Operations | Monitoring | ITSM | DevOps | Cloud

How to configure and track deployments, identify issues, and measure performance optimizations

Learn how with the right tools and workflow in place, you can deploy code at speed, while ensuring your customers are having a lightning-fast experience. Go beyond error monitoring and see first-hand how the experts from Octopus and Raygun seamlessly configure deployments, identify and resolve issues, and measure performance optimizations in real-time.

Monitoring virtualization platforms and networks

Small and large businesses alike, opt for virtualization to optimize resource management. While you have a whole list options such as VMware, Hyper-V and Nutanix, monitoring them for their availability is just as important. Watch this webinar and learn how monitoring virtualization platforms and the underlying network infrastructure works to your benefit.

Seamlessly Immunize Binaries Flowing through Artifactory with RunSafe Alkemist

In this webinar, RunSafe and JFrog will introduce cutting-edge security techniques, allowing users to protect both source and binary code flowing through their pipelines from memory based attacks. Includes a walkthrough of a real world exploit where Alkemist was successful at mitigating the attack in Apache/PHP.

How to get the most out of Pandora FMS User Experience

Pandora WUXServer is an internal Pandora FMS server component, which allows users to automate their web navigation sessions. The WUX or Web User Experience feature is a simple and efficient way to check the status and proper function or your websites and applications from a single centralized point (Pandora FMS). Thanks to it, you may reproduce a 100% real transaction, as if it were done by any of your users. You are even provided with the option to choose the browser this transaction may be performed with among the most popular ones in the market (Chrome, Firefox, Edge and Internet Explorer).

Integrating Flowmon and PRTG guarantees IT performance and maximises security

Flowmon Networks, a global network intelligence company, and Paessler, a leading IT monitoring specialist, have integrated their solutions to bring together comprehensive IT monitoring capabilities with AI-powered analysis and advanced security features. Join this webinar to learn about the significant benefits of the integration for those responsible for ensuring availability, performance, and security for IT environments. We will also present a live demonstration of integration capabilities via use case focusing on operational and security aspects of remote workers.

Network Policy with GKE

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.

Hiring and Managing IT Staff During a Global Crisis | Martha Heller - Heller Search Associates

Acquiring, retaining and optimizing IT talent has never been easy, but in 2020, there’s a whole new set of considerations for IT leaders and managers. Needs and priorities have shifted and that means new tactics for productivity, decision-making, and hiring. In this session, we will explore: Martha Heller, CEO of Heller Search Associates and an expert on IT leadership and workforce, leads this discussion.