MFA) configuration can be a huge challenge for enterprise IT. Learn how an MFA enforcement policy as code keeps it all consistent.
Security & Compliance, Infrastructure Automation
Blog

How to Achieve Zero Trust Adoption in U.S. Government

Zero trust adoption is critical, especially for U.S. government agencies. With changing policies and requirements, it can be tough to stay ahead of everything you need to know. We’ll provide a high-level overview of zero trust adoption + share how automation can help you achieve compliance.
Government, Security & Compliance
Blog

Meet FedRAMP Certification Requirements

FedRAMP certification is a must-have for cloud service providers (CSPs) working with the US government. Explore the steps to certification and learn how automation simplifies the process.
Security & Compliance, Products & Services
Blog

Puppet 8: The Biggest Changes & How to Get It Now [with Video]

Puppet 8 is out and available in Puppet Enterprise and Open Source Puppet. In this blog, we'll explain the highlights, updates you should know about, and how to upgrade from Puppet 7 to Puppet 8.
Products & Services, Ecosystems & Integrations
Blog

Why Move from Open Source Puppet to Puppet Enterprise? Here are 10 Reasons

Considering moving from Open Source Puppet to Puppet Enterprise? In this article, we'll cover typical use cases for the enterprise version of Puppet, why businesses that moved from Puppet's open source version to Puppet Enterprise made the switch, and how customers drive time to value with Puppet Enterprise faster than Open Source Puppet.
How to & Use Cases, Products & Services
Blog

Securing and Configuring AI Environments: AI in Operations

Want to build stronger AI environments? Everything old is new again — learn how to advance your IT operations using AI and traditional cluster management.
Configuration Management, Security & Compliance
Blog

What is GitOps? Examples, Use Cases, and More

Get into GitOps: in the first of our two-part series, we’ll answer “What is GitOps” with specific use cases and examples.
DevOps
Blog

XZ Utils, the xz Backdoor & What We Can Learn from Open Source CVEs

The xz backdoor was a vulnerability in XZ Utils, a popular data compression library. The xz backdoor could let unauthorized users gain admin-level access to systems, endangering data security and much more. Read on to learn more about the xz backdoor, where it came from, and how to minimize the impact of software vulnerabilities in your systems.
Security & Compliance, How to & Use Cases
Blog

Enhancing Security Best Practices: Lessons from Puppet's Proactive Approach to GitHub Repository Management

We are committed to maintaining the highest standards of security — here's how we further strengthened our security practices thanks to valuable input from an independent security researcher.
Security & Compliance
Blog

VM Configuration: Using IaC to Stand Up Consistent Virtual Machines & Cut Down on Complexity

VM configuration gets a virtual machine (VM) ready for use with CPU, RAM, software & more. Here's how to automate complex VM configuration management at scale.
Configuration Management, Cloud
Blog

Stay Ahead of Known Vulnerabilities with Automated Patch Management

The consequences of not patching are everywhere: remember the Log4j vulnerability that grants hackers complete access to your devices? The best way to prevent this from happening is to use a patched version of Log4j — so why did this become a catastrophic and prolific security vulnerability event?
Security & Compliance