Skip to content

JumpCloud 有哪些功能? 它為公司企業帶來了什麼價值?

許多企業正在將 IT 環境遷移到雲端。目前,電子郵件、生產力軟件和檔案儲存的遷移已經相對容易,而現在很多公司企業正在尋找一種雲端目錄服務,來集中管理現代 IT 資源的身份驗證和授權。JumpCloud 是許多公司企業考慮的選項之一。

不過,目錄服務屬於基礎設施的核心部分,因此 IT 管理員在選擇是否實施此類解決方案時,會認真權衡優缺點。許多人會問:「JumpCloud 的價值何在?」 如果您也有這個疑問,讓我們來探討 JumpCloud 帶給公司企業的無形和有形價值。

首先,什麼是 JumpCloud?

在深入討論 JumpCloud 的價值之前,我們應先了解它的功能。作為一個雲端目錄服務,JumpCloud 安全管理並連接用戶與 IT 資源,包含以下方面:

系統:支援 Mac、Windows 和 Linux

伺服器:本地及雲端伺服器

應用程式:基於 LDAP 和 SAML

生產力套件:G Suite 和 Office 365

檔案儲存:實體和虛擬

網絡:透過 RADIUS 連接有線及無線網路

JumpCloud 採用多協議、獨立於供應商的方式,讓 IT 管理員能夠提供終端用戶所需的 IT 資源,同時保持對系統的控制權。那麼,這種能力如何為公司企業創造價值呢?

JumpCloud 的無形價值

在討論 JumpCloud 的價值時,我們可以先從它所帶來的無形收益開始,例如提高靈活性、增強控制力、安全性及提升效率。以下是這些無形價值的詳細說明。

提升靈活性

JumpCloud 的一大優勢在於,它讓公司企業在選擇技術方案時擁有更多靈活性。這意味著管理員和用戶可以根據需求,選擇最適合的 IT 工具,而不僅僅是那些與身份提供者兼容的工具。JumpCloud 支援多種協議(如 LDAP、SAML 2.0、RADIUS、RESTful API 等)以及多種作業系統(Windows、Mac、Linux)。

舉一個具體例子。JumpCloud 允許系統管理員將目錄服務與 chatops 和智能自動化等工具進行整合,這些技術可以顯著提高自動化和工作效率。JumpCloud 的客戶 Grab 使用 Workato 將雲端目錄服務與 Slack 和 HRIS 系統進行整合,使自動化提升了十倍,節省了約 3,000 工時。如果沒有 JumpCloud 的靈活性,Grab 將浪費大量時間。靈活的身份管理若能策略性應用,將能產生強大的效益。

增強控制力

將所有 IT 資源集中在一個身份管理平台上,賦予了系統管理員對用戶使用資源的精確控制權限。當 IT 管理員能夠全面掌控時,會帶來一系列好處。首先,當技術問題出現時,能更快速地協助用戶解決問題。

其次,透過提供用戶最合適的工具,消除了影子 IT(即未經 IT 批准的工具)。因此,系統管理員不再只是推測某個離職員工是否仍能存取系統,而是可以確定他們已經無法進入。EdgeConneX 尤其對 JumpCloud 的精確控制讚譽有加,他們表示:

「員工離職管理變得更加簡便且安全,我們不再需要逐一檢查他們曾經擁有存取權限的每個系統或資源。現在只需前往一個地方 —— JumpCloud 管理控制台,刪除該帳戶,就會自動取消 WiFi、電腦登錄、應用程式和伺服器的存取權限,讓員工離職過程更加快捷。從審計角度來看,JumpCloud 大大降低了我們的風險。」

強化安全性

全面的身份管理系統讓您能夠集中管理 IT 環境中的安全措施,並有效地增強各層級的防護:

身份:通過使用複雜的密碼、多重驗證(MFA)和 SSH 金鑰認證(在適用的情況下)來強化用戶的身份安全。

系統:IT 管理員可以利用系統層級的 MFA 和政策管理來加強系統安全性。

數據:JumpCloud 提供全磁碟加密(FDE)政策,讓 IT 管理員只需幾個按鍵即可為 Windows 和 Mac 設備加密硬碟,提升資料安全。

網絡:RADIUS-as-a-Service 讓您可以透過多種方式提升網絡安全性。為每位員工提供專屬的憑證來連接 WiFi,從而取代共用的 SSID 和密碼。還可以使用 RADIUS 回應屬性,例如 VLAN 標籤,將單一實體網絡進行分段,確保銷售團隊無法存取生產伺服器,工程師無法查看財務文件。

提升效率

將用戶、系統、伺服器、應用程式、檔案儲存和網絡統一到一個平台上,能夠顯著提升整體生產力。IT 管理員不需要在不同的系統之間切換來管理用戶,因為 JumpCloud 提供了直觀的使用者介面、API 和 PowerShell 模組,能夠大幅減少入職和用戶管理的時間。

員工只需記住一組密碼,不再因為忘記密碼而被鎖住。當他們需要重置密碼時,也可以自行操作,無需 IT 部門的介入。此外,他們只需登入一次 JumpCloud 用戶入口,即可立即存取所有應用程式,避免浪費大量時間逐一登入不同系統。

雲端目錄服務的有形價值

除了無形價值外,JumpCloud 也在財務方面帶來顯著效益。以下是幾個主要的財務考量點。如果您想深入了解這些細節,可以向我們索取 ROI 計算器。

取代 Active Directory 及其附加元件

JumpCloud 是 Microsoft® Active Directory® 的完整雲端替代方案,淘汰 AD 能夠為企業節省大量時間和資金。Active Directory 是在本地環境中建立的,而當今的 IT 資源多數已轉向雲端,且種類繁多。使用 AD 需要額外的附加元件,每個元件都有成本。企業通常需要使用超過 8 種工具來管理混雜 IT 環境中的用戶存取權限。

相比之下,JumpCloud 是一個完整的目錄服務,提供單一登入(SSO)、MFA、密碼管理、設備管理等多種功能,這些功能都包含在單一價格中。不僅更具成本效益,IT 管理員也能更高效地在一個平台上完成所有操作。

消除基礎設施

本地目錄服務(如 Active Directory)的另一個挑戰在於它需要大量本地基礎設施,這增加了成本和操作複雜度。身份驗證服務無法中斷運作,必須保持 100% 的可用性,而達到這一要求需要投入大量的硬件資源和人力。

企業自行管理這些服務時,既昂貴又繁瑣,需要確保沒有單點故障。而 JumpCloud 目錄服務完全基於雲端,因此您不再需要購買和維護以下組件:

  • 實體伺服器
  • 負載均衡器
  • SQL 伺服器 —— 實時同步
  • ADFS 和網頁代理
  • Dirsync
  • RADIUS 和 LDAP 基礎設施
  • 系統安全監控
  • 電力成本
  • 冗餘和恢復成本
  • 升級和維護成本

雲端身分識別提供者的唯一成本是使用費和管理用戶存取的時間,讓企業能夠大幅節省。

減少 IT 人員需求

由於 JumpCloud 簡化了 IT 環境,IT 團隊所需的人員數量相對較少。以 Cabify 為例,他們只需 7 名 IT 員工就能支持 11 個國家共 1500 名用戶。IT 管理員的平均時薪為 41.51 美元,因此隨著公司規模增長,保持相同數量的 IT 員工可以帶來顯著的成本節省。

JumpCloud 帶來的價值非常明顯,這不僅能降低成本、增強安全性,還能提升靈活性、控制力和效率,幫助您的企業在各方面取得成功。

關於 JumpCloud

JumpCloud® 提供一個統一的開放式目錄平台,使 IT 團隊和 MSP 能夠輕鬆、安全地管理公司企業中的身份、裝置和存取權限。通過 JumpCloud,用戶能夠從任何地方安全工作,並在單一平台上管理其 Windows、Apple、Linux 和 Android 裝置。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

Parallels Desktop 20.1.0: AI integration, Enterprise strength

Just about a month ago, the Parallels team unveiled Parallels Desktop 20, a major leap forward for our product.

Now, I’m excited to introduce our latest update — Parallels Desktop 20.1.0.

This update brings new features, enhancements, and critical fixes that we know you’ve been eagerly awaiting.

Elevating productivity with Writing Tools for Windows Apps

A few weeks ago, Apple released macOS 15, which brought with it one of the most anticipated features — Apple Intelligence.

I know many of you rely on Windows office applications for your daily tasks, so we’re thrilled to introduce an exciting new integration that works hand-in-hand with Apple Intelligence: Writing Tools for Windows Apps.

What does this feature do?

It’s simple.

Select any portion of text within a Windows application and either use the Command + Shift + W shortcut or go to the Edit menu in your macOS menu bar and select Writing Tools.

With Writing Tools in Windows Apps, you can:

  • Summarize long passages of text
  • Generate key insights for reports, emails, or presentations in a snap
  • Refine your writing by offering contextual improvements

And the best part?

You can use this feature in any mode — whether it’s windowed, full-screen, or Coherence mode, giving you the freedom to stay focused and productive regardless of how you prefer to work.

Introducing Windows Server 2025 support

I’m also proud to announce that Windows Server 2025 will be fully supported in Parallels Desktop as soon as it’s released.

This marks the first time a server OS is supported in Parallels Desktop for Apple silicon Macs — an incredible milestone.

While Windows Server 2025 is still in preview, you can start experimenting with it if you already have an ARM-based image.

Go ahead and put it to the test!

Behind the scenes: We’ve smoothed out the rough edges

Of course, every great piece of software has its hiccups, and the team works hard to address issues quickly.

The release of version 20 surfaced a significant issue on Apple silicon Macs where some macOS applications (like Safari and Preview) set as default in Windows 11 were not functioning correctly within certain apps, such as Microsoft Outlook (classic) and Microsoft Excel.

Links and attachments weren’t opening as expected in Safari or Preview, but with 20.1.0, this issue is now resolved.

Our brilliant Engineering team has also fixed a key issue that was preventing Rosetta emulation from working properly in Linux virtual machines on Apple silicon Macs running macOS Sequoia.

With the 20.1.0 update, your Linux machines are back to running seamlessly, just the way you expect.

Pro Tip: easily switch between Microsoft Word documents with Coherence view mode

Did you know that if you run your Windows virtual machine in Coherence view mode and have multiple documents open in Microsoft Word, you can swipe up with three fingers to easily switch between them!

It’s a seamless way to boost your productivity.

New to Parallels Desktop for Mac? Get your 14-day free trial of Parallels Desktop now.  

About Parallels 
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How to disable the Firefox password manager

Like other major browsers, Firefox offers a convenient built-in way to store your passwords. It’s beloved by users for being a non-Chromium alternative to the market leader Chrome. However, if you find that Firefox is not the browser for you or want to look into different credential storage methods, you might want to know how to disable the Firefox password manager first.

Today, we’ll cover the process, from exporting your passwords for safekeeping to switching off the password manager on desktop and mobile devices. Then, we’ll see what secure alternatives you can use to store and access your credentials.

Some steps before you turn off the Firefox password manager

Firefox allows users to save login details whenever they log in to a new site. Even if you don’t use the browser’s built-in password manager regularly, this means you may have some of your credentials saved, whether by choice or by accident.

Before disabling the Firefox password manager, you should first see if you have any credentials saved and, if so, which ones. This will let you know if your stored credentials are up-to-date and whether they need to be deleted altogether. If you use a Firefox account, all changes will apply to the devices you’re logged in on via synchronization.

Keep in mind that disabling the built-in password manager won’t automatically clear your storage—if you ever turn it back on, your old data will be easily accessible. That’s not ideal if you don’t plan to use Firefox for your password storage in the future. To be sure that this information is gone for good, you have to delete all stored credentials manually. For more in-depth information on viewing, editing, and deleting your passwords on Firefox, check out our dedicated guide.

That said, if you find valuable information stored in your Firefox password manager, you might want to preserve it before deleting it from the browser. We recommend exporting your saved credentials from Firefox and storing them in a secure location until you can import them to a different password manager.

To export passwords from Firefox, follow these steps:

  1. Click the three lines in the top right corner of the browser and select “Passwords.”

  2. Tap the three dots on the upper right side of the “Passwords” page to open the menu. Then, click “Export passwords.”

  3. You will be warned that your exported credentials will be saved as a non-encrypted, readable file. Select “Continue with Export.”

  4. Choose your preferred location to store the file and click “Export.”

Keep your exported file safe. If you plan to import the credentials to a different password manager, delete the file immediately afterward.

Turning off the Firefox password manager on your device

You can easily control the Firefox password manager settings on both desktop and mobile devices.

On desktop

To disable the Firefox password manager on a Windows or macOS device:

  1. Click the three lines in the top right corner of the browser and select “Passwords.”

  2. Tap the three dots on the upper right side of the “Passwords” page to open the menu. Here, select “Preferences.”

  3. Toggle off the “Ask to Save Passwords” checkbox.

On mobile

To turn off the Firefox password manager on an Android or iOS device:

  1. Tap the three dots (on Android) or three lines (on iOS) and go to “Settings.”

  2. Select “Passwords.”

  3. Under “Save Passwords,” toggle on “Never Save.”

Changing your password manager from Firefox to a third-party provider

With the Firefox password manager switched off and your exported credentials resting on your device, it’s time to consider where your next password storage will be. It’s not a good idea to keep this data out in the open. If anyone got their hands on your device or if you accidentally shared the file with others, your accounts could be compromised.

So, you should find a solution that offers more protection against password leakage—and yes, setting up a spreadsheet file is also out of the question. Another not-to-do item on this list is changing all your passwords to the same one. It might seem like the simplest solution, especially considering that the average person handles nearly 170 passwords. However, if one account gets compromised, the rest might go down with it. Instead, we need to consider a reliable alternative that lets you add variety to your passwords while keeping them secure.

If you’re simply switching browsers, you may be tempted to use its built-in password manager, if it offers one. However, browser-based password managers pale in comparison to third-party providers like NordPass. While Firefox uses AES-256 encryption to protect sensitive data, NordPass has opted for the more advanced XChaCha20—a faster and more secure alternative. NordPass is also convenient to use as a browser extension—you can even get it for Firefox.

When you switch to NordPass, you’ll get the fundamental features you’ve been familiar with on Firefox, like autofill for your credentials and cross-device synchronization, ensuring all your passwords are up-to-date. But that’s just the start—NordPass offers protection for your email address by letting you set up an email mask. You can also scan your vault to see if any of your credentials are old, weak, or reused.

Manage your accounts with ease without leaving your browser with NordPass.

FAQ

Why should you disable the Firefox password manager?

A browser does not offer sufficient security for sensitive data. For example, if someone were to gain unauthorized access to your browser, they could export and access your passwords and breach your accounts.

What happens after disabling the Firefox password manager?

Once you’ve disabled the Firefox password manager, it will stop prompting you to save or autofill your login credentials. However, your previously saved passwords will still be available if you switch the browser password manager back on. 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Epsilon: The Most Expensive Data Breach You’ve Never Heard Of

Epsilon: The Most Expensive Data Breach You’ve Never Heard Of

Search for the most expensive data breaches in history, and you’ll see a list of names you’re undoubtedly familiar with: Yahoo ($470 million), Target ($300 million), TJX ($256 million), Sony Playstation Network ($171 million.) But at the top of the list – often in the number one spot – is a firm called Epsilon, which suffered a data breach in 2011 that cost an eye-watering 4 BILLION dollars.  

Who or what is Epsilon?  Why was their data breach so expensive?  And have we learned lessons from it so that we can prevent it in the future?  (Spoiler alert: No.) Let’s delve into the story:

 

First, what makes a data breach expensive?

Data breach costs continue to rise. The average cost of a data breach in 2024 is $4.88 million, which is by no means a small chunk of change. That number begs the question, however; why are some breaches so much more expensive?

According to IBM, there are four key areas that contribute to the expense of a data breach:

Detection and Escalation

Detection is the process of finding the breach and determining its full extent.  It involves tools like SIEM (Security Information & Event Management) and IDR (Intrusion Detection and Response.) Some things to watch out for are odd traffic patterns (like a security camera suddenly passing several gigabytes of data), repeated access requests from an unidentified source, and abnormal data transfers. 

Escalation is the process of letting the correct people in the organization know.  It probably starts with IT and security staff and then branches into legal, product, engineering, senior leaders, etc.  

These may not seem like big hurdles, but consider this: it can take months to discover the true extent of a data breach through thorough investigation.  You have no way of knowing which systems are compromised and which channels are safe, and you risk giving the hackers time to hide more effectively if they are privy to your communications.  You might find yourself having to suddenly invest in tools like encrypted messaging, password managers, or hardware security tokens like PIV (personal identity verification) cards.  

Notification

Notification is how you alert the outside world of the data breach.  From customers to regulators, the sooner you make a statement and share the facts the better.  Being transparent about what data was compromised, providing regular updates on the investigation, and outlining how you will prevent future breaches are all essential elements of your notification strategy.

Post-Breach Response

How are you going to make people feel like they can safely do business with you?  That’s the question your post-breach response has to answer.  Offering things like free credit monitoring, compensation for any fees or financial costs they incur, and clear communication about the steps you’re taking to strengthen your security measures can help rebuild trust.

Lost Business

It cannot be overstated how disruptive a data breach is to a company’s operations.  Everything – development, sales, support, marketing – grinds to a halt while the breach is investigated.  Your customer-facing departments like support and sales will be inundated with questions and complaints.  Forget about future plans and roadmaps – everything is consumed by the data breach.  Customers will churn.  Prospects will disappear or expect incredibly deep discounts.   

With all of these to consider, costs add up rapidly. 

Who is Epsilon?

Founded in 1969, Epsilon was one of the world’s largest marketing firms until it was acquired by Publicis Groupe in 2019. Epsilon is an industry leader in data-driven marketing, consistently ranking among the top firms in the industry.  They boasted clients across several industries:

Financial Institutions: American Express, Citibank, Capital One, Barclays

Retailers: Target, L.L. Bean, Best Buy

Hospitality: Hilton, Mariott

Other large clients: Disney, TiVo, Kroger, Verizon

One of their core services was managing e-mail marketing campaigns, so they had a massive database of e-mail addresses across all of their clients.

What happened?

In April 2011, Epsilon announced that it had been the victim of a data breach. Although it hasn’t released full details of how exactly it happened, the general consensus is that it was a phishing attack. This makes sense, considering these types of attacks are still extremely common. The hackers were able to access Epsilon’s e-mail database and obtained 250 million records from 75 of Epsilon’s clients.  

Although Epsilon quickly alerted its own clients, it left communicating with the actual victims up to them.  This resulted in somewhat inconsistent notifications; Verizon, for instance, took a week to notify their customers, saying they “Wanted to make sure [we] had the most detailed information possible from Epsilon.”

No personal information was compromised, just names and e-mail addresses.  However, this opened the victims up to more targeted e-mail scams; for instance, if you see that a particular e-mail address is associated with Barclay Bank, you can send a series of spear phishing attacks to that specific person that appear more legitimate.  To wit, the perpetrators raked in an estimated $2 million from spam e-mails. 

The Aftermath

3 people were indicted;  two were sentenced and one remains at large and wanted.  Epsilon lost an estimated $45 million in business as clients left in droves; paid out another $127.5 million to victims in a settlement with the Department of Justice, and another $225 million in forensic audits, monitoring, litigation, and more. Total cost of the damage:  $4 billion.  

We’d love to tell you that lessons were learned, security was tightened, and this kind of attack never happened again…..we sure would love to tell you that.  To be fair, this hack did lead to greater awareness of vulnerabilities in databases and an improvement in best practices around security in general.  But overall, the initial method of entry – compromised credentials via a phishing attack – is still one of the most common techniques hackers use today.  In fact, compromised credentials account for 80% of all data breaches.  The smartest thing an organization can do is shift to passwordless authentication – unless they just happen to have $4 billion lying around.  

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Solving Complex Kafka Issues: Enterprise Case Studies

Apache Kafka issues, especially for enterprises running Kafka at scale, can escalate quickly and bring operations to a halt. The open source community may be able to offer assistance, but in some situations, you need a resolution fast. 

While some organizations partner with OpenLogic for ongoing, SLA-backed Kafka support, our Professional Services team gets involved when a customer who does not have a support contract needs a consultation or help troubleshooting an issue with their Kafka deployments. These engagements can last anywhere from a few days to a few weeks, depending on the scope and complexity of the project. 

In this blog, we present four Kafka case studies with details on what the Kafka issue was and how OpenLogic solved it. 

Case Study #1: Large Internet Marketing Firm

Background: This customer was tracking clickstream events to measure ad campaign success. Their large bare metal implementation contained 48 nodes, and was processing roughly 5.8 million messages per second with 1-2 second end-to-end latency.

The Issue: LeaderAndIsr requests were failing during rolling restarts, resulting in multiple leader epochs with stale zkVersions.

The Solution: OpenLogic identified an existing bug that had not been fixed in the version of Kafka they were using, which had a higher likelihood of occurring during resource contention on the Zookeeper instance co-located on five of the Kafka nodes. They recommended upgrading the Kafka cluster and running Kafka on Zookeeper on independent nodes, which fixed the issue. 

Length of Engagement: 5 days 

 

Case Study #2: Large South American Bank

Background: This customer was currently utilizing IBM MQ and not hitting the performance metrics they desired. They were having to deal with large messages at high volume.

The Issue: Due to slow response times with end-to-end latency and total throughput with large messages, the customer wanted to move to Kafka to have a streaming-focused messaging bus.

The Solution: OpenLogic provided architecture using the Saga pattern with Apache Kafka and Apache Camel for managing long-running actions, such as crediting a payment on a loan from cash deposited at a branch. They also provided architecture for using Kafka with log shipping and the ELK stack, as well as for bridging events from IBM API Connect Cloud to Elasticsearch index behind the firewall using Apache Kafka. Finally, OpenLogic led a 5-day Apache Camel training to a team of 15 people so they could learn how to create Kafka consumers and producers.

Length of Engagement: 27 days 

Related Video: Apache Kafka Best Practices 

 

Case Study #3: U.S. Aerospace Firm

Background: Originally this customer wanted help with Rancher and moving from a VM-based Kafka cluster. They were utilizing a web socket server that was responsible for collecting satellite location data in real time. The web socket server could not talk directly with Kafka, and so they had developed a Camel-based system for their original Kafka cluster. They did not have any metrics collected on the existing cluster and could not identify the root cause for message delays and lag. 

The Issue: Performance issues with pub/sub relay application that consumed from websockets from domain-specific appliance and published to Kafka queues.

The Solution: OpenLogic implemented Rancher clusters dedicated to running the Strimzi operator and serving Kafka clusters. They were also able to improve throughput dramatically by moving existing Java code to Apache Camel with vertx driver. 

OpenLogic created metrics with Prometheus and Grafana in both the Camel websocket relay application and the Kafka brokers to determine replication and processing lag, and put monitoring in place to alert on topics that didn’t meet SLAs. Once metrics collection with Grafana and Prometheus were put in place, existing bottlenecks became identifiable and addressing them drastically improved end-to-end performance.

Length of Engagement: 3 days 

Case Study #4: Global Financial Services Company

Background: Customer came to OpenLogic with a security concern with Kafka Connect that violated PCI compliance as well as internal security standards.

The Issue: Sensitive information was included in stack traces with Kafka Connect.

The Solution: OpenLogic created a test harness, which was sanitized so that customer information was not present, that reproduced the bug. They filed a bug against the project and attached the test harness – and wrote the code that resolved the bug. OpenLogic then submitted the code to the community and worked with community to modify the PR to meet the community’s standards. Finally, they informed the customer when the bug was accepted and estimated which release was likely to include the fix for it. As a result, this K.I.P. was produced from the engagement.

Length of Engagement: 20 days 

Final Thoughts

Apache Kafka is an extremely powerful event streaming platform, but when things go wrong, they go wrong at scale. These Kafka case studies illustrate the benefits of having direct access to Enterprise Architects with deep Kafka expertise in those moments when every minute counts. 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Perforce
The best run DevOps teams in the world choose Perforce. Perforce products are purpose-built to develop, build and maintain high-stakes applications. Companies can finally manage complexity, achieve speed without compromise, improve security and compliance, and run their DevOps toolchains with full integrity. With a global footprint spanning more than 80 countries and including over 75% of the Fortune 100, Perforce is trusted by the world’s leading brands to deliver solutions to even the toughest challenges. Accelerate technology delivery, with no shortcuts.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×