Blog

Latest Added Blogs

Turning Customer Data into Strategic Advantage with Splunk MLTK

Turn customer data into strategic advantage with Splunk MLTK. Machine learning anomaly detection, security, and Splunk Enterprise Security.

Read More
Turning Customer Data into Strategic Advantage with Splunk MLTK
Turning Customer Data into Strategic Advantage with Splunk MLTK

Turn customer data into strategic advantage with Splunk MLTK. Machine learning anomaly detection, security, and Splunk Enterprise Security.

Read More
A New Era in Security Operations with Splunk Mission Control
A New Era in Security Operations with Splunk Mission Control

Unify alerts, automate response, and gain full visibility with Splunk Mission Control. Accelerate SOC efficiency—take control today!

Read More
The Power Behind Real-Time Web Applications
The Power Behind Real-Time Web Applications

Learn how WebSocket and Socket.IO enable real-time features like chat, notifications, and live data in modern React and Node.js applications.

Read More
Understanding Modern Systems: End-to-End Visibility with Splunk Observability
Understanding Modern Systems: End-to-End Visibility with Splunk Observability

Discover how Splunk Observability provides visibility and faster root cause analysis across systems. Start your observability journey today.

Read More
Smart Log Analysis with Splunk Machine Learning Toolkit (MLTK)
Smart Log Analysis with Splunk Machine Learning Toolkit (MLTK)

Unlock insights with Splunk’s Machine Learning Toolkit (MLTK). Detect anomalies, predict trends, optimize operations using machine data.

Read More
Export Jira Worklog Data with Python and Send It to Your Team via Email
Export Jira Worklog Data with Python and Send It to Your Team via Email

Transfer Jira worklogs to Excel using Python and Jira API. Send via email. Save time with this detailed guide and troubleshooting tips!

Read More
Jira Time Tracking Automation with Python: Daily API and Cron-Based Solution
Jira Time Tracking Automation with Python: Daily API and Cron-Based Solution

Automate daily time tracking using Python, Jira REST API, and cron. A quick guide to holiday-aware reporting and Teams alerts!

Read More
Cisco Meraki: As If Above the Clouds
Cisco Meraki: As If Above the Clouds

Discover the ease, security, and performance of cloud-based network management with Cisco Meraki. Solutions that enhance efficiency.

Read More
BThaber CxO Roundtable Meeting: Continuity and Efficiency of IT Infrastructure 2
BThaber CxO Roundtable Meeting: Continuity and Efficiency of IT Infrastructure 2

CxOs comprehensively evaluated the strategic impact of IT infrastructure on operational service quality, efficiency, and business continuity.

Read More
We Were a Sponsor of the BThaber CxO Roundtable Meeting!
We Were a Sponsor of the BThaber CxO Roundtable Meeting!

As Sekom, we sponsored the BT Haber CXO Roundtable Meeting, where the digital transformation agenda was discussed.

Read More
AI Developments and OpenShift AI Platform
AI Developments and OpenShift AI Platform

Discover the latest advancements in AI with the OpenShift AI platform. Get ready for the future with enterprise AI applications.

Read More
What is SD-WAN (Software-Defined Wide Area Network)?
What is SD-WAN (Software-Defined Wide Area Network)?

Enhance network performance and maximize security with SD-WAN solutions. Discover details about flexible and scalable SD-WAN solutions.

Read More
Red Hat OpenShift 4.15/4.16 & Satellite 6.14/6.15: New Features
Red Hat OpenShift 4.15/4.16 & Satellite 6.14/6.15: New Features

Explore the security, AI/ML, automation, and performance enhancements introduced with OpenShift 4.15, 4.16, and Satellite 6.14, 6.15 updates.

Read More
Easily Adapt to Different Solutions with Linux!
Easily Adapt to Different Solutions with Linux!

Learn how Linux powers hybrid cloud solutions with flexibility, scalability, and expert support from Sekom and Red Hat.

Read More
How to Protect Yourself Against Cyber Threats and Ransomware with RUBRIK Shield?
How to Protect Yourself Against Cyber Threats and Ransomware with RUBRIK Shield?

Learn how Rubrik’s converged backup solution protects data against ransomware with immutable storage and rapid recovery features.

Read More
Transitioning from CentOS to RHEL: Why, How? & The Impact of Sekom in the Migration Process
Transitioning from CentOS to RHEL: Why, How? & The Impact of Sekom in the Migration Process

Explore how Sekom streamlines the transition from CentOS to RHEL, leveraging Red Hat’s robust security, scalability, and enterprise support.

Read More
Sekom Joined the Red Hat Partner Practice Accelerator Program
Sekom Joined the Red Hat Partner Practice Accelerator Program

Sekom is making a difference in transformation by specializing in hybrid cloud solutions through the Red Hat Partner Practice Accelerator.

Read More
Cisco and Red Hat Strengthen Collaboration for Digital Transformation
Cisco and Red Hat Strengthen Collaboration for Digital Transformation

Discover how Cisco and Red Hat drive transformation with AI/ML, observability, security bundles, and hybrid cloud solutions.

Read More
Red Hat OpenShift 4.12, 4.13, 4.14 Versions: New Features, Advantages, and Upcoming Developments
Red Hat OpenShift 4.12, 4.13, 4.14 Versions: New Features, Advantages, and Upcoming Developments

Discover the latest innovations and key advantages in Red Hat OpenShift 4.12–4.14. Explore the developments awaiting you in the future!

Read More
Webex Calling Cloud Security and Media Path Optimization
Webex Calling Cloud Security and Media Path Optimization

Optimize security and reduce latency in Webex Calling with ICE, CUBE, and KMS integration. Secure communication effectively.

Read More
ExtraHop NDR Solution: A Revolutionary Advanced Approach in Network Security
ExtraHop NDR Solution: A Revolutionary Advanced Approach in Network Security

Discover how ExtraHop NDR leverages AI and machine learning for real-time threat detection, comprehensive visibility, and rapid response.

Read More
New Features in Ansible Automation Platform 2.4
New Features in Ansible Automation Platform 2.4

Uncover the latest innovations in Red Hat AAP 2.4, including Event-Driven Ansible, ARM support, and AI-powered Ansible Lightspeed.

Read More
How to Prepare for Red Hat Exams?
How to Prepare for Red Hat Exams?

Boost your skills and validate them with Red Hat’s hands-on training and certification exams. Access expert resources and lab environments!

Read More
Firewall Changes Required for Container Image Pull Operations
Firewall Changes Required for Container Image Pull Operations

Red Hat is updating container image pull processes, affecting registry access. Ensure your firewall settings are configured by May 1, 2023.

Read More
Overview of Opportunities Offered Through Red Hat Training
Overview of Opportunities Offered Through Red Hat Training

Gain essential open-source skills with Sekom, Turkey’s Red Hat Advanced Training Partner. Explore Red Hat’s comprehensive training courses.

Read More
Traffic Management, Monitoring, and Security in Microservices Framework with Citrix ADC
Traffic Management, Monitoring, and Security in Microservices Framework with Citrix ADC

Citrix ADC enhances traffic management, security, and visibility in microservices frameworks with flexible deployment options.

Read More
New “Security Context Constraints” Policies Introduced with Red Hat OpenShift 4.11
New “Security Context Constraints” Policies Introduced with Red Hat OpenShift 4.11

Explore SCC in Red Hat OpenShift, its default policies, security strategies, and how to manage pod permissions effectively.

Read More
Juniper BNG Solutions
Juniper BNG Solutions

Explore how Juniper MX Routers enhance BNG operations with PTA, LAC, LNS modes, IPv4/IPv6 support, and integrated CGNAT for ISPs.

Read More
Red Hat Enterprise Linux 9.1 and 8.7 Released
Red Hat Enterprise Linux 9.1 and 8.7 Released

Discover the latest in Red Hat Enterprise Linux 9.1 and 8.7 — security enhancements, malware detection, and advanced container support.

Read More
What Do Backup and Application Mobility for Your Kubernetes Environments Provide?
What Do Backup and Application Mobility for Your Kubernetes Environments Provide?

Discover how Veeam and Kasten K10 streamline backup, disaster recovery, and application mobility for Kubernetes deployments.

Read More
Data Center Network Automation and Apstra Solution
Data Center Network Automation and Apstra Solution

Optimize EVPN-VXLAN data centers with Apstra's Intent-Based Networking. Reduce complexity, increase uptime, and monitor network health.

Read More
Sekom Offers Customized Solutions and Services to Companies
Sekom Offers Customized Solutions and Services to Companies

Explore how Sekom leverages cloud, data security, and Edge Computing to drive digital transformation across industries.

Read More
Red Hat Advanced Cluster Security for Kubernetes: A Comprehensive Overview
Red Hat Advanced Cluster Security for Kubernetes: A Comprehensive Overview

Explore how Red Hat StackRox, now Advanced Cluster Security, fortifies Kubernetes pods, runtimes, and infrastructure against threats.

Read More
OpenShift and Kubernetes Application Management Core Concepts
OpenShift and Kubernetes Application Management Core Concepts

Discover why OpenShift is essential for Kubernetes users. Learn its core concepts, integration benefits, and deployment strategies.

Read More
What is Red Hat OpenShift Pipelines
What is Red Hat OpenShift Pipelines

Learn how OpenShift Pipelines, built on Tekton, automates CI/CD for cloud-native apps with containerized workflows and reusable pipelines.

Read More
We Aim to Play a Key Role in the Digital Transformation of the Public Sector
We Aim to Play a Key Role in the Digital Transformation of the Public Sector

Sekom and Red Hat showcased the latest digital transformation technologies to public sector IT managers in Ankara, focusing on solutions.

Read More
Security Vulnerability in CRI-O Could Affect OpenShift Users
Security Vulnerability in CRI-O Could Affect OpenShift Users

Crowdstrike identifies "cr8escape" exploit in CRI-O, enabling container escapes and root access. Update to version 1.23.2 for security.

Read More
Welcome to the World of Webex Calling
Welcome to the World of Webex Calling

Seamlessly migrate your IP phones and PSTN lines to the cloud with Webex Calling - manage devices centrally and access calling features.

Read More
Red Hat OpenShift vs. Kubernetes Comparison
Red Hat OpenShift vs. Kubernetes Comparison

OpenShift simplifies container management with integrated CI/CD, security, and storage solutions, surpassing Kubernetes setups.

Read More
Cisco Meraki: Bringing the Comfort of the Office to Your Home
Cisco Meraki: Bringing the Comfort of the Office to Your Home

Enhance remote work with Cisco Meraki — improve connectivity, security, and productivity while working from home efficiently.

Read More
Cisco Webex: The Platform That Turns Your Ideal Video Conferencing Experience into Reality
Cisco Webex: The Platform That Turns Your Ideal Video Conferencing Experience into Reality

Cisco Webex enhances meeting experiences with AI-driven features like real-time translation, noise removal, and immersive presenter.

Read More
Red Hat StackRox Security – Securing Cloud-Native Applications and Containers
Red Hat StackRox Security – Securing Cloud-Native Applications and Containers

Red Hat strengthens its DevSecOps infrastructure by acquiring StackRox, a Kubernetes-native security platform, enhancing OpenShift security.

Read More
4 Benefits of Cisco Meraki Solution – The Star of SD-WAN Technology
4 Benefits of Cisco Meraki Solution – The Star of SD-WAN Technology

Discover how Cisco Meraki empowers businesses with centralized control, enhanced security, and cost-effective SD-WAN network management.

Read More
What is Red Hat OpenShift?
What is Red Hat OpenShift?

Leverage Red Hat OpenShift for agile, cloud-native app development. Boost efficiency, scalability, and speed with Sekom’s training expertise.

Read More
Cisco SD-WAN: A Whole New WAN Experience!
Cisco SD-WAN: A Whole New WAN Experience!

Discover how Cisco SD-WAN delivers enterprise-scale simplicity, real-time visibility, and cost savings with advanced security features.

Read More
Is Cloud Collaboration Secure? Cloud or On-Premise Solution?
Is Cloud Collaboration Secure? Cloud or On-Premise Solution?

Explore Cisco’s secure cloud and on-premise solutions, including DUO MFA and Cloudlock DLP, for seamless digital transformation.

Read More
Why Cisco Collaboration Solutions?
Why Cisco Collaboration Solutions?

Streamline communication infrastructure with Cisco’s AI-powered solutions, integrating calling, meetings, and contact centers.

Read More
Visibility in Modern Data Centers: Discover Cisco MDS SAN Analytics
Visibility in Modern Data Centers: Discover Cisco MDS SAN Analytics

Monitor your storage network, enhance performance, and identify issues with Cisco SAN Analytics to boost efficiency in your data center.

Read More

“Building Digital Future”

We are a well-established, reliable, and expert digital transformation integrator, committed to the satisfaction of both our customers and our employees.

Explore