NEXOR FEATURES IN RED HAT SUCCESS STORY
March 2015
Following on from being short-listed for the global Red Hat Certified Professional of the Year, one of Nexor’s technical team, Colin Powers, has been interviewed by Red Hat for its “Success stories” series.
Colin is a Red Hat Certified Engineer (RHCE) with a Certificate of Expertise in SELinux Policy Administration and had a major input into Nexor Guardian, part of our industry-leading SIXA® technology portfolio.
The video below takes you through Colin’s journey of Red Hat Training and Certification in SE Linux and how he uses these skills to create trustworthy technology solutions for a number of global clients, including NATO, where we are delivering the Information Exchange Gateways (IEGs) for its new headquarters in Brussels.
Our adoption of Red Hat for the secure development of our solutions fits into our approach of combining the best of people, process and technology. Nexor is one of a select number of companies in the UK that holds Investors in People Gold status.
You can find out further details on the range of accredited professionals working for Nexor and the types of certification that they hold on this website.
RECENT BLOG POSTS
Press Release – Guardian 3.1 – High Availability
Nexor are pleased to announce that our Guardian solution has been enhanced with a number of key features in a new release 3.1 of the guard application which is now available: Increased Reliability: Deploy as an active -passive High-Availability ("HA") application...
Making Effective Use Of Zero Trust Security
One year on from our introductory blog on Zero Trust Architecture, what has changed and what friction points have started to appear for organisations after implementation? Crucially, where does Zero Trust fit within the to-do list, or the essential security risk...
Cyber Essentials – Under The Bonnet
What does Cyber Essentials cover? Cyber Essentials is a UK Government backed scheme that helps protect your business against a range of the most common cyber-attacks. Cyber-attacks can come in many forms and may be carried out against businesses of any size of...
Be the first to know about developments in secure information exchange