Take your apps—and business—into the future with Red Hat
Join this channel to learn best practices and insights on how to: containerize existing apps for increased cost efficiency, deliver new cloud-native and process-driven apps using microservice architectures, take an agile approach to integrate APIs and data, and do it all in a culture of collaboration using DevOps best practices.
Nicolas Masse, Technical Marketing Manager for API management, Red Hat. David Codelli Product Marketing Manager, Red Hat
Investment in application programming interface (API) management software increased by an average of 44% from 2012 to 2017, according to IDC.1 This growth reflects the tremendous importance of APIs to today’s businesses. While opening up digital assets promises new opportunities, companies must develop new processes to ensure that APIs are built efficiently and securely.
This session will cover Red Hat’s approach for API development. We’ll discuss how to:
- Use mocking to speed up and break dependencies.
- Use a contract-first approach for defining tests that will harden your implementation.
- Protect exposed APIs through a management gateway.
- Manage deliveries using a continuous integration/continuous delivery (CI/CD) pipeline.
Prakasha Aradhya, Product Management Director, Red HatRecorded: Feb 26 201962 mins
Digital transformation projects present many technological and organizational challenges. A key challenge is developing modern, cloud-native applications that connect customers directly using automated business processes and decisions. Creating these applications requires a radical change in how software is built—moving away from traditional, IT-led software development to a process that lets both developers and business experts contribute directly to application logic. Please join us as Prakasha Aradhya, Red Hat Senior Product Manager, will discuss how Red Hat® business rules and process automation solutions help business users and developers collaborate as equal partners to create modern applications.
Fred Dri, Application Platform Sales Specialist, Red Hat. Anand Akella, Senior Middleware Solutions Architect, Red Hat.Recorded: Feb 19 201956 mins
A common challenge for organizations is how to derive direct, tangible business value as a result of a cohesive rules strategy.
Please join Fred and Anand to learn about successful use cases that quickly showed benefits for cost savings, business acceleration, and overall simplification of business processes with rules solutions from Red Hat.
Luca Ferrari, Solution Architect for API management, Red HatRecorded: Feb 14 201926 mins
The advantages of using an Agile Integration framework don't stop at the fundamental building blocks (API Management, Distributed Integration, PaaS). This kind of framework is not isolated from the rest of the architecture.
In this session we will show how we can integrate also end users authentication and authorization, integrate various data sources and manage processes around getting access to the exposed services.
Manfred Bortenschlager, Business Development Manager and API Specialist, Red HatRecorded: Feb 13 201928 mins
In today’s changing financial services industry landscape, there are new and challenging reasons why providers and banks should be aware of the competition and put their best foot forward. These include new regulations and increased customer demands, especially when it comes to digital banking. In order to have a leg up over the competition, financial service institutions should approach these challenges as opportunities head on with strategic focus, open source, and agile integration. In this talk we address how the principles of Agile Integration can be applied to build a programmable bank and leverage the banking platform business model.
Thorsten Pohl, Platform Architect, AVIATARRecorded: Feb 6 201922 mins
Airlines around the world are striving to leverage data to further increase the reliability of their fleets. Lufthansa Technik is the largest independent provider of technical services and offers AVIATAR: a neutral platform for digital products. AVIATAR has been created with a vision of control and choice for the customers. Consequently the AVIATAR Team decided to build the platform based on a hybrid cloud ready infrastructure and open source software. In order to support neutrality and openness for all applications airlines want to use, APIs and Integration Technology are key to success. In this talk, you will learn about the overall architecture of AVIATAR and architectural questions and decisions made by the AVIATAR team.
Lucy Kerner Global Security Technical Strategist, Evangelist, Red HatRecorded: Feb 5 201936 mins
Visibility, control, security, and maintaining governance and compliance are all critical for managing your infrastructure. However, these are becoming more difficult and time consuming as your infrastructure evolves to a mix of bare metal, virtual, cloud, and container environments. How can you maintain security, governance, compliance, and reduce risk amid this growing complexity? Red Hat’s automated security and compliance solution gives you the tools -- Red Hat Ansible Automation, Red Hat Satellite, Red Hat Insights, and OpenSCAP -- to help you with these challenges.
In this session, you’ll learn how these Red Hat technologies can help:
Implement a security and compliance automation workflow, such as provisioning security-compliant hosts and maintaining compliance against industry or custom security profiles by automating audit scans and doing controlled remediations of detected issues.
Identify and remediate security threats proactively with predictive analytics.
Implement both infrastructure and security as code.
Automate patch and configuration management for consistency across your environments.
Deliver continuous security and monitoring that is centrally managed for your hybrid infrastructure.
Iftikhar Khan, Sr. Manager Ansible Security and Network Engineering, Red HatRecorded: Feb 5 201936 mins
Top security vendors refine their security solutions incessantly. A wave of new security startups emerges every year. Venture capital firms and end-user organizations invest more money than ever on potential game-changing security players. Nonetheless, the CISOs capability to defend IT infrastructures keeps deteriorating. Why? The lack of integration is a key reason for the inefficiency of existing security solutions, and an opportunity to do rethink how IT security works. In this presentation, you will learn what problems Red Hat is trying to solve with Ansible Security Automation. You will also see an example of how the solution integrates with multiple enterprise security products to address three typical use cases in IT Security: risk assessment, threat analysis, and incident response.
Dan Walsh Consulting Engineer, Red HatRecorded: Feb 5 201950 mins
Explain/demonstrates using Kubernetes with different security features for your container environment
Run containers without root, period
Take advantage of all security features the host provides
Run containers with read-only images
Limit the Linux capabilities running within your container
Set up container storage to modify the storage options in a more secure manner
Configure alternative OCI Runtimes: Kata, Gvisord and Nabla to run locked down containers
Building images with security in mind.
Limit packages/attack surface of container images
Build container images within a locked down kubernetes container
Advances in User Namespaces
Demonstrate running each container with a different User Namespace
Configure system to take advantage of user namespace container separation, without taking a drastic speed hit
Brian “Redbeard” Harrington Product Manager, Red HatRecorded: Feb 5 201936 mins
The new network is one built on the principals of software defined infrastructure. Istio provides users new capabilities to secure, orchestrate, and monitor application traffic, in many cases transparent to users.
Veer Muchandi Principal Architect, Container Solutions, Red HatRecorded: Feb 5 201949 mins
As you deploy applications and microservices to a Kubernetes based containerized platform, several questions come to mind:
- How do we deal with micro-segmentation?
- How do we deal with deploying containerized applications in different network zones?
- How do we deal with security at ingress?
- How do we deal with security at egress?
We will address these common concerns and explain how to address them. In addition, where relevant we will also discuss features provided by open source enterprise-ready Kubernetes platform such as OpenShift and how such platforms address these network security aspects for applications. This session assumes that the attendees have a basic working knowledge of Kubernetes.