Avatar photo
By: John Dolen

June 1, 2023 12:45 pm

2,884 views

Unlock the Path to SQL Server Container Modernization with Rancher and DH2i

SUSE guest blog authored by: Don Boxley, Co-Founder and CEO, DH2i SQL Server holds an organization’s most business-critical data assets. Therefore, maximum uptime and security are among the top priorities for the IT teams that manage them. However, industry pressures have these IT pros adding another imperative task to their to-do list: SQL Server […]

Read More


Sebastian Martinez
By: Sebastian Martinez

May 17, 2023 12:35 pm

2,980 views

What Trento 2.0 Means for a Secure SAP Platform? Changes in the SUSE’s tool to reduce risk and improve the reliability of the SAP environments

Besides Trento's existing cluster and cloud best practices validations, Trento 2.0 highlights streamlining the implementation requirements and enables integration. With a new engine that addresses one of the main concerns of security teams, the requirement of an SSH connection to the SAP systems. And the addition of API versioning capabilities to enable the integration […]

Read More


Avatar photo
By: Sabine Soellheim

May 16, 2023 4:23 pm

2,579 views

Innovation in uncertain times. Join SUSE at SAP Sapphire Barcelona Spain, May 24-25, 2023

Organizations today are facing a myriad of challenges. An uncertain macroeconomic climate, rising capital costs, the continued increase in global cybersecurity threats, supply chain issues, and skill shortages all impact their ability to innovate. For over 20 years, SAP and SUSE have delivered innovative business-critical solutions on open-source platforms, enabling organizations to improve operations, increase […]

Read More


Avatar photo
By: ncutler@suse.com

April 20, 2023 12:06 pm

2,544 views

A brief look at SUSE’s CVE tracking process for automotive

What is a CVE? When a security vulnerability in a given software package becomes known, a response must be mounted in order to minimize the probability of malicious actors gaining access to protected computer systems and networks. For serious vulnerabilities, the response involves a number of entities working together, motivated by the common interest of […]

Read More


Avatar photo
By: Jeff Reser

March 27, 2023 4:37 pm

4,483 views

SUSE Joins the Confidential Computing Consortium

SUSE steps up its focus around data protection and trust with a strong commitment to preserving data integrity from core to cloud to edge.  SUSE is happy to announce we have joined Linux Foundation’s Confidential Computing Consortium, a community focused on projects that deal with securing data in use and accelerating the adoption […]

Read More


Juan Herrera Utande
By: Juan Herrera Utande

March 20, 2023 4:13 pm

4,020 views

Secure SAP Side-by-Side Extensibility with SUSE, Rancher Prime and NeuVector

Introduction to Secure SAP Side-by-Side extension Keeping up with SAP platform updates and custom ABAP code can be challenging for companies. To overcome this, many customers and even SAP itself opt for a well-known approach called Side-by-Side for SAP functional extension. This approach keeps SAP's own modules as standard as possible while placing outside customizations, […]

Read More


Juan Herrera Utande
By: Juan Herrera Utande

February 16, 2023 7:55 am

3,968 views

How to protect your SAP applications from Ransomware attacks

Introduction Why should I enable malware scanning in SAP applications? How does the SAP antivirus stack work? Installation and configuration Conclusion Introduction Ransomware is a well-known threat to your IT and business continuity that needs to be evaluated from many angles. We recommend you go through this series of blog posts from my colleague Raú[…]

Read More


Avatar photo
By: Raul Mahiques

February 15, 2023 6:17 pm

3,502 views

Ransomware Attacks – Part 3, Container Security

Table of Contents 1. Introduction 2. How do we protect Kubernetes environments? 3. Why use Zero-Trust policies to stop the spread of malware? 4. The importance of having a secure software supply chain? 5. Why must we automate security in Kubernetes environments? 6. How can we scale these measures when we have multiple clusters? 7. […]

Read More


Avatar photo
By: Raul Mahiques

February 15, 2023 2:32 pm

3,413 views

Ransomware Attacks – Part 2, Traditional IT Security

Table of Contents 1. Introduction 2. How do we protect traditional IT infrastructure? 3. How do I use SELinux, AppArmor and Netfilter? 4. Can STIG hardening guide help me protect my Linux server? 5. How can I apply a STIG profiles to all my servers? 6. Are there any other tools that I can leverage? […]

Read More