ESAE Series Part 5 - Windows IPSec

cyber-security-600_360
Welcome to the fifth part of our ESAE series. In this part, we would like to focus on an area that is not covered so comprehensively on the Internet - Windows IPSec. What is IPSec? "IPsec (short for Internet Protocol Security) is a protocol suite designed to enable secure communication over potentially insecure IP networks such as the Internet. IPs...
Continue reading

Openshift - Automated Installation in Azure

hamburg-3021820_640
We deliberately do without an introductory article about the importance of OpenShift and the advantages over a native Cubernet installation. There are enough articles about this on the net and Red Hat also writes about it: https://www.openshift.com/learn/topics/kubernetes/ Anyone who has ever needed a high-available Openshift installation for tests...
Continue reading

Provider Management in the context of out-tasking - A report from the field

play-2882474_640
IT out-tasking is still a popular tool in IT management. As this form of outsourcing is often used, we would like to share our experience with you. In these articles we try to reflect practical experience from a general point of view, less the classical theory of outsourcing or out-tasking. Our articles are based on the illustrated cycle. It is imp...
Continue reading

Naked TEAL - For you! - With you! - Be there!

naked_teal
We are TEAL, a young start-up doing system integration. And we want to embark on a unique journey with you, our fans, followers, friends, readers, future employees, editors and many, many more from the community who may not even know us today: The journey to the first virtual IT consulting company in Germany Our goal: We want to become a maximum at...
Continue reading

Can I really convert any application into a container and how?

hamburg-3021820_640
In our first two container articles, we talked about the architecture and the deployment of container solutions. We'd now like to tackle the topic of application transformation. This article was written together with our partner company – Skillbyte . Skillbyte provides services in the areas of DevOps & Cloud, Big Data and Analytics, as well as ...
Continue reading

ESAE series part 4 – Protective measures for the environment

cyber-security-600_360
In this part of the series, we would like to reiterate the requirements from part 2 ( Link ) and demonstrate which measures have been taken to protect the critical systems. However, before we start off with the requirements, there needs to be clarity over which systems are classified as tier 0, tier 1 and tier 2. This definition may vary depending ...
Continue reading

ESAE series part 3 - Privileged access management and the shadow principal feature

cyber-security-600_360
As already announced in the last article ( LINK ) of the ESAE series, in this article we would like to give you a more in-depth description of the technical core of the ESAE-oriented environment which makes the just-in-time administration possible. This core consists of the shadow principals, temporary group memberships and the new Microsoft I...
Continue reading

Hybrid Container deployment with Jenkins

loading-652296_640
After having written about the architecture of a modern container platform in general in our first blog article ( LINK ), we would like to delve deeper into the praxis with this article. We'll describe a technical solution that helps companies to comply with a wide range of legal requirements while remaining flexible and cost-effective. Strict requ...
Continue reading

Container - How does a modern enterprise container environment look like?

hamburg-3021820_640
When the trend towards virtualisation arose, many companies were sceptical at first. In modernisation projects, operations teams and stakeholders still had to be convinced that applications could be deployed on virtual servers, eliminating the need for dedicated servers. Over time and with increasing operational experience, however, the starting po...
Continue reading

ESAE series part 2 – Customer situation and architecture

cyber-security-600_360
As announced in our introductory article on the ESAE series, we would like to elaborate on the client situation and the architecture of the solution in the second article. Despite the client being represented in numerous countries worldwide, the individual national companies worked predominantly self-sufficiently in the past. There were only very f...
Continue reading

ESAE series part 1- Introduction

cyber-security-600_360
In the blog category "Secure Administration Environment" we want to share our experiences from customer projects around Microsoft's Enhanced Security Administration Environment (ESAE), so that others can learn from our experiences and not stumble across the same problems as we did. We will start with a series on a very exciting topic that we have b...
Continue reading

Teal Blog

home-office-336373_1920
As an IT consulting company specializing in infrastructure and cloud technologies, we were able to gain a lot of experience in the planning and implementation of IT projects for major clients. Through our blog, we want to pass on the acquired knowledge in order to allow as many people as possible to participate in our experiences. We will start wit...
Continue reading