figures-left figure-right-top figure-right-bottom figure-center figure-left-top-mobile figures-left-bottom-mobile figures-right-top-mobile figures-right-bottom-mobile

Resources

The world of cloud changes quickly. Stay up-to-date with the latest trends & innovation, all explored in our resource library.

slider item
Your Innovation Feed
GlobalDots BrightTalk Feed
Admin Globaldots 26.05.21

Tune in to our webinar channel and never miss a live event. Previous events are always available for on-demand watch.

Read more
slider item
Supply-Chain Data Protection
RCE in Cdnjs and What It Means to You
Dror Arie 19.07.21

Last week, a researcher named RyotaK shared a clever supply chain vulnerability in Cloudflare’s highly popular hosted module called cdnjs, which runs on around 12% of all sites on the web. The module helps developers consume other popular packages and integrate them safely into their sites.  The vulnerability was in the cdnjs library update server […]

Read more
slider item
SOC as a Service
The GlobalDots-Cloudflare SOC Offering on the News
Li-Or Amir 14.07.21

Cloudflare recently announced its new SOC as-a-service offering, in partnership with GlobalDots and 3 additional global partners. With GlobalDots, this offering will include a full suit of web security solutions, implemented and configured by the GlobalDots engineering team. The GlobalDots team will also provide advanced support and professional services to the Cloudflare products included. Read […]

Read more
slider item
Monitoring, Logging & Observability
Automated Application Monitoring – Solution Brief
Li-Or Amir 16.06.21

As a product company, your success depends on the fast delivery of new, error-free application experiences. Organizations today are rapidly adopting highly dynamic software architectures, utilizing containerized microservices applications throughout the DevOps production pipeline. Automatic Application Monitoring oversees these architectures for faster deployment and scaling to meet business and market demand. Fill out the form […]

Read more
slider item
Vulnerability Management
Automated Vulnerability Remediation – Solution Brief
Admin Globaldots

New software vulnerabilities are exposed at an alarming rate, compelling vendors to  release multiple patches, overwhelming IT and lnfoSec teams. At the same time, the key approach to dealing with vulnerabilities – Patching – consists of manual steps  and handshakes that makes this critical process tedious and inefficient.  Meet the solution which empowers you to: […]

Read more
slider item
Cloud Migration Service
Live Migration – Solution Brief
Li-Or Amir

Learn how to automate cloud migration without interrupting your ongoing work. Migrate any types of workloads to any target cloud platform: Automatically, seamlessly, and cost-effectively. Fill out the form to get your copy.

Read more
slider item
Open Source & Code Security
Report: State of CNAS, Q2 2021
Admin Globaldots

As companies embrace cloud native technologies as part of their digital transformation, security becomes key to delivering software products faster and error-free. This latest survey by Snyk: Evaluates the latest cloud-native development trends. Demonstrates how Cloud Native App Security (CNAS) fits into CI/CD. Reveals what still keeps some companies from moving to cloud-native platforms.  Fill […]

Read more
slider item
Identity & Access Management (IAM)
eBook: Move Beyond Passwords
Admin Globaldots

Identity & Access Management (IAM) is perhaps the most basic fundamental of any up-to-date security stack. In cloud-centric environments, which are distributed by nature, this is twice as true: Remote access from poorly-secured networks and a quickly-growing attack surface, rich with insider threats, both need to be restrained. IAM is therefore the first and foremost […]

Read more
slider item
Compliance Automation
The Complete Guide to SOC 2 Automation
Admin Globaldots

As important as it is to achieve SOC 2 compliance, the manual work involved, along with all the minutia required, often leaves CISOs and Compliance leaders feeling overwhelmed at the prospect of preparing for audits.  But preparing for, and ultimately achieving, SOC 2 compliance doesn’t need to be complicated or overwhelming. Today, organizations are starting […]

Read more
slider item
Your Innovation Feed
5+4 = The New Cloud Security Stack
Eli Arkush 09.06.21

Infrastructures, threat, and security are all under a quick, constant evolution. Once every few year there comes a tipping point which forces us to rethink our technology posture. 2020 was that tipping point. The cloud surge has peaked during the Pandemic, as remote work became the new normal for most office-based businesses. This has introduced […]

Read more
slider item
Monitoring, Logging & Observability
Old Approaches to Monitor a New World: Monitoring in the Hybrid Cloud
Manuel Reischl

In this article I hope to give the reader a small history lesson as well as some advice on how to build a useful monitoring system for your platform. First, it’s key to understand where we came from. Before cloud computing systems, every company owned its own infrastructure and therefore had a need to monitor […]

Read more
slider item
Reliability Platforms (SRE)
Why is SRE Becoming 2021’s Hottest Hire?
Guest Writer 03.06.21

In the current IT market, one of the hottest job roles is the Site Reliability Engineer (SRE). In January 2019, according to LinkedIn, being an SRE is the second most promising job in the USA.  These Statistics were cited: Median Base Salary: $200,000 Job Openings (YoY Growth): 1,400+ (72%) Career Advancement Score (out of 10): 9 […]

Read more
slider item
Open Source & Code Security
Practicing Security in Open Source Communities
Guest Writer 31.05.21

Open source projects are the embodiment of the core philosophy: ‘free internet and technology for everyone around the globe’. They can be created, changed and distributed to anyone by anyone and for any purpose. Contributing to an open source projects is an endorsement of this philosophy, that promotes digital literacy in technological and non-technological communities. […]

Read more
slider item
Open Source & Code Security
SolarWinds Orion Security Breach: A Shift In The Software Supply Chain Paradigm
Guest Writer

The recent SolarWinds breach highlights a new paradigm in the Software Supply Chain. When compared simply to the code itself without any additional tools, Proprietary Code is no more secure than Open Source. By contrast, many would argue that Open Source Code is more secure due to a faster fix/patch/update cycle and the pervasive access to source […]

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure

Don’t Fortify. Amplify – Your Cloud Security Stack, Redefined.