How 2020 Transformed Application Delivery, and What the Future Looks Like
As a popular meme hilariously put it, [who led the digital transformation of your company? (A) CIO (B) CTO (C) COVID-19] 2020 and COVID-19 have forced enterprises to rethink their IT strategy. Remote work, increased online activity, and the need to ensure business continuity have all got IT leaders scrambling to digitalize business.
At the heart of this digitalization frenzy is application delivery. With the boom of online business, application traffic and the need for new, feature-rich applications are at an all-time high. Availability, scalability, and agility in application delivery and deployment is the need of the hour, which has led most enterprises to jump onto the cloud bandwagon. However, the cloud and its various avatars (private, public, multi, hybrid) come with its set of opportunities and challenges.
Join the panel consisting of Murali Palanisamy - Subject Matter Expert on ADC and PKI technologies, AppViewX, Alon Nachmany - Director of Customer Success, AppViewX, and Nitish Krishna - VP of Customer Success, AppViewX, as they expound on-
The multifarious effects (good and bad) that 2020 has had on application delivery
How to sustain the good changes and get rid of the bad ones with the right strategy and tools
The cultural consequences, and how to equip and educate employees to cope with the change
RecordedDec 3 202047 mins
Your place is confirmed, we'll send you email reminders
x.509 certificates have become a mainstay of digital security for businesses around the globe. The key to making a network outage-proof and fully secure is a well-rounded certificate management program, but does the perfect implementation exist? No, but here's the next best thing. In this webinar, we'll go over the recommended best practices, updated for the year 2019. In a linear, step-by-step fashion, we'll tell you exactly what you need to do (and what not to), to create a highly secure certificate infrastructure.
Components of the certificate lifecycle.
Obstacles to implementing a secure certificate management system.
The latest best practices for certificate management.
How AppViewX CERT+ can help you adhere to them.
Webinar talks about the top 5 issues you'll run into while conducting routine PKI Health Checks, and how to get around them without too much trouble.
1) How to track and prevent issues such as certificate expiry
2) Maintaining a secure trust environment while apps/IoT are added to your business operations
3) Why a robust PKI and certificate lifecycle management platform is critical to business growth and security
In the digital world, network operations teams must make a significant skills shift to take advantage of advances in network automation and analytics. Enterprises must embrace NetOps 2.0* to adapt to future technology and process demands, such as increased agility, DevOps, the Internet of Things (IoT), cloud and software-defined infrastructure.
Watch the webinar recording to to learn how to take the right steps toward NetOps 2.0. Having served in various network engineering roles, AppViewX's Senior Solution Architect, Glenn Gray will share the insights he’s garnered throughout his 20 years of experience.
Key topics include:
- NetOps’ effects on enterprise network teams
- Getting started with NetOps automation
- The journey towards NetOps 2.0
NetOps automation help organizations create and maintain a network that is highly available and extremely agile in both the deployment and configuration stages. The very first step on this road to success is to address the current workloads. Is it possible to transform a network while also meeting SLA?
Watch the webinar recording to learn how to automate five top NetOps tasks using our low code automation platform. Having served in various network engineering roles, AppViewX's Senior Solution Architect, Glenn Gray will share the insights he’s garnered throughout his 20 years of experience.
Key topics include:
- The importance of NetOps automation
- How to automate application and network service requests
- The advantages of a low code automation platform
With microservices becoming the architecture of choice for application deployments, network services need to undergo a major overhaul to support the altered traffic flows and enforce strict governance.
This webinar will help you
Leverage microservices for faster application development and deployment
Democratize network operations in microservices for NetOps and DevSecOps while enforcing centralized management
Drive governance and policy-based orchestration across microservices deployments
Tammy Moskites, CEO of CyAlliance and Marene Allison, CISO of Johnson & Johnson
As a part of the FireCyChat series, Tammy Moskites, Executive Board Advisor at AppViewX and CEO of CyAlliance, will be hosting FireCyChat on Machine Identity, PKI, and Cybersecurity with Cybersecurity Leaders and Industry Influencers.
The second episode will feature Marene Allison, CISO of Johnson & Johnson in conversation with Tammy Moskite, CEO of CyAlliance. In this FireCyChat, Marene will share her unconventional and inspiring journey experience from being the first woman to graduate from West Point to becoming the CISO of Johnson & Johnson – and everything in between.
PKI is never set-and-forget. It is a dynamic entity, with a constant need for certificate renewal, key replacements, policy changes, and algorithm upgrades. And since PKI tasks often involve long manual steps, each change might take hours to execute. Multiply that by the numbers of certificates on file, and that equates to days or even months spent on tasks that could have been easily automated.
In this webinar, we’ll walk you through the solution to that problem – crypto-agility. How can crypto-tasks be quickly resolved? How can an administrator obtain full control over certificates and keys? How can you secure your network with robust PKI, while practicing crypto-agility?
- Principles of crypto-agility
- How to automate certificate and key lifecycles
- How to implement crypto-agility in your organization
With over 70% of data breaches caused by misconfigurations today, this webinar walks you through the critical steps required to avoid expensive human errors while managing your digital certificates.
During this webinar you’ll see:
• The impact of human error on each stage of your certificate lifecycle management.
• The critical capabilities you need to ensure in a certificate lifecycle automation tool.
• A demo of AppViewX CERT+ that displays how the solution can help you discover, monitor, manage, generate and provision certificates automatically, regardless of where they reside.
A truly intuitive network is one that can operate with minimal human intervention from start to finish. Learn how you can orchestrate your network infrastructure and operations in a multi-vendor ecosystem with AppViewX.
This webinar will focus on the importance of managing an inventory post-discovery – essentially knowing who has access to your critical certificates, and how secure they are. It will also communicate the value of a certificate management tool like CERT+ that allows users to delegate granular access while also safeguarding private keys.
During this webinar we’ll go over:
• The critical capabilities that can ensure the security of your digital certificates
• Real-world problems that our customers faced before switching to our solution
• A demo of AppViewX CERT+ that displays how the solution can help protect and manage your certificate inventory efficiently
In this session, we will have Kiran Punjabi from Fastenal sharing real-world PKI and certificate management challenges, and how they overcame them by implementing a next-gen certificate lifecycle management system. Fastenal has been committed to driving excellence through their tools, practices and policies, eliminating the chances of mismanaged certificates. The session will also cover Fastenal's journey thus far and their vision for the future as they transform their PKI.
Ivan Skowronski, Lead of Cybersecurity Architecture Team, Telecom Argentina
5G is well on its way to becoming ubiquitous, and it brings along opportunities and challenges in equal measure. The significantly increased throughput means it can support more applications per unit area, making way for the unprecedented proliferation of IoT. This opens up new revenue streams for communication service providers (CSPs) in the form of industrial, automotive, and consumer IoT, which is a godsend considering that the smartphone market is reaching stagnation. However, this proliferation comes with security risks - as devices increase, so do vulnerabilities. Effective use of 5G for IoT also requires widespread adoption of edge computing to minimize latency, which further increases the surface area for attacks. Securely harnessing the full potential of 5G for IoT requires elemental changes in the way IoT devices are designed - such as imprinting certificates for authentication during manufacturing. Operational security needs identity management during the device lifecycle and compliance to regulatory standards. In this session, we'll cover how the telecom industry can benefit from 5G by ensuring a strong PKI for IoT and mobile endpoints. Some takeaways will be:
• What changes would IoT undergo with the advent of 5G
• Tech requirements of 5G
• How to make IoT devices secure by design
• IoT identity issuance, monitoring, and management through certificates
• 5G and IoT regulations and compliance
Webinar talks about
- Automate networks with low-code platform
- Design simple and complex automation workflows
- Automate across multi-vendor and hybrid infrastructure
- Benefits of network automation
David Madden, Senior Director - Business Development, Thales
The COVID-19 pandemic has closed offices and displaced workers to their homes, causing a transition we have not anticipated nor seen before. This is similar to digital transformation, where companies are moving to the cloud & changing their businesses to survive or be left behind in a new digital world. With these changes we have seen an overwhelming increase in the number of cyber-attacks over the past year. Fortune magazine online has just proclaimed, “A Digital Pandemic Tops off Coronavirus Woes.”
As we continue to adapt to a new normal in our lives and businesses, it is clear that we need to protect both our employees & also our digital assets & networks. Any compromise to corporate data would be catastrophic. The same is true for employees, who must learn to protect themselves & their families while they try to work in the pandemic era.
Modern organizations must evolve to a cloud friendly world, while maintaining security as more data traverses networks out of their control. We can use this change as a learning opportunity, and I will make a few comparisons to the COVID-19 global pandemic as a way towards helping prevent a real digital pandemic.
Every application needs an SSL/TLS certificate to secure communications online, whether they live on a container or on the cloud. With an unreliable certificate inventory, any certificate-related issue can quickly become time-consuming and expensive to remediate.
In this webinar you’ll learn:
- How to maintain an accurate inventory in a heterogeneous infrastructure
- Demo: How AppViewX CERT+ can help you discover and maintain an accurate certificate inventory
- Few real-world problems that our customers faced before switching to our solution
This session features Murali Palanisamy from AppViewX, speaking at SimplifyPKI: Energy & Utilities on Crypto excellence: Reimagining Public Key infrastructure (PKI) for Energy and Utilities.
Murali focuses on how the aforementioned industry can adapt to a novel approach for deploying PKIaaS versus the traditional approach practiced. He also touches upon the advantages that AppViewX as a platform offers this industry.
Jeff Hagen, Lead PKI Cybersecurity Engineer, Xcel Energy
This session features Jeff Hagen from Eversource, Xcel Energy, a Utility Holding Company headquartered in the United States serving more than 4.3 million customers, speaking at SimplifyPKI: Energy & Utilities on Securing network endpoints by automating PKI certificate provisioning.
Jeff uncovered the various ongoing security threats and the resulting Cybersecurity Executive Order passed by President Biden and what it means for the Energy & Utility industry.
He also talks about the approach Xcel Energy is taking to address the rising security concerns and how AppViewX was their solution of choice.
Tomas Gustavsson, CTO, PrimeKey and Roman Cinkais, Co-Founder, 3Key Company
One of the main purposes of digital certificates is to establish and provide trust. Building a trustworthy PKI may be a complex and time-consuming task; however, a good strategy and planning can make it happen with a reasonable amount of effort. An assessment of the PKI maturity level, defining the plan how to achieve next level and track the progress in time, will help to build the robust PKI everyone can rely on.
We will take you into the journey of building a public key infrastructure, which is robust and resilient enough to be trusted for decades. We will show the most important aspects and pitfalls during a migration process and how they can be resolved or mitigated.
• Getting from disorganized to a mature PKI
◦ The PKI maturity assessment level, defining the plan how to achieve the next level, tracking the progress and helping to build the robust PKI everyone can rely on.
• The methods for migrating PKI and certificates
◦ Outlining two migrations strategies. One where the complete old PKI is transparently moved into a new product, and the other where a new PKI gradually replaces the old one.
• Mitigation of main risks during the migration
◦ What are the main pitfalls to be aware of during a migration, and how can we manage those.
• Converting a hard-to-maintain multi server PKI into a comfortable consolidated PKI
◦ Showcasing how you can consolidate many disorganized PKIs into a single consolidated mature PKI using off-the-shelf products and well tested procedures.
• Decide between on-premise, cloud, or SaaS PKI solution
◦ Whatever your requirements and preference, a PKI migration and consolidation can be performed virtually from any environment into a new on-premise PKI, or a PKI in the cloud or a SaaS PKI.
Richard Barstow, Lead Security Architect at Eversource
This session features Richard Barstow from Eversource, a Fortune 500 Utility company in the USA, speaking at SimplifyPKI: Energy & Utilities on PKI Management in ICS or OT Environments.
Richard walks you through multiple PKI use cases and SSH Key Management. He also talks about the need to automate discovery and how AppViewX has helped Eversource further its PKI efforts.
Redefining Cybersecurity and Context-Driven Network Orchestration
Certificate Lifecycle Management and Network Orchestration
AppViewX is the low-code automation platform that assists global enterprises with PKI certificate management and network infrastructure automation. By focussing on maximizing network security while minimizing the manual effort expended by IT teams, AppViewX has helped over 100 organizations realize lower outages, high visibility into PKI and network environments, and complete control over certificates, keys, and device configurations.
Effectively, we're making the last mile of network automation universally accessible via a flexible platform that will fit into existing architecture, and work with it to deliver rapid results in line with compliance goals. Our webinars are designed to educate viewers about industry trends, product capabilities, and customer implementations.
Browse through our library below, or learn more about us at appviewx.com