security

“Hallo Deutschland” – Getting Started with Bluemix in Germany

"Hallo Deutschland" or "Hello Germany" is an app I recently deployed. I didn't want to push a simple "hello world". The reason is that Bluemix Public is now available in Frankfurt, Germany!

Continue reading

How Organizations Are Measuring Cloud Success

Cloud adoption has entered the mainstream. Organizations are embracing cloud to drive enterprise-wide innovation that improves customer relationships while simultaneously delivering operational efficiencies. But how are enterprises measuring the success of their cloud initiatives?

Continue reading

11 Ways to go cloud native with microservices and containers @ Interconnect 2017

Think of a microservice within a cloud native application as similar to a Linux process: it’s designed to do one thing very well, runs only when and as long as needed, and often combines with others to work together on data. Since microservices run in containers, how a cloud platform manages relationships and resources among containers running the components of the overall application most definitely effects performance. Get microservices and containers right with Bluemix clients and experts in these sessions.

Continue reading

Assessing the security risk of your containers with Vulnerability Advisor

We announced the launch of the Vulnerability Advisor (VA) service for IBM Containers at DockerCon 2015. Since then, VA has been continuously scanning thousands of customer images daily and reporting to our users discovered security issues on their containers in several dimensions, including vulnerabilities, compliance issues, security misconfigurations, and malware findings. In the current version of VA, a vulnerability assessment report includes the list of packages which are affected by known vulnerabilities. By checking this report, the user can take action to remediate issues by updating/reconfiguring/disabling discovered vulnerable packages.

Continue reading

Cloud security and IBM Bluemix – get started

I want to take a broader view and point you to some good introductory material on security for cloud-based workloads ("cloud security"). It consists of an overview of different cloud deployment models and their components, including using IBM Bluemix. Thereafter, it digs into each of those categories and takes a look at how to secure those components and the data.

Continue reading

Three reasons to use non-IBM services on Bluemix

As an app developer you might say to yourself, "I see third party services in the Bluemix catalog. But I can call into those services directly from my app. Why should I bother connecting to them through Bluemix?"  In this post, I'll explain three key reasons: manageability, security, and portability.

Continue reading

Connecting to streams: What you need to know

This article describes three options for how to deal with Streaming Analytics Service applications that currently depend on incoming connections.

Continue reading

Security and Compliance for IBM dashDB and Cloudant

I often get asked about the security features of IBM dashDB and Cloudant. Both are database services ("DBaaS") offered on IBM Bluemix. Once the security topic is addressed, compliance-related questions are next. A good chunk of questions can be answered by reviewing the provided product documentation.

Continue reading

IBM Mobile Client Access for Bluemix becomes IBM Bluemix App ID with a new pricing model

On March 14, IBM Mobile Client Access for Bluemix (MCA) gets a new name: IBM Bluemix App ID. Along with the name change, we're also introducing an improved experience with a new pricing plan.

Continue reading