The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
Open source management is a key part of any application security toolkit. But with so many different tools and techniques on the market, how can you decide what other tools you need to fully address the security risks of your applications? In this webinar, you’ll learn the benefits and limitations of several application security tools, including SAST, SCA, DAST, IAST, and fuzzing, as well as how they differ, so you can make informed decisions as you build your AppSec toolkit.
Abstract: H2O Driverless AI empowers data scientists or data analysts to work on projects faster and more efficiently by using automation and state-of-the-art computing power to accomplish tasks that can take humans months in just minutes or hours by delivering automatic feature engineering, model validation, model tuning, model selection and deployment, machine learning interpretability, time-series, automatic report generation and automatic pipeline generation for model scoring.
Arno Candel is the Chief Technology Officer at H2O.ai. He is the main committer of H2O-3 and Driverless AI and has been designing and implementing high-performance machine-learning algorithms since 2012. Previously, he spent a decade in supercomputing at ETH and SLAC and collaborated with CERN on next-generation particle accelerators.
Arno holds a PhD and Masters summa cum laude in Physics from ETH Zurich, Switzerland. He was named “2014 Big Data All-Star” by Fortune Magazine and featured by ETH GLOBE in 2015. Follow him on Twitter: @ArnoCandel.
For any company using Kubernetes as a core to their IT strategy, you’re probably running hundreds of millions of containers on AWS every week. Amazon EKS simplifies the process of building, securing, operating, and maintaining Kubernetes clusters, and brings the benefits of container-based computing to organizations that want to focus on building applications instead of setting up Kubernetes clusters from scratch.
Amazon Elastic Container Service for Kubernetes (EKS) is a platform for enterprises to run production-grade workloads. EKS makes it easy to run Kubernetes by fully managing the Kubernetes masters and etcd for you.
In this webinar, we'll show you how to get started with Amazon EKS including how to seamlessly migrate your Kubernetes workloads to EKS as well as tips & best practices we’ve learned during the EKS preview.
In this webinar, we’ll discuss:
-How Amazon EKS makes it easy to run Kubernetes on AWS
-How to leverage additional AWS services with EKS
-Optimizing costs on EKS
-Demo on how to setup your cluster to run on Amazon EKS
-Customer success story
Despite the importance of social media for customer engagement, many organizations simply don’t have the time or money required to grow their social footprint. Like that, tweet this—there is just so much to do, and it’s further amplified by the number of trendy new social sites popping up every month.
In this webinar, you’ll discover how—with a bit of creativity—a web CMS like Progress Sitefinity can be used to craft great social experiences for your visitors and drive customer engagement.
- What social enhancements are available in the latest release of Sitefinity
- Some useful ideas to increase the social savviness of your website
- How to integrate a social platform into Sitefinty using OAuth
Be sure to join Seth Cleaver, Sitefinity Technical Engineer at Progress, to better understand how the right Web CMS can broaden your social reach.
What are the top application components running in containers? What is the lifespan of containers, container images, and services? How is orchestrator adoption changing? What keeps container developers and administrators up at night?
Join us for a discussion of these topics and more in our review of the 2018 Docker Usage Report - based on a sample of 90,000 containers in real-world deployments.
Businesses are looking to digital transformation to move faster, increase agility and get things done at the pace today's workforce demands. In this webcast, you'll learn about how and what technologies are supporting the goal digital transformation and changing how we work and collaborate.
Chris is responsible for technology at reed.co.uk, the UK's largest job board. In this week's podcast he talks about the challenges of being asked to make a business move quicker, why he took this role and the importance of purpose to him, as well as innovation in the sector.
Also on this week's show, two articles. One on being a startup working with enterprise, and one on IBM's Watson AI.
Containers are a developer's best friend. Quickly developing your code, dropping it into a container and running it anywhere you like can be intoxicating. But what happens to that container once it leaves your laptop? What do your Ops teams have to know, and what do they have to do to keep your containers happy and healthy and scaled up for production?
Join this webinar about how container-native storage offers developers the ability to dynamically provision storage for their modern applications. Exploring your containers' journey using practical examples, we'll cover:
-What actually happens when you create a Linux® container with Red Hat® OpenShift Container Platform.
-How container-native storage lets you dynamically provision storage for your modern applications.
-How to persist your Red Hat Gluster Storage container registry with Red Hat OpenShift Container Platform 3.5.
Defending your applications, infrastructure and network is constant in today’s persistent threat environment. Organizations can’t do it alone and the tools of detection, defense and response can no longer work in isolation of each other. Resiliency and collaboration were welcome, consistent themes from RSA 2018 and are reinforced by the innovation coming out of the cybersecurity industry. But what does this really mean for IT, security and development teams day-to-day?
Join Mike Brown, RADM, USN (Ret), former Director, Cybersecurity Coordination for DHS and DOD for a discussion on industry direction, the type of collaboration that can yield immediate results to teams and the criticality of protecting application infrastructure.
Michael Brown is Founder & President, Spinnaker Security LLC, a cybersecurity consultancy focused on understanding, identifying and mitigating business risks associated with cybersecurity. Brown brings executive leadership, including crisis management, from both public and private sector experiences. Prior, he was President, RSA Federal LLC and VP/GM Global Public Sector of RSA Security LLC. Responsibilities also included RSA Information Technology, Security and Enterprise Risk Mgmt portfolios.
Brown joined RSA after over 31 years in the US Navy. Brown’s last position on active duty was as Dir, Cybersecurity Coordination for DHS, responsible for increasing interdepartmental collaboration in strategic planning for the Nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities for the Depts of Defense and Homeland Security. He also served as DHS Deputy Asst Secretary, Cybersecurity & Comms, Acting Asst Secretary, Cybersecurity & Comms and as Asst Deputy Dir Joint Interagency Task Force for the Office of the Dir of National Intelligence. Brown also had various leadership positions, including command of the Naval Information Warfare Activity.
MongoDB 4.0, scheduled for release in Summer 2018, will add support for multi-document ACID transactions. Through snapshot isolation, transactions will provide a consistent view of data, and enforce all-or-nothing execution to maintain data integrity. Transactions in MongoDB will feel just like transactions developers are familiar with from relational databases, and will be easy to add to any application that needs them.
The addition of multi-document transactions will make it easier than ever for developers to address a complete range of use cases with MongoDB, although for many, simply knowing that they are available will provide critical peace of mind. The latest MongoDB 3.6 server release already ships with the main building block for those, client sessions.
The Spring Data team has implemented synchronous and reactive transaction support in preparation for the MongoDB 4.0 release, built on top of MongoDB sessions. Learn more about Spring Data MongoDB, and many new capabilities in the forthcoming Spring Data Lovelace release!
Trying to keep pace in a highly connected world and increasingly hostile environment is a challenge for any developer, let alone an entire industry. To protect the software they write, developers turn to technologies and processes such as audits, reverse engineering, application firewalls, sandboxing, and many others to provide a level of protection. But these technologies also have the potential to become entry points for vulnerabilities. So do we really trust software?
See how Synopsys started the software security journey and is taking an active role in providing industry expertise to help organizations deliver robust software security solutions. We will focus on how the cyber supply chain can have a direct and meaningful impact on the overall design and deployment of software. See how known vulnerability management, mitigation, and training can affect the known risk profile of overall software design. Learn about what we are working on and how you can participate in improving standards and programs that reduce cyber risk.
We’ll discuss how to leverage some of the more advanced transformation capabilities available in both KSQL and Kafka Connect, including how to chain them together into powerful combinations for handling tasks such as data-masking, restructuring and aggregations. Using KSQL, you can deliver the streaming transformation capability easily and quickly.
This is part 3 of 3 in Streaming ETL - The New Data Integration series.
While everyone is talking about Cloud based data centers, the real migration is to outer space, where satellites continuously orbit the Earth. How will this work and what are the security implications. The Goddard Space Flight Center's lists 2,271 satellites currently in orbit.
Join this panel of experts as we cover:
•The migration of data centers to satellites
•The benefits, risks, vulnerabilities and threats posed to a satellite based datacenters
Dennis R. Gatens: VP Channel Management & Marketing at Cloud Constellation Corporation
Jeff Snyder: CTO at Cloud Constellation Corporation
According to Gartner, the application layer contains 90% of all vulnerabilities.
Despite this alarming trend, many organizations are struggling to adopt application security best practices for protecting software, data and users. However, with the right tools, implementing application security best practices- such as testing, defining code standards, and creating standard policies- a clear path toward adoption of application security best practices is within reach!
Join this 20-minute webinar to see how Veracode can enable you to adopt application security best practices in a simple and cost-effective way. Based on first-hand customer interactions, hear our experts provide practical guidance starting with tips and tricks to integrating testing into the software development lifecycle all the way to scaling an application security program using our cloud-based platform.
With the rise of digital and mobile technologies across the financial services industry, traditional services are becoming commoditized. As a result, businesses must provide customers with seamless digital experiences in order to maintain customer loyalty and gain market share. Companies also need a clear line of sight into how application performance and customer experience are impacting revenue in real time.
Register for the webinar and find out how to:
- Analyze and optimize customer experience for your most critical customer journeys
- Gain insight into key customer segments and answer questions in real time
- Measure business KPIs like conversions and abandonment and understand the impact application performance is having on your bottom line
For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.
Following the cyber-espionage insights, we'll cover the following topics:
The common wisdom is that cloud adoption in Europe is trailing behind the US and that we will eventually “get there”. In this webcast, Carla Arend and Angela Vacca will debunk this myth and provide proof points about why customer journeys to the cloud actually follow a different pattern in Europe. They will outline the technical, cultural and geopolitical reasons for why cloud adoption is different and how different industry verticals are adopting cloud.
IT vendors need to understand their customer’s cloud maturity to tailor their messaging adequately.
Datenschutz und -absicherung sind für Ihre Organisation von entscheidender Bedeutung und keine Verordnung hat weltweit weiter reichende Anforderungen als die DSGVO. Cherwell ISMS bietet eine einfache Möglichkeit, die DSGVO-Artikel Ihren Sicherheitskontrollen zuzuordnen. Darüber hinaus können Sie mit dem Incident Management die Meldefrist von 72 Stunden einhalten und die betroffenen Personen kontaktieren. Schließlich können Sie unser Self-Service-Portal erweitern, um EU-Bürgern eine einfache Möglichkeit zu bieten, Anfragen in Bezug auf Datenzugriff, Berichtigung, Löschung und Portabilität zu erstellen und zu verfolgen.
Colleges and universities are designed for teaching, not technology. But they still need to accurately manage student, staff, and faculty information, from class schedules to tuition bills to paychecks. Too often, legacy systems can create cumbersome data silos and redundancies, slowing down adoption of the new technologies and tools that students and faculty are excited to use. And for schools using Salesforce, Jitterbit is the only HEDA certified integration vendor for the new data standard.
Explore the role of the IoT in the mining industry. From big industry to incubators and startups -- many organizations are engaging globally via innovative ecosystems, testbeds and tech hubs for education, awareness, and best practices.
As products and organizations mature, testing and QA become more critical to the overall success of a business. The ideal QA strategy should be fast, reliable, and fit right into a modern continuous integration pipeline. This leads many technical leaders to conclude that everything should be automated.
In reality, not everything can, or should, be automated. Leaders must make difficult, high-impact decisions on behalf of their teams by asking: What should be automated? When should investments in automation be made? Is automation the most cost-effective solution to delivering quality?
Join this web seminar to learn:
1. How to mitigate risk and create a plan to proactively manage the biggest automated testing threats
2. Ways to identify gaps in your current testing strategy and address them with solutions that complement CI/CD practices
3. How to deliver working solutions to customers quickly to achieve business objectives in a crowded market
In this video from Canonical's in-house roboticist, get an in-depth runthrough of the steps needed to build your first production-grade robot from prototype to production. You'll learn everything you need to know from Ubuntu Core to ROS to Snaps!
The healthcare industry is witnessing an explosion of medical data from EHRs, fitness trackers, mobile health applications, and more.
To provide compelling patient experiences, providers must think beyond just driving interoperability across clinical data stores, and consider how to extend interoperability across healthcare partners and non-clinical applications. Doing so requires a new integrated healthcare strategy that extends beyond those traditionally offered by HL7 interface engines.
Attendees will learn:
- Why healthcare organizations are leaning on their IT teams to drive business critical and care-centric strategic initiatives.
- How MuleSoft’s Anypoint Platform and Edifecs’ solution can help health organizations unlock medical data from EHRs and other systems, to better improve the patient experience.
- How pre-built connectors, such as the Anypoint Connector for the Edifecs XEngine Server, can enable connectivity and validation of healthcare data––providing patients with vital information, at the right time and place.
This is an expanded version of what was presented at the KubeCon Lightning Talk
An admission controller intercepts requests to the Kubernetes API server prior to persistence of the object. By applying proper admission controls in your Kubernetes cluster, it's possible to generate deployments that adhere to the least privilege model, limiting user and container activity based on their business usage needs.
In this session, we will review the latest and greatest Kubernetes 1.10 admission controller capabilities. We will demonstrate in a live demo a dynamic admission control webhook that can be customized to limit privileged user access.
You’ll walk away understanding how to make such standards easier to implement and methods for going beyond them to provide security worthy of critical applications in production.
Paz.ai is an AI-powered multiplayer online gaming platform that teaches block-based programming to refugees.
Using Google’s CS First curriculum as a guide to follow a structured educational plan, the AI-powered application was co-founded by Aida Martinez, AI Education Program Lead at Google, Alvaro Sanmartin, Head of Growth at Skills Matter and CEO Leticia Galdon, international social worker.
Created and backed by leading entrepreneurs, Paz.ai is working with refugee camps to ensure that every young person escaping from violence and war can have a future through technology.
Learn more about the application, the technology behind it and the story of Paz in this exclusive session with the founders.
To support the project on Kickstarter, please go to:
Digital technology dramatically improves the economics and capabilities of every business, but only if you master the rules and systems that govern digital experiences, digital operations, digital ecosystems, and digital innovation. When business leaders see technology as a business asset that’s central to their success, they are in a position to transform. The benefits are immense – those who succeed find it 10 times cheaper and faster to engage customers, create offerings, harness partners, and operate their businesses.
Our featured guest for this original webcast is Forrester Research Vice President and Principal Analyst Ted Schadler, who will connect the dots between business and technology, and introduce the elements of modern application architecture that all business leaders should know about – the cloud, APIs, microservices, analytics, IoT, and automation. Business leaders will learn how to:
· Master digital’s new rules of business
· Embrace the role that technology plays in business success
· Invest in modern application architecture to accelerate business development
· Work better with IT to bring your digital initiatives to market faster
All registrants will also benefit from a complimentary copy of Forrester’s Digital Rewrites the Rules of Business report.
Guest Speaker: Ted Schadler, Vice President and Principal Analyst, Forrester Research
What does this mean for your enterprise? Where does it fit, and how can Red Hat® OpenShift Application Runtimes help you use this technology while still taking advantage of the foremost Platform-as-a-Service?
Join this session for the answers. We’ll also demonstrate how quickly you can set up a non-trivial, enterprise-grade Node.js applications on Red Hat OpenShift Container Platform. We’ll explore how to integrate with other open source technologies, such as Istio, and discuss strategies for your Node.js development and deployment pipeline, including canary and blue/green deployment strategies.
Lance Ball, principal software engineer, Red Hat
Lance Ball is the lead engineer for the Node.js activities within Red Hat JBoss® Middleware and a Node.js core contributor. Lance speaks at conferences around the world, and he enjoy writing code in lots of different programming languages.
For many organizations, work is now untethered – business is conducted everywhere from taxis to client offices to mountaintops. To reap the benefits, and stay competitive your customers need to access live business data on a secure mobile platform, wherever and whenever they choose.
Learn more about building and monetizing mobile cloud-based applications built on SAP Cloud Platform. With the SAP Cloud Platform SDK for iOS you have the tools needed to create, deploy, and manage powerful mobile apps combining the latest features from the iPhone and iPad with enterprise grade requirements like secure access to business systems and offline synchronization.
Please join us to learn about this exciting opportunity. SAP Cloud Platform is the enterprise platform-as-a-service (PaaS) that allows you to simplify open, agile business application development:
* Rapidly build business applications in the cloud that mobilize business processes taking full advantage of iOS device features
* Securely integrate with your SAP and non-SAP cloud and on-premises systems for greater agility and productivity
* Embed advanced analytics into your solutions to gain real-time insight and drive customer satisfaction
* Benefit from SAP enterprise-class support, high platform availability, and access to the SAP ecosystem
* Leverage SAP Digital Channels and the SAP ParnterEdge program to market your packaged solution to over 380,000 SAP customers
Hear from SAP executives as they discuss the benefits of the Build engagement model of the SAP PartnerEdge program, SAP Cloud Platform, and the latest SAP Cloud Platform mobile tools and technology.
Discover the opportunity and let us help you speed your time-to-market, mobilize your customers and grow your business.
Date: Tuesday, June 26th 2018
Time: 11 AM EDT
• Krishna Sunkammurali, Sr Director, Product Management, SAP Cloud Platform
• David Sacks, Senior Director, Platform Partner Ecosystem, SAP
Cognitive systems solve problems the way humans solve problems, by thinking, understanding, reasoning, reacting and interacting. Through simulation of human thought processes, the goal of cognitive computing is to create automated IT systems that are capable of solving problems without requiring human assistance.
This webinar will explore the application of cognitive computing techniques within the energy sector: increasing the accuracy of outage predictions, optimizing uptime, and enabling customers to monitor and control their monthly energy consumption.
Jordan Schuetz, Developer Relations Manager at PubNub, will demonstrate the powerful impact that Arduino micro-controllers can have on smart home devices. As well as, talk about how IoT devices are evolving in the current market space and how they are the future of electronics.
According to the Cisco VNI forecast, global IP traffic is expected to nearly triple between the years 2015 and 2020. Advancements in wireless and A/V technologies are also driving up the demand for bandwidth. As buildings become more connected and more intelligent, the amount of data flowing through your network will continue to increase exponentially. Installing Cat 6A solves the bandwidth challenge in the horizontal. But what about the fiber backbone that needs to support all of those additional 10Gbps drops? And how about wireless access points or security cameras that you need to connect and power out in the parking garage that far exceed the 100 meter distance limitation? This 30-minute webinar will present several solutions for maintaining the reach you need for maximum performance while supporting an ever-increasing amount of bandwidth over your network.
Attend this webinar if you want to learn about:
- The evolution of the fiber backbone
- Wireless requirements for up to 40G in new construction
- The distances you can reach with different multimode fibers
- A unique Berk-Tek solution for indoor/outdoor applications
The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.
Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.
In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:
- Eliminate monitoring blind spots
- Vastly improve the accuracy and precision of data risk detection
- Help organisations meet the GDPR challenge
About the Presenter
Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
The traditional service desk is manual and reactive, primarily addressing large volumes of tickets and user requests. A 2017 Help Desk Institute survey identified that 55% of organizations saw an increase in ticket volumes. The cost of resolving those issues also increased—with the cost per ticket rising from $18 in 2016 to $25 in 2017.
In this webinar, we will demonstrate why machine learning and built in analytics are not just a nice to have add on feature, but are essential native components of any modern Service Management solution.
This webinar will cover:
1.The value of machine learning in accelerating the ticketing process.
2.How to empower Problem Management with analytic capabilities that can help agents identify patterns across structured and unstructured data sources.
3.How to take key performance indicator (KPI) goals and measurements to the next level by providing actionable insights to drive process improvement.
A recent survey conducted by Ensono, in partnership with the Cloud Industry Forum, showed that 89% of respondents believed that legacy technology was a barrier to effective digital transformation. Given that many organisations operate a complex technology landscape often with elements in different locations, and with core components that are regarded as ‘legacy but critical’, there needs to be a clear and simple approach to overcoming these obstacles.
Breaking down the barriers requires effective change in people, process and technology to attain a viable level velocity that will enable transformation without being held back by perceptions of legacy issues.
Examining these issues, this webinar will provide insight and thought provoking approaches for organisations seeking to transform their operations against this backdrop.
Hyper-competition and digital-first initiatives are forcing organizations to reconsider how they do business. ‘Digital transformation’ has emerged to engage customers, improve efficiencies, and fend off threats from rivals. It’s driving the need to rethink application design that delivers information in context and automates tasks that must behave consistently across diverse mobile devices and all digital touchpoints. Common approaches include cloud-first and mobile-first strategies that accelerate the use of cloud services but also often forces an unwieldy redistribution of workloads across hybrid IT infrastructure.
APIs have emerged as integration enablers, and API management is now integral to IT and development discipline. But APIs are only part of a broader toolchain needed to deliver web and mobile apps. Emerging cloud-native app platforms for hybrid infrastructure represent the next-generation enabling technology needed by enterprises that seek transformative means to engage customers and craft new competitive advantages.
In this webinar Carl Lehmann, principal analyst at 451 Research and Sumit Sarkar, chief researcher at Progress will discuss the business and technical considerations for API management within a broader context of application strategies and hybrid IT integration by:
• Describing digital transformation and how it is used to create competitive advantage
• Identifying the critical technology enablers needed for execution
• Defining the role of APIs as accelerants to new ways of doing business
* Planning for rapid delivery of new application experiences in response to digital transformation
* Understanding backend requirements for web and mobile app delivery beyond API Management
AppDev, DevOps, integration and API development professionals alike will learn how to reconsider their development strategies and integration toolchains to become core enabling assets for digital transformation.
Regardless of how well your applications are designed, real time factors such as network conditions, user demand, local outages, and capacity affect the quality of experience for each individual user.
Global Server Load Balancing (GSLB) is the intelligent distribution of traffic across server resources located in multiple geographies. With GSLB, traffic management decisions that leverage the current state of the application delivery network result in better application performance.
Join us to see how the NS1 platform allows you to easily implement a GSLB strategy using the ubiquitous protocol, DNS.
When SAP performance suffers, business suffers. This industry-first solution offers ABAP code-level visibility and instrumentation, giving you real-time performance monitoring and diagnostics across mission-critical environments.
See how AppDynamics for SAP can unify monitoring and deliver code-level visibility across your SAP environments. In this webinar, you will see a live demo of SAP performance monitoring and learn how AppDynamics:
* Visualizes SAP components and dependencies in real time
* Establishes dynamic baselines for key SAP transactions
* Diagnoses SAP issues down to a single ABAP statement
* Assists with cloud migrations and SAP S/4HANA transitions
Behavior Driven Development (BDD) has many benefits, including quicker development cycles, increased automation, better collaboration between departments and reduced siloed communication. But for all the benefits, organizations are still hesitant to transition to BDD because of the changes on their people, processes and tools.
In this webinar, we’ll explain a successful framework for evaluating your readiness for BDD, considering your potential roadblocks and making a seamless transition.
The beginning of a security strategy starts at the end – securing your IoT endpoints. Endpoints are everywhere in the Industrial Internet of Things (IIoT) landscape. Without proper endpoint security, IIoT systems may put your organization or the greater public at increased risk. Plus, the viability of the IIoT depends on proper implementation of an endpoint security strategy to counter the growing and ever-changing threats.
During this webinar, the editors of the Endpoint Security Best Practices Whitepaper will discuss this important document, customer use-cases, and the core components of a comprehensive, IIoT solution.
A step by step process using cloud sandboxes.
Modernizing and migrating an on-premise application to the AWS cloud can be a daunting task
without the right strategy and enablement tools. The challenges that organizations face as they
modernize their legacy on-premise applications include a combination of factors pertaining to
technology, personnel skills and operational tools to ensure a successful application migration.
This webinar provides a step by step approach on how to address these challenges for
application migration and enablement to the AWS cloud using the Quali CloudShell solution.
You will learn how to re-platform a Drupal CMS application into AWS using self-service cloud
During this webinar, we'll discuss the new capabilities in Pivotal Cloud Foundry 2.2. Hear about the latest updates to PAS, PAS for Windows, and PKS. Plus, we'll also showcase new features for Operations Manager, CredHub, and PCF Healthwatch.
Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.
Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.
We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.
FICO pioneered the use of a single score to represent consumer credit risk. While easy to understand, a FICO score incorporates several signals of consumer credit risk. We believe hybrid cloud infrastructures will benefit from an easily-understood “CyberPosture Score” that provides a meaningful, comprehensive, defensible and extensible view of Security and Compliance risk.
Join us on June 27th, as Cavirin experts will discuss what’s required to obtain a CyberPosture Score—Learn about Cavirin’s breakthrough approach to Security Posture assessment and scoring including:
>> Verify where your risks are coming from
>> Identify the differences and correlations of risk and compliance
>> Determine the criticality of your assets, using the CIA (confidentiality, integrity, and availability) framework across your hybrid infrastructure
Ce webinaire va se concentrer sur la manière de sécuriser les conteneurs dans n’importe quel environnement IT tout en maintenant une haute disponibilité des services. Nous aborderons les défis en terme de sécurité de tels environnements et comment protéger les applications dans les conteneurs, de leur développement à la production en utilisant des contrôles de sécurité, des secrets et des accès en se référant aux standards de sécurité et de compliance (CIS, NIST… ).
Ce webinaire est principalement destiné à :
-Les administrateurs de la sécurité et les architectes qui veulent en savoir plus sur les risques et les avantages de l'utilisation des conteneurs, et comment les sécuriser efficacement
-Les équipes de développement d'applications et les équipes DevOps qui souhaitent proposer des applications plus sécurisées