継続的インテリジェンスレポート

さらに詳しく

リソースセンター

Webinarリソース

18/42の結果

オンラインセミナー

The 2019 Accelerate State of DevOps Report Webinar

オンラインセミナー

Rethink Your Analytics: Don't be fooled by cloud washing [FREE On-Demand Webinar]

オンラインセミナー

Extend Your Operational Analytics Beyond IT and Improve Your Business Outcomes

オンラインセミナー

DevSecOps Challenges in a Cloud Native World

オンラインセミナー

The Kubernetes Phenomenon: More Than Just A Technology

オンラインセミナー

You Build It, You Secure It: Introduction to DevSecOps

Early on in the "cloud," Werner Vogels made his famous quote "You Build It, You Run It". With DevOps we learned that this became a mantra for shared responsibility between developers and operations. Operations learned how to process infrastructure as code and participate early in the supply chain of a service's life cycle. Developers learned that they had responsibilities to enable and in some cases operationalize their service. Now there is a new movement to include and collaborate in a similar way with Security. This is all part of an "everything" shift left ideal. Developers and operations are taught the importance of including security in the stories and all parts of the delivery pipeline including security gates as well as code test gates. Listen in on this session featuring DevSecOps expert, John Willis, as he goes through an introduction to DevSecOps. We discuss: Why traditional DevOps has shifted and what this shift means How DevSecOps can change the game for your team Tips and tricks for getting DevSecOps started within your organization About the Speaker: John Willis is VP of DevOps and Digital Practices at SJ Technologies. Prior to SJ Technologies he was the Director of Ecosystem Development for Docker, which he joined after the company he co-founded (SocketPlane, which focused on SDN for containers) was acquired by Docker in March 2015. Previous to founding SocketPlane in Fall 2014, John was the Chief DevOps Evangelist at Dell, which he joined following the Enstratius acquisition in May 2013. He has also held past executive roles at Opscode/Chef and Canonical/Ubuntu. John is the author of 7 IBM Redbooks and is co-author of the “DevOps Handbook” and the upcoming Beyond the Phoenix Project.

オンラインセミナー

Making the Shift from DevOps to Practical DevSecOps

オンラインセミナー

Analytics & Machine Learning Drive ITOA 2.0 for Better App Performance - Webinar

オンラインセミナー

We can’t “hold on a sec” - Webinar

オンラインセミナー

How to Avoid the Pitfalls of Microservices

オンラインセミナー

Trouble in the Land of Open Source

オンラインセミナー

Using the Search Job API

オンラインセミナー

Correlate Your Logs and Metrics to Improve Application Experience

オンラインセミナー

Bring your Graphite-compatible Metrics into Sumo Logic

オンラインセミナー

Implementing and Maintaining a DevSecOps Approach in the Cloud

It's no secret that continuous innovation and speed to market are mandating dynamic paradigm shifts in how companies conceive, develop and implement IT operations and security strategies. While this is all fine and well for the DevOps teams, for the folks managing security, these innovations bring up new challenges. Modern applications must be architected and managed with security in mind from the get-go, and building a SaaS offering that has security baked in is a whole new game. DevSecOps is the name of the game, but there isn't always a clear path to implementation and adoption. Between protecting against major attacks that arrive on a daily basis to maintaining compliance with strict regulations, leaving the boundaries of traditional IT can leave some security professionals quaking in their boots. Fear not, friends! There is a way to be secure and compliant in the cloud with the right approach. In this webinar, George Gerchow, VP of Security and Compliance at Sumo Logic, will do a deep dive into the steps it takes to successfully implement and maintain DevSecOps in your organization at scale. He will be discussing: What it took to build a world-class data analytics service on AWS from the ground up Technologies used to gain necessary operational and security visibility Tips and tricks to maintain optimal levels of performance, integrity and availability of the data How to best approach regulatory compliance in the cloud in pursuing certifications like PCI DSS, ISO 27001, CSA STAR, TRUSTe, SOC 2, Type 2, etc. Challenges encountered in the journey and how they were addressed

オンラインセミナー

Best Practices for Using and Managing AWS Lambda Services

オンラインセミナー

Protecting Your Applications and Data in AWS with Trend Micro and Sumo Logic

オンラインセミナー

Real-time AWS Visibility at Scale