Gartner IOM Summit: UC4 Presents on Application Release Automation

Wesley Pullen, Vice President Global ARA Technologies for UC4,
Wesley Pullen, Vice President Global ARA Technologies for UC4, presented at Gartner's IT Infrastructure and Operations Management Summit on June 13, 2012, in Frankfurt, Germany. In his session, "Application Release Automation for DevOps: End-to-End Visibility, Control and Agility," Mr. Pullen discusses how traditional application release processes, based on running scripts or manual updates, expose companies to risks of non-compliance with a host of industry and government regulations (e.g. HIPAA, Dodd Frank and Basel II/III) and how new and unique release automation technologies address these challenges.
Jun 27 2012
2 mins
Gartner IOM Summit: UC4 Presents on Application Release Automation
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2865)
  • Upcoming (83)
  • Date
  • Rating
  • Views
  • Join us for this live webinar where we will walk through a real-world example in which FireEye Managed Defense analysts utilized the FireEye Platform’s MVX virtual machine technology and endpoint response capabilities to identify, alert, and remediate an active Advanced Persistent Threat (APT) attack.

    In this case study we will cover:

    • How the attacker executed a “smash-and-grab” attack aimed at stealing intellectual property.
    • How FireEye detected the attack as it was beginning and re-secured the network and prevented sensitive data from leaving the client’s networks.
    • Best practices for investigating and responding to similar attacks.
  • Today most companies are witnessing an explosion in the amount of data that they store. According to recent estimates, large databases grow by 65% year over year and 85% of the data contained in these large databases is inactive. This often out-of-control data growth stems from a variety of sources and can have a negative impact on application performance, database management tasks, and overall total costs.

    During this webinar, learn how you can improve application performance while simplifying IT for Oracle applications with Informatica Smart Partitioning and Oracle ZS3 storage appliance.

    In this event, we will share how the combination of Oracle Tiered Storage and Informatica Data Archive Smart Partitioning:
    Reduces the cost of data by enabling storage tiering and compression of referentially intact data partitions
    Improves application performance up to a factor of 6X or more by automatically optimizing datasets for user requests
    Eliminates complex archiving strategies and provides full and rapid access to archived data from the native Oracle Application
  • Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Protiviti's IT Priorities Survey results reveal 2/3 companies are going through a major IT transformation in 2014. Join Protiviti's IT Consulting managing directors to discuss why.
  • Security professionals are increasingly realizing that protecting executives and corporate assets requires more than just “guns and guards.” It requires a proactive strategy to identify and prevent a threat, rather than reacting to one. So how can security professionals be proactive and minimize the threats that originate from the Internet?

    In this webcast we’ll look at how you can use an individual’s online “footprint” to identify potential threats and develop a more effective security plan. We’ll also present a case study of one of our own executives and show why online threat intelligence is not the same as news alerts or monitoring social media for brand buzz.
  • Today's organizations are moving more interactions online through web, mobile and API-enabled web services to empower their customers and increase revenue. Managing the high volume of customer identities and enabling secure interactions across a set of web, mobile and hybrid apps, from a variety of different devices can be challenging.
    On April 24th at 1pm ET, please join David Gormley, Director, Security Solutions for CA Technologies, to learn how you can securely accelerate the delivery of new applications and services, while improving the customer experience across multiple channels of interaction.
  • Presented by the experts with the facts.

    The Inside Story of the Discovery, the Timeline and Solutions to Protect Your Organization. Finally, All of Your Questions Answered.

    Join the conversation and get the latest Heartbleed updates by following @CodenomiconLTD
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • Email Gateway 7.6 including advanced threat defense, hybrid cloud setup and ”ClickProtect” spear phishing protection.
  • Channel
  • Channel profile
Up Down
  • A Recipe for DevOps Recorded: Feb 28 2013 56 mins
    Building a high performing DevOps organization requires change. Leading this transformation will require both a change in mind-set and the tools required to help you control the environment and processes.

    Understanding the DevOps technology stack is essential. Automation is the key requirement for continuous integration servers, environment provisioning and configurations, all the way up the stack to your application layers.

    Attend this exciting webcast and learn.

    - What are the common technologies in the DevOps space
    - How to build a rock solid infrastructure and application automation framework
    - How to achieve continuous deployment from development to production
  • Mastering Deployment Automation Recorded: Jan 25 2013 52 mins
    Software updates are the main reason for application outages and downtime. To avoid the next failed deployment you need to learn how to master application deployment using automation.

    Join Michael Schmidt, Senior Product Manager at UC4, as he uncovers five key areas for mastering the deployment process.

    Attend this exciting webcast as we show you how to:

    - Build a complete deployment from scratch
    - Use continuous integration to package and build server integration
    - What to do when deployments fail
    - Handle environment / configuration drift
    - Deploy to production
  • Enterprise DevOps at Scale Recorded: Dec 17 2012 58 mins
    Application release is a core business process at your organization. Yet, for many IT shops, this important process is mostly manual—an approach that’s both costly and time consuming. Fortunately help is at hand.

    Attend this information packed webcast featuring CollabNet Deploy with UC4 and learn about the technical and non-technical aspects of effectively delivering applications in today’s agile development environment. This webcast will also include a live demo and Q&A session at the end.

    Register and learn how to:

    - Extend continuous integration build with deployment automation
    - Transform cumbersome application deployments into fully automated processes that take minutes
    - Automate end to end tracking and reporting of all deployment activities and related changes
    - Effectively collaborate between Development and Operations while maintaining segregation of duties and security
    - Reduce risk of downtime by eliminating the “human error” factor from release and deployments beyond Dev and QA
  • Demystifying Release Management and Deployment Automation Recorded: Nov 14 2012 46 mins
    Join Scott Willson, Sr. Solution Architect, as he discusses how to automate the release and deployment processes across the organization to eliminate the human error factor from deployment activities and reduce deployment times by up to 90%.

    Register for this webcast and learn how to:

    •Completely automate deployments and reduce manual efforts by 90% and more
    •Integrate automated deployments with organizational release processes and avoid risk
    •Reduce deployment and release related outages by up to 95%
    •Gain 100% process and release compliance and audit – out of the box
  • Best Practices for Hybrid Java Applications Deployments Recorded: Nov 1 2012 56 mins
    Deploying enterprise Java applications is a pain! Luckily, new deployment automation technology can save you from spending stressful weekends and late nights deploying applications and patches.

    Join Michael Schmidt, Sr. Product Manager, and Andy Cureton, Services at UC4, as they show you how to overcome the bottlenecks caused by deployment tasks throughout the application lifecycle.

    Attend this webcast and learn about:

    - Continuous deployment through integration with Jenkins/Hudson continuous integration servers
    - How to promote applications from QA to staging and production with a single click
    - How to automatically rollback back a release if a problem arises
  • Achieving Zero Effort Compliance with Application Release Automation Recorded: Oct 4 2012 37 mins
    Traditional application release processes based on running scripts or manual updates expose companies to risks of noncompliance with a host of industry and government regulations, such as HIPAA, Sarbanes Oxley, SSAE 16, SAS 70, PCI and Basel II.

    Join Stathy Touloumis, Senior Solutions Architect at UC4, to learn how IT organizations can leverage new application release automation technologies to ensure regulatory compliance while keeping up with the pace of application changes.

    Register for this webinar and learn how to:

    1. Enable segregation of duties in the data center
    2. Automate configuration change documentation and audit trail reporting
    3. Achieve visibility into the end-to-end release process
  • How to Scale Your .NET Deployment Guru Status Recorded: Oct 1 2012 50 mins
    Release cycles are getting faster and faster—but how can you keep up with them and remain the .Net guru everyone has become accustomed to? Join Michael Schmidt, Sr. Product Manager at UC4, as he demonstrates how to make your guru status scale to any number of deployments.
  • Best Practices for Managing Software Releases Recorded: Sep 28 2012 45 mins
    Agility has become essential in today’s connected and competitive world. Many IT organizations have adopted agile development methods in an effort to deliver better software quicker, however without solid release management processes and tools, missed deadlines and failed deployment are inevitable.

    Watch Stathy Touloumis, Senior Solutions Architect at UC4, as he presents a framework for defining an end-to-end release management process.

    In 30 minutes, attendees will learn how to:

    - Plan and track progress of software releases
    - Find potential release issues early in the process
    - Develop strategies and approaches to optimizing the processes required to deliver business critical applications in every stage of the release process
    - Effectively manage an environment where time-to-market is critical and failure is unacceptable

    Implementing release management best practices in pre-production and production helps IT organizations increase release velocity and achieve a repeatable, predictable release process. Contact me directly with any questions.
  • Enabling DevOps with Application Release Automation Recorded: Jun 27 2012 5 mins
    In this 5-minute video learn how releasing and updating new applications on a timely basis is critical to your productivity and value creation. Watch this video and learn how to turn the application release process into a consistent, repeatable, and audible process.
  • Gartner IOM Summit: UC4 Presents on Application Release Automation Recorded: Jun 27 2012 2 mins
    Wesley Pullen, Vice President Global ARA Technologies for UC4, presented at Gartner's IT Infrastructure and Operations Management Summit on June 13, 2012, in Frankfurt, Germany. In his session, "Application Release Automation for DevOps: End-to-End Visibility, Control and Agility," Mr. Pullen discusses how traditional application release processes, based on running scripts or manual updates, expose companies to risks of non-compliance with a host of industry and government regulations (e.g. HIPAA, Dodd Frank and Basel II/III) and how new and unique release automation technologies address these challenges.
  • Application Release Management For Faster More Reliable Deployments Recorded: Jun 25 2012 53 mins
    Watch Tom Flitter, Applications and Integration Manager for TASC, and Wesley Pullen, UC4 Vice President of ARA Technologies, as they discuss how an automated application release solution can turn a manual, cross-functional set of activities into a well orchestrated, automated and predictable process.

    Register for this one-hour webinar and learn:

    - The three critical components needed to be successful at automating the release process
    - The four major benefits of a centralized solution built on an enterprise class automation engine
    - How TASC is using the UC4 platform to roll out consistent innovation with new applications and features for their customers
    - Why now is the time to Rethink Application Release Automation
Webcasts for Development Managers and IT Operations Managers
This channel features live and recorded webcast presentations by leading experts in the field of Application Release Automation. From planning, control, to deployment, you will walk away with practical advice for your application release management initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Gartner IOM Summit: UC4 Presents on Application Release Automation
  • Live at: Jun 27 2012 9:40 pm
  • Presented by: Wesley Pullen, Vice President Global ARA Technologies for UC4,
  • From:
Your email has been sent.
or close
You must be logged in to email this