We support you – from classic vSphere over IaaS to Paas or XaaS
Your business requirements are unique – this is also the evoila IT support.
We are there for you to offer you the advice, support and regular support which you need to make sure that your IT is your capital.
We are ISO/IEC 27001certified. Our entire organization is subject to systematic risk management. We offer more than just the standard!
Rely on the excellent IT and cloud managed services for the proactive administration, supervision and maintenance of safe, trouble-free surroundings with unusual support services.
evoila offers you professional consulting and custom-made business services which help you to understand and to realize the complexity, possibilities and advantages of cloud integration. Our team supports you during analysis, advice, planning and putting into action of your aims and the existing infrastructure. With our manufacturer independent advice and architecture services you accomplish your goals in short time!
INFRASTRUCTURE AS CODE, PIPELINES, WORKFLOWS
IT-based automation of business processes has always been a core competence of our engineers. We offer you our developer know-how and work with your people at eye level. With our evoila-Servicebroker we enable you a uniform use of different services across different platforms. Unique, independent and competent!
Cloud Consulting: Hybrid, private, public, multi
Together with you our team works out an individual cloud architecture which covers all desired needs. The result: a cloud solution concept made to measure upon your requirements.
Cyber security is one of the greatest challenges for enterprises in today’s time. We look at IT-security integrally and are your partner if it is about the protection against your IT landscape. We focus on cloud native surroundings and tool set and highly qualified consultants offer you a rounded. Of the definition about the implementation up to the operation of custom-fit security solutions – we support your enterprise. Our Managed Security service takes on security monitoring for you at all levels so that they can fully concentrate on your core issues.
Custom-made software solutions, if standard is not enough!
From our wide offer we find the best solution for your requirements. The variety ensures the free choice of components on the way to your optimal system. Our range consists of two primary components: On the one hand the portfolio of our partners, such as VMware, Pivotal or Elastic. On the other hand, our self-created software solutions such as service brokers for various databases, queuing solutions or other services.
Bosh and Tile Development
Besides pure BOSH based deployments, moreover, we offer hybrid applications based on BOSH and Cloudfoundry as well as a transformation of BOSH/Cloudfoundry Deployments for some service components in files for the automatic Deployment on PCF. All variants get by on standardized integration tests and Deployment pipelines, as well as based in the case of the service brokers with a validity check on the evoila osb checker for Concourse.
Cloud Foundry Service Brokers
No matter whether MongoDB, PostgreSQL, MySQL or a completely different service: our Ccoud foundry service brokers unite all requirements of a modern service broker: varying functions, individual cloud architecture!
Concourse Automated Delivery
The principle of continous delivery followed by us is simple: changes to the source code are immediately provided – by means of an automated concourse pipeline – in a test or productive surrounding to recognize and eliminate possible mistakes as quickly as possible. Every code change is release readily and at the touch of a button ready with that.
„It’s not enough to know,
you have to apply it.“
Johann Wolfgang Goethe
Create competences – enlarge knowledge!
The continuous training of employees is a strategic instrument of modern human resources development. For this we conceive and carry out further education solutions for your enterprise. No matter if Elastic, OpenStack or VMware: You and your company will learn how to use the respective software products in a target-oriented and success-oriented way.
E1 Administrating and Monitoring
Elastic Search, Logstash, Beats and Kibana Conception of a cluster setup.
E2 analysis and visualization with Kibana
Extensive use of Kibana.
E3 Data Retrieval with Elasticsearch, Logstash, Beats
Learn administrator skills based on the Elasticsearch Ecosystem.
O1 Implementation and Architecture
Basic understanding of the architecture and concepts building a cloud.
O2 For Developers & DevOps
Basics OpenStack and application of orchestration tools.
V1 vRealize Automation Workshop
Installation vRealize Automation (vRA) from VMware including concrete usage options.
V2 vRealize Business Workshop
Installion, building and use vRealize Business (vRB) VMware.
Here you will find interesting information about our projects and work.
Most people probably see good passwords as a cumbersome necessity. They come attached with a seemingly ever-changing set of rules that force us to create intricate text strings that are usually a pain memorize.
In this post I will try to highlight the joy of good passwords by assigning them a monetary value albeit admittedly an imperfect one. I encourage everybody not to see password creation as a tedium but instead to enjoy the financial catastrophe we inflict to an imaginary attacker foolish enough to attempt cracking our password. In addition I will present a scheme that allows the creation of good passwords that are also easy to remember.
NSX-T supports Multi-TEP just like NSX-V. But this feature was limited to ESXi hosts and it was not supported for Edge Nodes. Since NSX-T version 2.4 Multi-TEP is supported for Edge Nodes as well, which optimizes the North-South network performance.
Starting with NSX-T 2.4 the Multi-TEP was supported but not recommend from reference design guide perspective. The recommendation was added after the reference design guide was updated for NSX-T 2.5. Since then a deployment with a single NVDS vor VLAN and Overlay transport zones combined with Multi-TEP for ESXi and Edge Nodes is recommended.
If you have never heard of DNS tunneling/exfiltration, or even had contact with it in your enterprise network and are wondering how to detect it, you have probably come to the right place. In this blog post, we explain what exactly is DNS exfiltration or tunneling attack, as well as why it has previously been difficult to detect it and how we can successfully use the built-in machine learning capabilities of Elasticsearch.