O.S.S. Blogs & News >

Viewing entries posted in 2015

The Importance of Planning Your Identity and Access Management Solution

Posted by Mark Finlay on 23 November 2015

Identity and Access Management (IAM) refers to a set of business processes and supporting technologies that enable the creation, maintenance, and use of a digital identity – i.e. it is about your users: who they are, how they are authenticated and what they can access.

Read the full post

Celebrating 20 years of service excellence

Posted by Gavin Stone on 11 November 2015

November, 2015 – Open Systems Specialists Limited (OSS), a leading provider of I.C.T. Infrastructure and Services is celebrating the anniversary of its founding, marking twenty successful years of exceeding customer expectations by delivering exceptional services across most major industries in New Zealand.

Read the full post

What is this thing called DevOps?

Posted by Mark Finlay on 5 November 2015

I have been doing a lot of reading over the last couple of months as part of my role as the OSS Practice Manager. As you can see on the OSS website, we have four practices that we as a company specialise in. The reason for all the reading is firstly because I like to know what it is that our technical consultants are working with, and secondly because I need to know about trends and new products in the industry so we can provide the best service to our customers.

Read the full post

Darktrace : Introducing the Enterprise Immune System

Posted by Kerry Thompson on 4 September 2015

The information security landscape has changed dramatically over the last 10 years. It used to be the case that defending against outside attacks from the Internet with a rudimentary firewall was sufficient in almost all cases, and that intrusion detection was a straightforward case of monitoring log data for anything out of the normal.

Read the full post

Your mother told you to share....

Posted by Vince Hagon on 10 April 2015

I interact with clients (and potential clients) on a daily basis. It struck me a while ago that many of the issues they are struggling to cope with, they have brought upon themselves.

Read the full post

Protect your infrastructure by patching

Posted by Mark Finlay on 18 March 2015

Tags: , ,

In February 2013 the Center for Strategic and International Studies (CSIS) released a paper titled Raising the Bar for Cybersecurity. In the paper it is stated that more than 90% of successful security breaches required only the most basic techniques; 85% of breaches took months to be discovered; and 96% of successful breaches could have been avoided if the victims had put in simple or intermediate controls.

Read the full post

SaaS and the Von Neumann machine

Posted by Wayne Sheddan on 12 March 2015

Tags: , ,

We are all basically familiar with Von Neumann machines – instructions work on data, with instructions and data stored independently. This is the basic architecture of everything from a phone to a mainframe. We know we can use a single installation of a program to manipulate a multitude of corresponding datasets. For example an installation of Word can be used to edit any Word document.
We have become so familiar with the Von Neumann concept that we start to forget a key point:

Read the full post