Operations | Monitoring | ITSM | DevOps | Cloud

Webinar

Seamlessly Immunize Binaries Flowing through Artifactory with RunSafe Alkemist

In this webinar, RunSafe and JFrog will introduce cutting-edge security techniques, allowing users to protect both source and binary code flowing through their pipelines from memory based attacks. Includes a walkthrough of a real world exploit where Alkemist was successful at mitigating the attack in Apache/PHP.

How to get the most out of Pandora FMS User Experience

Pandora WUXServer is an internal Pandora FMS server component, which allows users to automate their web navigation sessions. The WUX or Web User Experience feature is a simple and efficient way to check the status and proper function or your websites and applications from a single centralized point (Pandora FMS). Thanks to it, you may reproduce a 100% real transaction, as if it were done by any of your users. You are even provided with the option to choose the browser this transaction may be performed with among the most popular ones in the market (Chrome, Firefox, Edge and Internet Explorer).

Integrating Flowmon and PRTG guarantees IT performance and maximises security

Flowmon Networks, a global network intelligence company, and Paessler, a leading IT monitoring specialist, have integrated their solutions to bring together comprehensive IT monitoring capabilities with AI-powered analysis and advanced security features. Join this webinar to learn about the significant benefits of the integration for those responsible for ensuring availability, performance, and security for IT environments. We will also present a live demonstration of integration capabilities via use case focusing on operational and security aspects of remote workers.

Tanzu Tuesdays - Production-Ready Kubernetes Clusters with VMware Tanzu - Tiffany Jernigan

An expanded version of her Spring One talk: Make Your Kubernetes Clusters Production-Ready with VMware Tanzu When you first started experimenting with Kubernetes, you may have started locally or on a set of servers. With simple applications, you may only have used a container registry and Kubernetes itself. When looking to move your clusters to a production setting, there are many more considerations, such as: How will I manage my clusters? How do I handle monitoring and logging? How do I safely back up my cluster resources? How do I ensure that my container images are safe and secure?

Network Policy with GKE

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.

Hiring and Managing IT Staff During a Global Crisis | Martha Heller - Heller Search Associates

Acquiring, retaining and optimizing IT talent has never been easy, but in 2020, there’s a whole new set of considerations for IT leaders and managers. Needs and priorities have shifted and that means new tactics for productivity, decision-making, and hiring. In this session, we will explore: Martha Heller, CEO of Heller Search Associates and an expert on IT leadership and workforce, leads this discussion.