All News

Huawei Storage-kampanja 2019 loppuun asti

Kampanjahinnoittelu voimassa 2019 loppuun saakka: Jokaiseen budjettiin sopiva, kannattaa tutustua! Lisäksi kutsumme kaikki 2019 hankintapäätöksen tehneet asiakkaat mukaan tekniseen koulutukseen 23.1.2019, joka jatkuu myös ainutlaatuisella ilta-ohjelmalla, jossa meidät...

Sisäisten tietoturvauhkien ennaltaehkäiseminen

Merkittävin määrä tietoturvauhkista aiheutuu organisaation sisältä päin. Koostimme yhteen sivuun yleisesittelyn kahdesta ehkä ajankohtaisimmasta kyberturvallisuuteen liittyvästä ratkaisusta, jotka keskittyvät ensisijaisesti sisäisten uhkien hallintaan: CyberArk –...

Huawei asiakasesittely: 2M-IT

Olemme saaneet olla mukana rakentamassa tyytyväistä asiakassuhdetta yhdessä Tietokeskuksen ja Huawein kanssa, ja iloksemme voimme nyt esitellä, miksi 2M-IT valitsi Huawein tietoliikenneratkaisut. Asiakasesittelyvideo (Youtube) Asiakasesittely PDF-muodossa...

Rubrik now available from Nordicmind

Rubrik delivers a single platform to manage and protect data in the cloud, at the edge, and on-prem. Rubrik simplifies backup and recovery for virtualized and physical environments. It integrates data orchestration, catalog management, and deduplicated storage into a...

Nordicmind palvelee SUSEn asiakaskuntaa

Yhteistyö SUSEn kanssa vahvistaa Nordicmindin asemaa modernien konesaliympäristöjen asiantuntijaorganisaationa ja luotetun jälleenmyyntiverkoston kumppanina. Nordicmind aloitti helmikuun alussa 2019 SUSEn jälleenmyyntikanavaa kehittävänä kumppanina. ”Selvitämme...

CyberArk Named Best Enterprise Security Solution at 2019 SC Awards

  CyberArk the global leader in privileged access security, today announced it was named the 2019 SC Award winner for Best Enterprise Security Solution. SC Awards represent the gold standard of accomplishment for cyber security products. As the only privileged...

CyberArk has been named a leader in the 2018 Gartner Magic Quadrant

CyberArk has been named a leader in the 2018 Gartner Magic Quadrant for Privileged Access Management – positioned both highest in execution and furthest in vision. The CyberArk Privileged Access Security Solution is used by the majority of Fortune 500 companies, and...

Puppet Meetup Groups and Linkedin User Group in the Nordics

Join Puppet Expert Community in the Nordics Receive latest news & event invitations and discuss with Nordic Puppeteers. Linkedin Puppet User Group Nordics Join new Linkedin group for Puppet users in the Nordics instead of having country specific Linkedin groups as...

It’s time for next generation automation

First came Puppet, then Ansible, now Bolt. Puppet created 'infrastructure as code'.  Whilst CFEngine was already in the market in 2009, Puppet made it a mainstream term within IT. Puppet is used by 75 of the Fortune 100, as well as more widely by over 40,000 companies...

Forrester Q4/2018: CyberArk Named a Leader

CyberArk has been named a Leader in “The Forrester Wave™: Privileged Identity Management, Q4 2018.” Based on Forrester’s evaluation of the 11 most significant privileged identity management vendors, CyberArk ranks highest in both the current offering and market...

Eficode becomes Puppet Gold Partner

Nordicmind - Puppet's value added distributor for Nordics - is happy to announce it has signed Eficode as Gold Partner for Puppet. Eficode is one of the leading DevOps solution providers in Nordics - now expanding to elsewhere in EMEA. They were also recently...

Forrester names Puppet a leader for infrastructure automation

Forrester names Puppet a leader for configuration management software for infrastructure automation Forrester Research has published its Wave report for configuration management software for infrastructure automation, naming Puppet a leader. Puppet earned the highest...

State of the Software Supply Chain Report 2018

The 4th Annual State of the Software Supply Chain Report is here. This year's research highlights new methods cyber criminals are employing to infiltrate software supply chains, offers expanded analysis across languages and ecosystems, and more deeply explores the...

5 Quick Wins for Securing Continuous Delivery

How do you identify and contain risks when decisions are being made quickly and often by self-managing delivery teams? How can you prove compliance when developers are pushing their own changes to production? Five quick wins for securing continuous delivery: Automated...

Nordicmind named “Partner MVP, EMEA” by Puppet

Suomeksi | På Svenska | På Dansk Nordicmind named "Partner MVP, EMEA" in Puppet Channel Partner of the Year Awards Helsinki—February 14, 2018—NORDICMIND, a value added distributor of next generation infrastructure, security, DevOps and automation solutions, today...

Forrester names Puppet a leader

Forrester names Puppet a leader for configuration management software for infrastructure automation Forrester Research has published its Wave report for configuration management software for infrastructure automation, naming Puppet a leader. Puppet Enterprise received...

Forget DevOps – Enterprise level DevOps is here

  Forget DevOps - Enterprise level DevOps is here “But how do we actually start DevOps?” That is the big question we hear from our clients when they really start to feel the pressure to speed up software development and cut costs. People have heard about DevOps...

Forrester Wave™: Puppet Positioned as a Leader

The Forrester Wave™: Configuration Management Software For Infrastructure Automation, Q4 2017 / Puppet Positioned as a Leader Puppet, the standard for automating the delivery and operation of the software that powers everything around us, today announced that Puppet...

Introducing Puppet’s largest set of product innovations.

Today October 11th, 2017 here in San Francisco at PuppetConf 2017 we are introduced major innovations for managing and automating your ICT environment. Nordicmind team is happy to be be present at the conference, to be one of the first to learn about these exciting...

Huawei Smart & Safe 2018

HUAWEI SMART & SAFE 2018 | Tulossa keväällä 2018! Maksuton seminaari julkishallinnon asiantuntijoille ja päättäjille. Esittelyssä seuraavan sukupolven verkko- ja konesaliratkaisut Smart & Safe City -ratkaisujen kulmakivinä. Ajankohtainen ohjelma sisältää...

2017 State of DevOps Report now available

See the difference DevOps makes — and how to get there Over the past six years and more than 27,000 State of DevOps survey responses, we’ve found clear evidence that DevOps practices yield remarkable results for IT teams and organizations. This year we also discovered...

Join DevOps 2017 Live Stream – April 27-28

JOIN THE DEVOPS 2017 LIVE STREAM, WHEREVER YOU ARE The most awaited two days of the year start on April 27th in Helsinki where well over 300 DEVOPS 2017 attendants will be coming to learn, enjoy, network together and join the expertise of great speakers. DEVOPS 2017...

Huawei has the Best High End Storage in the world

The next-generation Huawei OceanStor 18000 V3 mission critical storage system was named “Best-In-Class” in the DCIG 2016-17 High End Storage Array Buyer’s Guide, earning the highest ranking possible for all products evaluated. This demonstrates the competitive market...

IDC White Paper: The Business Value of Red Hat OpenShift

IDC interviewed nine organizations that are using Red Hat OpenShift as their primaryapplication development platform. These organizations reported that OpenShift helps them deliver timely and compelling applications and features across their complex and heterogeneous...

Download free book: Insider Threat Program in 90 Days

People are the weak link in the cybersecurity chain. Unfortunately, it is these same people who have legitimate access to your facilities, systems, people, and data – your crown jewels. Protect your organization with a comprehensive Insider Threat Program. We’ll show...

Insider Threat & the GDPR

If you've worked in IT or Cybersecurity for the past 5 years or so, then you've no doubt seen the trend change from criminals targeting systems, to criminals targeting people. It's simple thinking, but whether a person just hasn't had their coffee in the morning, or...

Insider Threat: Four Things to Pay Attention to in 2016

While many data breaches in 2015 were carried out by anonymous hackers, many of the most dangerous one’s were conducted by employees from inside the company, not an uncommon occurrence these days. Fact be told, the majority of data breaches are caused by insiders,...

ObserveIT and Splunk Integration is Easy!

CISO’s see servers and devices, apps and logs, traffic and clouds. With the Splunk® platform security teams are able to see data—everywhere. This kind of Operational Intelligence enables the curious to look closely at what others ignore—machine data—and find what...

Zenoss Expands Monitoring Capabilities for OpenStack Clouds

AUSTIN, TX – August 9, 2016 – Zenoss Inc., the leader in hybrid IT monitoring and analytics software, today announced it has released new extensions that provide granular level monitoring capabilities for popular OpenStack components, such as Ceph and Cinder Storage,...

Zenoss Blog / Choices, Choices: Application Impact Models

By: Kent Erickson>> Remember how I explained that the Zenoss Live Model helps by automatically tracking connections between the things in your data center? (Part One andTwo) Well, when it comes to modeling application impact you need to be in control to get the...

Understanding the Zenoss Live Model

Part 1 By: Kent Erickson >> All those boxes in your data center? They’re connected! They work together! That’s the brilliant insight that led Erik Dahl to develop the Zenoss Live Model, way back in 2006. And you know what? It’s still our special snowflake, and...

SIOS DataKeeper completes Microsoft Azure Certification

SAN MATEO, CA – April 2, 2015 – SIOS Technology Corp. (www.us.sios.com), maker of SAN and #SANLess clustering software products, today announced that its SIOS DataKeeper Cluster Edition software is Microsoft Azure certified and now available in the Azure Marketplace....