Operations | Monitoring | ITSM | DevOps | Cloud

How to write optimized & secure docker file to create docker images

How to write optimized and secure docker file to create docker image. Learn the simplest approach to Docker images and how to use them using a Docker repository, such as Docker Hub, or hosting your own private repository. What you will learn from this video: What is docker? How to write a docker file? How to write an optimized docker file? How to write a secure docker file? What about the docker repository? How to put or host docker images?

Riverbed Webinar Demo - Dependency Mapping

The worst thing about moving applications and services to the cloud is the hidden costs, as a direct result of degraded application performance and lost productivity. By mapping dependencies prior to a cloud migration, you’ll know which users and services will be affected. That means you can: This technical demo shows you how easy dependency mapping should be before you move applications and services to the cloud.

Riverbed Webinar Demo - Infrastructure Monitoring

Without knowing the status of your infrastructure, how can you troubleshoot P1 incidents quickly and reduce the cost of downtime? A slow response could disrupt your ability to monitor operations remotely and respond instantly to field conditions, meaning you can’t for example: In this technical demo, find out how we make infrastructure monitoring and troubleshooting easy with Riverbed SteelCentral NetIM.

Riverbed Webinar Demo - Security Workflows

Managing aging infrastructure that’s geographically dispersed brings unique challenges to the Oil & Gas industry because obsolete technologies and automation make it particularly vulnerable to cyberattacks. To combat these attacks, leveraging integrated and full-fidelity data can help you to identify the unknown, avoid business disruptions, and help you save time by: This technical overview of Riverbed’s NetProfiler Flow Monitoring solution demonstrates those security workflows, and introduces a helpful thread feed that includes SUNBURST Backdoor.

Securing SD-WAN in a Cloudy World

Today’s cloud-first enterprise must securely connect their workers to their applications, no matter where their applications may live. Only by transforming both the WAN edge and security architectures can the full promise of the cloud be fully realized. SD-WAN is your opportunity to re-architect, design and build a network that’s secure and fit for the future. Teneo Inc. and Silver Peak can help to make this a clear reality in our cloudy world.

Why Database Monitoring Tools are Important for Senior Business Leaders | Interview with Matt Gordon

Matt Gordon is a Microsoft Data Platform MVP and the Director of Data and Infrastructure at Rev.io. In this short video, he talks us through the 3 key reasons database monitoring tools are essential for him as a Director, and how they help him to lead a team successfully and productively.

New Feature: Adding more options to informational status updates

Not all status updates are published because of an incident or scheduled maintenance event. Sometimes, IT teams simply want to cast an informational status update without affecting the overall status. Now, with StatusCast’s newly released option, you can opt for informational updates to have no effect on your status.

How Zero Trust Enables Work from Anywhere and Builds Toward a SASE Vision

With the global pandemic greatly accelerating many organizations digital transformation, IT and security leaders are coming to terms with the new realities of employees permanently working from anywhere and how that dramatically changes the security risk and the security architecture required. In this session, a panel of expert speakers discuss how Zero Trust security is a key requirement for this new way of working, and the vital role of secure access service edge (SASE) in implementing this approach going forward.