Learn how Red Hat can help change the economics of IT.
Bridging conventional and agile IT, Red Hat brings a portfolio of open, flexible, heterogeneous solutions that already power the world’s most successful, innovative companies. Open platforms, open management and open application development are the keys to funding the acceleration of game-changing digital strategies.
Gunnar Hellekson, director of product management, Red Hat Rex Backman, product marketing manager, Red Hat Virtualization
Virtualization will remain an integral part of the modern datacenter for the next several years. According to the Uptime Institute, up to 65% of workloads are still on-premise. While virtualized workloads may give way to the cloud and other emerging technologies, it still puts virtualization in focus as a technology that needs to be modernized.
Join this webinar to learn about:
- Virtualization today.
- New architectures based on open source hypervisors, management, and automation solutions.
- How to lead your organization to these more modern architectures.
Deploying open, software-defined, scale-out storage solutions to industry standard servers can allow you to easily manage unstructured data for physical, virtual, and cloud environments.
Join this webinar to learn about:
> How you can benefit from added business agility and cost-efficiencies.
> Traditional, monolithic storage vs. seamlessly, scalable, software-defined storage.
>How Red® Hat Gluster Storage provides the durability, security, and performance you require.
For many firms, the migration to public cloud is well underway. Understanding what motivates these migrators and the challenges they face along the way can help you in your own journey.
Join this webinar for a rare look into an emerging group and a glimpse into the future of public cloud. You'll hear about the results of a Forrester Consulting study, commissioned by Red Hat, that looks at these aspects of firms migrating to the cloud:
> Their motivations and challenges.
> The strategies they're adopting for migration.
> What cloud migration in practice looks like.
Threats and vulnerabilities are an unfortunate reality for every organization. In this session, learn how Red Hat can help keep your infrastructure stable and secure using real-time operational analytics to help prevent vulnerabilities and mitigate critical risks across your infrastructure.
In this session, you'll hear how Red Hat's risk analytics solution works, how quick and easy it is to integrate it into your existing infrastructure, and how to use automated Red Hat remediation advice with your Ansible or Red Hat® Ansible Tower deployments to create a self-healing infrastructure.
Defending your systems, your networks, and your data is one of the hardest jobs around. It seems like every week some new headline gives you something new to worry about. It certainly can bring you down. Don't be blue. Red Hat Product Security is here to help you.
Join this lively conversation about how Red Hat helps secure the supply chain of the software you use, and how when issues arise, we work with open source communities to ensure that fixes and mitigation are quickly delivered to Blue Teams around the globe. Using the recent Blueborne vulnerability, we'll show how we're adding value to your subscriptions through our community engagement and Customer Security Awareness program to provide clear, accurate, and timely advice so you can defend yourselves appropriately.
A market transition is underway. The enforcement date of May 2018 for the European Union (EU) General Data Protection Regulation (GDPR) is fast approaching. Currently, the EU's privacy framework consists of a bundle of national data privacy laws. While the GDPR contains the same 6 core data protection principles, it will introduce a single framework that is directly applicable in all EU Member States. The GDPR introduces far-reaching obligations for companies that collect, use, or otherwise process personal information; for example, it introduces certain enhanced rights for covered individuals, such as data portability rights.
In this session, we'll help you think about data in the context of GDPR and help you consider your role with data, where your data is, where it came from, and what data you are accountable for.
Trusted execution environments (TEEs) are a new set of technologies coming to a server environment near you from silicon providers such as Intel and AMD. They offer the possibility of changing how we architect systems that handle sensitive information.
In this session, we'll take a look at what that means to you, your customers, your vendors, and your partners.
The classic 'waterfall' approach to the creation of security and compliance procedures is in direct contrast to the fast and agile DevOps approach to application development embraced today. Government agencies and commercial industry have re-staffed to bring themselves into the 21st century: These people understand the value of DevOps development principals, but they've been asked to meld those principles with antiquated waterfall process with gated checkpoints, starts-and-stops, and long development cycles.
This session will share lessons learned from the U.S. Defense and Intelligence Community, where Red Hat partnered with the Government to programmatically modernize security and compliance processes. Security is now integral to the system life-cycle, using software-defined baselines to support supporting continuous monitoring of compliance controls.
Maintaining visibility, control, and compliance remains paramount, but it becomes more difficult in a hybrid infrastructure consisting of multiple, different environments. With disparate environments, having visibility into, controlling, and ensuring governance and compliance, becomes more challenging and time consuming.
In this session, you’ll learn how Red Hat management technologies and OpenSCAP can help you automate security and compliance across private or public cloud environments, virtual environments, and container environments. Learn how to automate compliance against various security or regulatory profiles such as the Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) and the Payment Card Industry Data Security Standard (PCI-DSS), your custom policies, and many others. You’ll also learn how to perform audit scans and automate remediations on your systems.
In today’s cyber environment, IT infrastructures are constantly threatened by cybercriminals and malicious actors. According to a 2017 report by the U.S. Chamber of Commerce, “Conservative estimates put the global economic toll of cybercrime at $375 billion dollars.” Organizations like the Payment Card Industry Security Standards Council exist to develop standards to help protect sensitive and valuable data from such threats. Navigating the landscape of the PCI Data Security Standard recommendations and requirements can be difficult, especially when applying these standards to new and emerging technologies like containers and micro-services.
In this session, Coalfire, a respected PCI qualified security assessor company, and Red Hat will discuss PCI DSS, containers, and how a container platform helps support PCI DSS compliance.
If your organization is building a private cloud or using a public one, and the initiative is successful, your IT environment will soon reach a scale and complexity that requires automation.
In this session, Alessandro Perilli, general manager of Management Strategy at Red Hat, will explore the security implications of cloud automation. As a powerful software layer, automation implies a number of security risks that must be evaluated and mitigated. At the same time, if properly used, automation can become a powerful ally for CISOs. Not only can automation support tactical and strategic security initiatives; it can also become the enabling foundation for the most elusive milestone in IT security: self-defending networks.