<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=58103&amp;fmt=gif">
Skip to content
Search icon
NEWSROOM
 

Discover What's New at Shadow-Soft

Learn More Before Working With Us

Read our guide that details the 5-Step Roadmap for Upgrading Legacy Systems and Apps.

Shadow-Soft Offers VMware Exit Path for Mid-Market Enterprises Facing Broadcom Licensing Upheaval

Nov 4, 2025

Shadow-Soft offers VMware migration solutions amid Broadcom licensing changes, showcasing strategies at KubeCon 2025 to help enterprises transition to modern platforms.

Shadow-Soft Brings Kubernetes Horror Stories to KubeCon 2025 with "This is Fine" Experience

Nov 3, 2025

Join Shadow-Soft at KubeCon 2025 to share Kubernetes horror stories, vote on the worst disasters, and win prizes while learning from past failures in a fun, engaging environment.

Shadow-Soft Achieves Red Hat Virtualization Specialization to Accelerate Enterprise Migrations

September 30, 2025

Shadow-Soft, a boutique IT consulting and systems integrator, today announced it has been named a Red Hat Specialized Partner for virtualization in the United States, adding to its existing specializations in container management and automation.

Shadow-Soft Joins Red Hat Partner Practice Accelerator Program

September 24, 2024

Shadow-Soft, a leading technology solutions provider, today announced its participation in Red Hat Partner Practice Accelerator, a specialized growth pathway for select partners with validated professional services delivery capabilities.

Achieving Intelligent Observability with Dynatrace and Red Hat OpenShift: Shadow-Soft's 4-Week Pilot

June 20, 2024

Shadow-Soft, a trusted partner of Red Hat and Dynatrace, is excited to announce a unique pilot solution that combines the power of OpenShift with Dynatrace's advanced observability and AI-driven monitoring capabilities.

Shadow-Soft 4C’s Framework Addresses Technology Attacks and Vulnerabilities

May 10, 2023

Shadow-Soft is drawing attention to cyber attacks that are happening every 39 seconds on average according to the non-profit Information Security Forum.