Today, we’re excited to introduce Conveyor, a customer trust platform born out of the insights obtained building Aptible Comply. Conveyor is a new company spun out of Aptible whose mission is to build a more trustworthy internet by creating a network of customers and vendors that makes it simple to build trust through data security.
Aptible Comply is now Conveyor. Aptible Deploy will continue to operate unchanged as Aptible's flagship product, with even greater focus than before.
Announcing Log Drain Improvements for High-Performant, Reliable Delivery to External Destinations
Aptible Deploy has enhanced the log drain functionality of the platform to ensure customers experience minimal to no lag, and reduce chances of any packet losses, even when generating and sending logs at very high volumes.
Building Aptible’s Design System
Aptible created a design system, Arrow Design System, to be able to create high-quality and consistent experiences for our users. It's owned and maintained by the UX Engineering team which allows us to invest in the user experience independently of product feature requests. Learn more about how Arrow DS allows us to make our software easier to use and give users more reason to trust our products.
In this post, we want to demystify
createSlice by building our own stripped down version of it for new engineers to use as a reference guide when learning redux.
If you have a product and customers, then you also have members of your team who need access to critical systems in order for your company to function. Safeguarding credentials that can access these systems via mechanisms like 2FA, U2F, and key rotation is necessary but not sufficient. You must also monitor for key security events and review each to ensure your protections are working as intended.
Here at Aptible, we’ve solved the problem of monitoring and requesting approval for security events via a lightweight Slack integration we built called Powertrip. With Powertrip, we are able to send Slack notifications to relevant team members about key security events within minutes of the event happening.