Hi [[ session.user.profile.firstName ]]

Build, integrate & deploy applications faster

  • Date
  • Rating
  • Views
  • Business Process Automation, Decision Support and Modern Application Development
    Business Process Automation, Decision Support and Modern Application Development
    Prakasha Aradhya, Product Management Director, Red Hat Recorded: Feb 26 2019 62 mins
    Digital transformation projects present many technological and organizational challenges. A key challenge is developing modern, cloud-native applications that connect customers directly using automated business processes and decisions. Creating these applications requires a radical change in how software is built—moving away from traditional, IT-led software development to a process that lets both developers and business experts contribute directly to application logic. Please join us as Prakasha Aradhya, Red Hat Senior Product Manager, will discuss how Red Hat® business rules and process automation solutions help business users and developers collaborate as equal partners to create modern applications.
  • How to Derive Business Value with Rules
    How to Derive Business Value with Rules
    Fred Dri, Application Platform Sales Specialist, Red Hat. Anand Akella, Senior Middleware Solutions Architect, Red Hat. Recorded: Feb 19 2019 56 mins
    A common challenge for organizations is how to derive direct, tangible business value as a result of a cohesive rules strategy.

    Please join Fred and Anand to learn about successful use cases that quickly showed benefits for cost savings, business acceleration, and overall simplification of business processes with rules solutions from Red Hat.
  • Extending Agile Integration Platform w/ Identity/Data Mgmt & Process Automation
    Extending Agile Integration Platform w/ Identity/Data Mgmt & Process Automation
    Luca Ferrari, Solution Architect for API management, Red Hat Recorded: Feb 14 2019 26 mins
    The advantages of using an Agile Integration framework don't stop at the fundamental building blocks (API Management, Distributed Integration, PaaS). This kind of framework is not isolated from the rest of the architecture.

    In this session we will show how we can integrate also end users authentication and authorization, integrate various data sources and manage processes around getting access to the exposed services.
  • How to create a Banking Platform Business Model with Agile Integration
    How to create a Banking Platform Business Model with Agile Integration
    Manfred Bortenschlager, Business Development Manager and API Specialist, Red Hat Recorded: Feb 13 2019 28 mins
    In today’s changing financial services industry landscape, there are new and challenging reasons why providers and banks should be aware of the competition and put their best foot forward. These include new regulations and increased customer demands, especially when it comes to digital banking. In order to have a leg up over the competition, financial service institutions should approach these challenges as opportunities head on with strategic focus, open source, and agile integration. In this talk we address how the principles of Agile Integration can be applied to build a programmable bank and leverage the banking platform business model.
  • How Lufthansa Technik built the digital platform AVIATAR with Agile Integration
    How Lufthansa Technik built the digital platform AVIATAR with Agile Integration
    Thorsten Pohl, Platform Architect, AVIATAR Recorded: Feb 6 2019 22 mins
    Airlines around the world are striving to leverage data to further increase the reliability of their fleets. Lufthansa Technik is the largest independent provider of technical services and offers AVIATAR: a neutral platform for digital products. AVIATAR has been created with a vision of control and choice for the customers. Consequently the AVIATAR Team decided to build the platform based on a hybrid cloud ready infrastructure and open source software. In order to support neutrality and openness for all applications airlines want to use, APIs and Integration Technology are key to success. In this talk, you will learn about the overall architecture of AVIATAR and architectural questions and decisions made by the AVIATAR team.
  • Automating Security and Compliance for Hybrid Environments
    Automating Security and Compliance for Hybrid Environments
    Lucy Kerner Global Security Technical Strategist, Evangelist, Red Hat Recorded: Feb 5 2019 36 mins
    Visibility, control, security, and maintaining governance and compliance are all critical for managing your infrastructure. However, these are becoming more difficult and time consuming as your infrastructure evolves to a mix of bare metal, virtual, cloud, and container environments. How can you maintain security, governance, compliance, and reduce risk amid this growing complexity? Red Hat’s automated security and compliance solution gives you the tools -- Red Hat Ansible Automation, Red Hat Satellite, Red Hat Insights, and OpenSCAP -- to help you with these challenges.

    In this session, you’ll learn how these Red Hat technologies can help:
    Implement a security and compliance automation workflow, such as provisioning security-compliant hosts and maintaining compliance against industry or custom security profiles by automating audit scans and doing controlled remediations of detected issues.
    Identify and remediate security threats proactively with predictive analytics.
    Implement both infrastructure and security as code.
    Automate patch and configuration management for consistency across your environments.
    Deliver continuous security and monitoring that is centrally managed for your hybrid infrastructure.
  • Ansible Security Automation
    Ansible Security Automation
    Iftikhar Khan, Sr. Manager Ansible Security and Network Engineering, Red Hat Recorded: Feb 5 2019 36 mins
    Top security vendors refine their security solutions incessantly. A wave of new security startups emerges every year. Venture capital firms and end-user organizations invest more money than ever on potential game-changing security players. Nonetheless, the CISOs capability to defend IT infrastructures keeps deteriorating. Why? The lack of integration is a key reason for the inefficiency of existing security solutions, and an opportunity to do rethink how IT security works. In this presentation, you will learn what problems Red Hat is trying to solve with Ansible Security Automation. You will also see an example of how the solution integrates with multiple enterprise security products to address three typical use cases in IT Security: risk assessment, threat analysis, and incident response.
  • Security Concerns in the Container Runtimes
    Security Concerns in the Container Runtimes
    Dan Walsh Consulting Engineer, Red Hat Recorded: Feb 5 2019 50 mins
    Explain/demonstrates using Kubernetes with different security features for your container environment

    General Concept

    Run containers without root, period
    Take advantage of all security features the host provides
    Configuring CRI-O:

    Run containers with read-only images
    Limit the Linux capabilities running within your container
    Set up container storage to modify the storage options in a more secure manner
    Configure alternative OCI Runtimes: Kata, Gvisord and Nabla to run locked down containers
    Building images with security in mind.

    Limit packages/attack surface of container images
    Build container images within a locked down kubernetes container
    Advances in User Namespaces

    Demonstrate running each container with a different User Namespace
    Configure system to take advantage of user namespace container separation, without taking a drastic speed hit
  • Securing the New Network with Istio
    Securing the New Network with Istio
    Brian “Redbeard” Harrington Product Manager, Red Hat Recorded: Feb 5 2019 36 mins
    The new network is one built on the principals of software defined infrastructure. Istio provides users new capabilities to secure, orchestrate, and monitor application traffic, in many cases transparent to users.
  • Network Security for Containerized Applications
    Network Security for Containerized Applications
    Veer Muchandi Principal Architect, Container Solutions, Red Hat Recorded: Feb 5 2019 49 mins
    As you deploy applications and microservices to a Kubernetes based containerized platform, several questions come to mind:
    - How do we deal with micro-segmentation?
    - How do we deal with deploying containerized applications in different network zones?
    - How do we deal with security at ingress?
    - How do we deal with security at egress?
    and more
    We will address these common concerns and explain how to address them. In addition, where relevant we will also discuss features provided by open source enterprise-ready Kubernetes platform such as OpenShift and how such platforms address these network security aspects for applications. This session assumes that the attendees have a basic working knowledge of Kubernetes.

Embed in website or blog