November 2018 Newsletter
First Datacorp Receives International Accreditation as an ITIL® Foundation Accredited Training Organization (ATO)
We are pleased to announce that First Datacorp has recently received accreditation from PeopleCert, the sole global Examination Institute for IT Infrastructure Library (ITIL), as an ITIL Foundation Accredited Training Organization (ATO) in the Phils. The ITIL Foundation course is part of the internationally recognized professional qualification scheme for Information Technology Service Management (ITSM). This accreditation is a testament to First Datacorp's best practices and uncompromising high standards across ITIL training and learning solutions for more than ten years now.
What is an ITIL ATO?
ITIL Accredited Training Organizations (ATOs) are organizations that have been assessed and approved by an accredited Examination Institute (EI), and have been licensed by AXELOS, owner of ITIL best practices publications, to deliver accredited training courses (classroom or e-delivery) and administer examinations for delegates of ITIL accredited courses.
ITIL ATO Value Proposition
In an assessment process recognized worldwide as exceptionally rigorous, the PeopleCert accreditation evaluates the standard of training processes, course materials, testing environment, instructor pool, and overall Quality Management System. As an ITIL Foundation ATO, First Datacorp attains a credential of providing higher level training services that organizations of every size and in every industry can repeatedly opt for with confidence. The ITIL Foundation ATO accreditation will further bring First Datacorp trained delegates in creating value within their respective organizations to help mature their ITIL Program.
Let us know how we can help you with your ITIL training needs. Please send your inquiries to email@example.com or firstname.lastname@example.org.
Copyright © First Datacorp and AXELOS Limited 2011. Reproduced under license from AXELOS. All rights reserved. ITIL® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.
Cisco Tetration Platform - Cloud Workload Protection
Today’s data centers consist of a hybrid multicloud infrastructure using bare metal, virtualized, and container-based workloads, or anywhere in-between.
As everything revolves around software today, applications running on your infrastructure are the crown jewels, these are dynamic—these are constantly evolving. One of the key challenges is how to provide a secure infrastructure for applications without compromising agility. Even today, most data centers are designed with traditional perimeter-only security, which is insufficient. A new approach is needed to address this challenge.
The Cisco® Tetration platform is designed to address this challenge in a comprehensive and scalable way. Tetration enables a holistic workload protection for multicloud data centers by using:
- Whitelist-based, zero-trust model: By using advanced algorithms, Tetration provides the ability to merge business policy requirements with policies that are generated based on application behavior. This normalization and hierarchical merging of policies help ensure that administrators with reduced scope cannot override higher level business policy intentions.
- Process behavior deviation: Behavior of the servers can be determined by baselining the processes that are running on the server and identifying any deviations in behavior from those baselines. With Cisco Tetration, algorithms are available to match the behavior deviations to malware execution patterns, enabling faster detection.
- Vulnerabilities and exposures detection associated with software packages: The Cisco Tetration platform also baselines installed software packages, package versions, patch level, and publisher. Tetration includes 19 years’ worth of Common Vulnerabilities and Exposure (CVE) database. Using this information, Tetration checks whether any of the software. packages have known information-security vulnerabilities listed in the CVE database. When a vulnerability is detected, one can find complete details, including the severity and impact score, identify all servers that have the same version of the package installed, and to act proactively by defining policies with specific actions, such as quarantining a host when servers have packages with detected vulnerabilities and blocking communication when policy violations are discovered.
To know more about Cisco Tetration Platform, you may email Josephine Pueblo-Vasquez through JosephineP@first-datacorp.