LogicaCMG: Making the Call for Automated Server Provisioning Solution from Symantec
By: Symantec Corporation View more from Symantec Corporation >>
Download this next:
Installing and Configuring Carbonite Migrate on Ubuntu and Exoscale
By:
Type: Video
Carbonite Migrate can be used to migrate live physical, virtual or cloud servers to the same or different platforms. In order to migrate live open files, a small agent needs to be installed and configured on the source (current production server) and the target (new destination server). This video shows how to install and configure the Carbonite replication agent on Ubuntu Linux. The same steps can be used on any physical or ubuntu server, however the process to install on Red Hat, Oracle Enterprise Linux, SUSE, CentOS and Rocky would be very similar. We'll show how easy it is to provision a suitable target server in Exoscale Cloud, as we will be creating a follow on video showing how to migrate Linux servers from VMware ESX to Exoscale. The process for Windows servers would be very similar, and I have already posted a video showing Full Server migration of a Windows 2019 server from Microsoft Azure to Exoscale Cloud.
These are also closely related to: "LogicaCMG: Making the Call for Automated Server Provisioning Solution from Symantec"
-
Ubuntu ESX to Exoscale Migration Demo
By:
Type: Video
This video will show you how easy it is to migrate live running Linux server from VMware ESX to Exoscale Cloud. We're using Carbonite Migrate to make a real time copy of a live Ubuntu 20.04.6 virtual machine currently running on a VMware ESX and replicating it to a virtual machine we have previously provisioned in Exoscale Cloud. A video showing how to install and configure the target virtual machine can be found here: https://www.brighttalk.com/webcast/18665/609766?bt_tok={{lead.Id}}&utm_source=OpenTextCybersecurityEMEA&utm_medium=brighttalk&utm_campaign=609766 Downtime is kept to the absolute minimum. Installation, configuration and the mirroring (synchronisation) of the server, it's configuration, applications and data, all take place while the source ESX virtual machine remains live, and it's only for the last couple of minutes at the end, when the ESX source server is shutdown and the new Exoscale server is started up, which typically takes less than 2 minutes. The same type of migration could be performed for other Linux Environments (Red Hat, CentOS, SUSE, Oracle Enterprise Linux, Rocky) or Windows (2003, 2008, 2008R2, 2012, 2012R2, 2016, 2019, 2022). These servers could be physical, virtual or cloud, and they could be running pretty much any application.
-
How to: Unlock IT Efficiency with Freshservice Orchestration Center
By:
Type: Talk
The service desk is a hub for requests that require actions in a number of 3rd party systems. Some of the most commonly received requests include password resets, user provisioning/de-provisioning, VM provisioning and so on. Orchestration helps IT to automate, streamline and optimize frequent, repeatable processes in order to ensure accurate, speedier delivery of services. Freshservice’s Orchestration Center serves as your one-stop solution for all your automation and integration needs by combining the use of Freshservice’s easy to use workflow automator along with 3rd party app actions that can be integrated with these workflows. In this video you will receive: 1) A walkthrough of Orchestration and Orchestration Center in Freshservice 2) A walkthrough of Orchestration Server (OSR) - An agent that is installed on the Private network of a customer that allows Freshservice to orchestrate/automate actions on applications and infrastructure that are hosted on the customers' private network using Orchestration Centre.
Find more content like what you just read:
-
VMware ESX to Exoscale Windows Migration Demo
By:
Type: Video
This video will show you how easy it is to migrate live running Windows server from VMware ESX to Exoscale Cloud. We're using Carbonite Migrate to make a real time copy of a live Windows 2019 virtual machine currently running on a VMware ESX and replicating it to a virtual machine we have previously provisioned in Exoscale Cloud. Downtime is kept to the absolute minimum. Installation, configuration and the mirroring (synchronisation) of the server, it's configuration, applications and data, all take place while the source ESX virtual machine remains live, and it's only for the last couple of minutes at the end, when the ESX source server is shutdown and the new Exoscale server is started up, which typically takes 10 to 15 minutes. The same type of migration could be performed for other Windows versions (2003, 2008, 2008R2, 2012, 2012R2, 2016, 2019, 2022) and there is a very similar workflow available for Linux Environments (Red Hat, CentOS, SUSE, Oracle Enterprise Linux, Rocky). These servers could be physical, virtual or cloud, and they could be running pretty much any application.
-
Migrating Windows VMware ESX to IONOS Cloud
By:
Type: Video
This video will show you how easy it is to migrate live running Windows server from VMware ESX to IONOS Cloud. We're using Carbonite Migrate to make a real time copy of a live Windows 2019 virtual machine currently running on a VMware ESX and replicating it to a virtual machine we have previously provisioned in IONOS Cloud. Downtime is kept to the absolute minimum. Installation, configuration and the mirroring (synchronisation) of the server, it's configuration, applications and data, all take place while the source ESX virtual machine remains live, and it's only for the last couple of minutes at the end, when the ESX source server is shutdown and the new IONOS server is started up, which typically takes 10 to 15 minutes. The same type of migration could be performed for other Windows versions (2003, 2008, 2008R2, 2012, 2012R2, 2016, 2019, 2022) and there is a very similar workflow available for Linux Environments (Red Hat, CentOS, SUSE, Oracle Enterprise Linux, Rocky). These servers could be physical, virtual or cloud, and they could be running pretty much any application.
-
Getting Peak Performance for SQL Server Analysis Services (SSAS)
By:
Type: Replay
In this webcast, Steven Wright will review some of the most common SSAS performance killers as well as useful metrics to monitor in SSAS Tabular model, which is now the default installation option in SQL Server.
-
What’s new in Ubuntu Server 21.04?
By:
Type: Talk
Ubuntu Server 21.04 brings significant improvements to the networking, automation and stability fronts with a new Hardware Enablement (HWE) advanced networking stack, extensions to the Ubuntu Server Live Installer and APT phased updates. In addition, the latest development cycle includes improved enterprise applications availability with native support for Microsoft SQL Server on Ubuntu 20.04 LTS. All this makes Ubuntu Server a reasonable alternative for CentOS users, both in terms of infrastructure and application support. Join Tytus Kurek and Lech Sandecki, Product Managers from Canonical to learn about everything new in Ubuntu Server 21.04 release.
-
Tech Demo – Deploying Infosight for HPE Servers
By:
Type: Talk
AI Ops has become a common buzzword in the IT industry. Only HPE's InfoSight has over 10 years of telemetry and a proven track record of success delivery preventative maintenance and automation in the data center. Join this session to learn how to install HPE's InfoSight for free on HPE Servers.
-
Symantec DLP Deep Dive: Navigating the ideal use cases for Symantec DLP
By:
Type: Talk
Whether you are a product owner gauging Symantec's place in their cybersecurity tool ecosystem, an experienced DLP administrator, or someone looking to improve a current DLP environment with optimized configurations and features, navigating through Data Loss Prevention tools can be a challenge. Join Infolock's Managed Services consultant and senior analyst James Azurin in discussing Symantec DLP's strengths and weaknesses as a longstanding fixture in the data protection space. In addition to data discovery and visibility, more advanced monitoring capabilities will be discussed to ensure a better understanding of Symantec DLP's full potential in your organization’s cybersecurity toolkit.
-
Microsoft SQL Server 2019 on Red Hat Enterprise Linux and OpenShift Container
By:
Type: Video
Unlocking the full potential of data is critical to success of any organization, and Microsoft SQL Server running on top of Red Hat Enterprise Linux helps your organization do just that. Red Hat Enterprise Linux is core to the foundation of building a unified data platform on Microsoft SQL Server. This workshop is for DBA’s, engineers and anyone with questions and concerns about running SQL Server 2019 on Red Hat Enterprise Linux. It includes demonstrations and discussions about how to: 1. Install SQL Server 2019 on Red Hat Enterprise Linux 2. Run SQL Server 2019 on a container 3. Manage SQL Server 2019 containers with Red Hat OpenShift Container Platform 4. Use scripts and best practices to accelerate your organization’s adoption of SQL Server on Linux
-
The New Technologies - Keeping Up with the Endpoint
By:
Type: Video
Darren Thomson, EMEA CTO of Symantec, talks to Infosecurity Magazine about the emergence of new endpoint security technologies and how the company is adapting to these new ideas.
-
Eliminate Your Print Servers and Deliver a Serverless Printing Infrastructure
By:
Type: Video
Learn how to eliminate your print servers and implement centrally managed direct IP printing on PrinterLogic’s easy-to-use SaaS platform. Kayla walks you through the two components that enable you to eliminate your print servers and get centrally managed direct IP printing: the Admin Console and the Workstation Client. Get an in-depth look at how to import your printer queues to the PrinterLogic Admin Console and manage your entire print environment from a single user interface. Discover how to deploy printers using various methods including Active Directory, IdP users, or IP address range—without worrying about stressful scripts or GPOs. Plus, find out how you can reduce print-related helpdesk tickets via the PrinterLogic Self-Service Installation Portal. Visit our website and social media pages to learn more about eliminating your print servers. Kayla walks you through the two components that enable you to eliminate your print servers and get centrally managed direct IP printing: the Admin Console and the Workstation Client. Get an in-depth look at how to import your printer queues to the PrinterLogic Admin Console and manage your entire print environment from a single user interface. Discover how to deploy printers using various methods including Active Directory, IdP users, or IP address range—without worrying about stressful scripts or GPOs. Plus, find out how you can reduce print-related helpdesk tickets via the PrinterLogic Self-Service Installation Portal. See attachment below learn more about our free 30 day trial.
-
Should Network Protection Focus on Security or Availability?
By:
Type: Talk
Virtually all organizations understand that network security policies are essential if they want to protect their lifeline—the network. When creating network cybersecurity policies, organizations lean in one of two directions: security-focused or availability-focused. TOPICS • Avoiding costly mistakes when deploying security solutions for audit and compliance, or already-compromised environment • Getting the right policies in place for your organization • Actions to take when old and new solutions appear the same • Pros and cons of each policy models Cybersecurity expert Josh Wickern presents real-world examples, plus practical tips and considerations for decision-making, design and deployment. Bring your questions for live Q&A. ABOUT THE SPEAKER Josh Wickern, CISSP Solutions Director, Symantec Global Consulting From guiding technical policy creation and deployment to discussion and working out architectural design and integrations, Josh has worked with clients in a wide range of industries to achieve the end go of protecting data, people and assets. • 15+ years in IT and IT Security; including • 5+ years with Symantec and Symantec Global Consulting as solutions director, lead technical architect, and consultant
-
Should Network Protection Focus on Security or Availability?
By:
Type: Replay
Virtually all organizations understand that network security policies are essential if they want to protect their lifeline—the network. When creating network cybersecurity policies, organizations lean in one of two directions: security-focused or availability-focused. TOPICS • Avoiding costly mistakes when deploying security solutions for audit and compliance, or already-compromised environment • Getting the right policies in place for your organization • Actions to take when old and new solutions appear the same • Pros and cons of each policy models Cybersecurity expert Josh Wickern presents real-world examples, plus practical tips and considerations for decision-making, design and deployment. Bring your questions for live Q&A. ABOUT THE SPEAKER Josh Wickern, CISSP Solutions Director, Symantec Global Consulting From guiding technical policy creation and deployment to discussion and working out architectural design and integrations, Josh has worked with clients in a wide range of industries to achieve the end go of protecting data, people and assets. • 15+ years in IT and IT Security; including • 5+ years with Symantec and Symantec Global Consulting as solutions director, lead technical architect, and consultant
-
Time to Go Serverless
By:
Type: Talk
Looking to streamline print management for your organization and get rid of print servers once and for all? Join us for a 30-minute demo of PrinterLogic’s secure SaaS print management platform to discover capabilities that empower you to decommission all print servers and manage your print environment from a centralized console. You’ll learn how to: ● Overcome the headaches and stresses of traditional print management ● Migrate all printers to the cloud with minimal downtime ● Deploy printers without GPOs and scripts ● Reduce printer-related helpdesk calls by empowering users to self-install printers ● Track and audit all print activity and generate reports that give insights into print costs All registrants will receive a recording of the event following the demo.
-
Time to Go Serverless
By:
Type: Talk
Looking to streamline print management for your organization and get rid of print servers once and for all? Join us for a 30-minute demo of PrinterLogic’s secure SaaS print management platform to discover capabilities that empower you to decommission all print servers and manage your print environment from a centralized console. You’ll learn how to: ● Overcome the headaches and stresses of traditional print management ● Migrate all printers to the cloud with minimal downtime ● Deploy printers without GPOs and scripts ● Reduce printer-related helpdesk calls by empowering users to self-install printers ● Track and audit all print activity and generate reports that give insights into print costs All registrants will receive a recording of the event following the demo.
-
Introducing Zero-Touch Provisioning (ZTP) in Scale Computing Fleet Manager
By:
Type: Replay
A new feature of SC//Fleet Manager, Zero-Touch Provisioning (ZTP) allows IT teams and integrators to quickly, easily, and remotely stage clusters for installation, providing the shortest time from pilot to production. In this presentation, Scale Computing will provide a live demonstration of ZTP with the help of the Edge Field Day delegates, highlighting the time-savings historically associated with Day-0 tasks. Recorded in San Francisco as part of Edge Field Day on February 22, 2023.
-
From Six Tools to One: A Case Study in Consolidating IT Management Tools
By:
Type: Talk
BigFix provided HCL Global Information Technology (GIT) with a comprehensive endpoint management solution that successfully eliminated Microsoft SCCM®, Flexera Secunia®, Flexera Admin Studio®, RedHat Satellite®, Symantec Wise® and JAMF®.
-
Microsoft DLP Deep Dive: Exploring Microsoft's data loss prevention solutions
By:
Type: Talk
Join us as we explore what Microsoft has to offer: reviewing the architecture of this cloud-first solution, the unique philosophy they have adopted for DLP, where Purview shines brightly, areas that could use improvement, and how it compares against industry leaders like Symantec and Proofpoint. E5 licensing has never looked more valuable.
-
Unleashing the Power of SQL Server
By:
Type: Replay
Imagine simplifying and automating the time-consuming activity of SQL Server management with automated provisioning or patching, where one-click simplicity allows you to clone/copy SQL server databases that are TBs in size in just a few minutes. Leveraging snapshot technology, Era captures all database states for any given service-level agreement (SLA) and allows DBAs to not only create fully functional database clones but also refresh existing ones using one-click operations. Nutanix Era is revolutionizing the database experience for lifecycle operations with provisioning, patching, and managing databases from day 0 to day n. Attend this session to learn how to deliver and take advantage of database as a service (DBaaS).
-
Royal Holloway: Testing antivirus efficacy in Linux
By: TechTarget ComputerWeekly.com
Type: Ezine
Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
-
How eSIM Helps to Keep the IoT SAFE
By:
Type: Talk
From fleet to industrial equipment, smart meters, healthcare applications, and more, all types of industries can achieve substantial improvements using eSIM as part of their IoT ecosystem. With eSIM technology, you can leverage embedded connectivity that provides global coverage right out of the box and advanced auto-provisioning capabilities that ensure it’s always on the right network for your service needs. Join us as we discuss how you can install one SIM, one time – and enjoy coverage wherever it’s needed and connectivity that lasts the entire device lifecycle and take advantage of new IoT SAFE - Chip to Cloud security.
-
Raspberry PI with Java: programming the internet of things
By: TechTarget ComputerWeekly.com
Type: Essential Guide
In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
-
Install & Configure a Web Server, Reverse Proxy and Load Balancer with NGINX
By:
Type: Video
Are you ready to join the revolution of modern microservices-based architectures? Look no further than our upcoming webinar, where we'll help you get started with NGINX - the gold standard building block for the most cutting-edge applications. This isn't your average webinar - we'll be taking a hands-on, follow-the-trainer approach to guide you through every step of the process. From installation to configuration, we'll teach you how to harness the full power of NGINX as a web server, load balancer, and reverse proxy. No need to be intimidated - we'll make sure you leave feeling confident and ready to take on even the most complex microservices architectures. So why wait? Sign up now and start transforming your development process with NGINX.
-
A deep dive into PostgreSQL replication and automatic failover techniques
By:
Type: Talk
Deploying a PostgreSQL instance on Ubuntu is as simple as running a single command (i.e. sudo apt install postgresql-
). Yet, running a single instance of PostgreSQL is a recipe for downtime and reputation damage to your company. To run a highly available PostgreSQL deployment you need to leverage several techniques such as replication, automatic failovers, failure isolation and backups. In this webinar, we will examine advanced techniques to implement fail-safe replication and automatic fail-overs. We will cover the following: Replication techniques Automatic fail-over techniques on client and server side Demo -
A deep dive into PostgreSQL replication and automatic failover techniques
By:
Type: Replay
Deploying a PostgreSQL instance on Ubuntu is as simple as running a single command (i.e. sudo apt install postgresql-
). Yet, running a single instance of PostgreSQL is a recipe for downtime and reputation damage to your company. To run a highly available PostgreSQL deployment you need to leverage several techniques such as replication, automatic failovers, failure isolation and backups. In this webinar, we will examine advanced techniques to implement fail-safe replication and automatic fail-overs. We will cover the following: Replication techniques Automatic fail-over techniques on client and server side Demo -
Staying on Top of Malicious Emails with Threat Intelligence and SOAR
By:
Type: Replay
Malicious email remains the most common threat vector facing most organizations. As the number and variety of these attacks grows, security operations teams are increasingly challenged to find the time needed to properly investigate suspicious messages. Fortunately, combining the latest threat intelligence tools with low-code security automation can be used as a force multiplier. In this session cybersecurity experts from Broadcom (Symantec) and Swimlane will discuss how the integration of these tools can be used to thwart attacks. Register now to learn: • Details about the growing threats posed by phishing and malicious emails • Threat investigation challenges for typical SIEM environments • How threat intelligence speeds identification and management of email threats • What SOAR can do for resource-strapped SecOps teams • How the Broadcom (Symantec) DeepSight and Swimlane integration can help defend against advanced attacks
-
A better alternative to Symantec Bluecoat SSL Visibility (TLS Decryption)
By:
Type: Replay
The cyber threat landscape is rapidly evolving, and attackers are increasingly leveraging the cover of encryption to outmaneuver our enterprise defenses. Dedicated TLS decryption solutions are more relevant than ever before, and Symantec’s, (formerly Bluecoat), SSL Visibility solution is one of the contenders in this area. However, with the recent disruptive acquisition by Broadcom, the future of the solution has been questioned, and its limitations with performance, deployment flexibility and functionality have had customers looking for a better alternative that meets their needs. To improve the security posture of Enterprises, helping them protect their data and users, we will discuss what is required for an effective TLS Decryption strategy, including: * The encrypted blind spot and the evolving threat landscape * Why the “Secure Decrypt Zone” approach is important for your security infrastructure * Why A10 Networks SSL Insight is a better alternative to Symantec’s SSL Visibility
-
Unleashing the Power of SQL Server
By:
Type: Replay
Imagine simplifying and automating the time-consuming activity of SQL Server management with automated provisioning or patching, where one-click simplicity allows you to clone/copy SQL server databases that are TBs in size in just a few minutes. Leveraging snapshot technology, Nutanix Era captures all database states for any given service-level agreement (SLA) and allows DBAs to not only create fully functional database clones but also refresh existing ones using one-click operations. Nutanix Era is revolutionizing the database experience for lifecycle operations with provisioning, patching, and managing databases from day 0 to day n. Attend this session to learn how to deliver and take advantage of database as a service (DBaaS).
-
Microservice, Container, Kubernetes & The Future of PaaS
By:
Type: Talk
Living in a digital world means information is always at your fingertips, residing in the applications on your phones, laptops and servers. As speed and availability of information access requirements get higher and more complex, applications must evolve to stay current. Rapid changes in application architecture have seen applications morph from more traditional, monolithic applications with functional modules built into a single installation, to modern microsevice-based applications, that break into multiple installations, that more easily serve a wider user base. The future surely belongs to microservice-based applications, as unlike monolithic applications that are designed to run on physical servers or VMs, micro-service applications can be run on containers, and are managed by Kubernetes (K8s in short). To build, run and manage container-based microservices, you will certainly deal with K8s. As the first graduated open-source project from CNCF, K8s are the core of the platform-as-a-service that provides automation and orchestration for micro-service applications. Many tools like Jenkins and Istio are built around K8s, to facilitate simple and faster modern application development and management. As a long-time IaaS (HCI & SCP) player in the market, Sangfor dedicated an increasing amount of resources to PaaS development several years ago. Why are K8s so popular? And what is Sangfor’s role in the PaaS world? Join our Sangfor expert-led webinar to learn more!
-
What will a quantum datacentre look like?
By: TechTarget ComputerWeekly.com
Type: Infographic
IBM has updated its quantum computing roadmap to reflect how quantum processors, central processing units (CPUs) and graphics processing units (GPUs) will be woven into a compute fabric capable of solving computationally complex problems. Understand why this impacts both hardware installation and software.
-
Selling a Cloud-first IT and Security Strategy with John Thompson
By:
Type: Video
Even CIOs and CISOs Have to Sell Sometimes Every single one of us has to do some selling in their job. Now more than ever, IT and security leaders see the value of being cloud-first — but sometimes others still need convincing. In this episode of “The Reimagine Series,” John Thompson, Chairman of Microsoft, and Former Chairman and CEO of Symantec, joins Sanjay Beri, CEO of Netskope, to talk about technology, cybersecurity, and how the best leaders get others to buy into the strategy and vision needed to execute in today’s complex business environment. Get sage advice from John ranging from his career at IBM to CEO of Symantec, to VC investor with Lightspeed Venture Partners. Join us for this live discussion as we dive into topics like bringing others along in executing your strategy and vision, how the ever-changing technology and cybersecurity is opening up new opportunities to drive innovation in your organization, and predictions for what’s to come in the technology and cybersecurity landscape over the next decade.
-
Selling a Cloud-first IT and Security Strategy with John Thompson
By:
Type: Video
Even CIOs and CISOs Have to Sell Sometimes Every single one of us has to do some selling in their job. Now more than ever, IT and security leaders see the value of being cloud-first — but sometimes others still need convincing. In this episode of “The Reimagine Series,” John Thompson, Chairman of Microsoft, and Former Chairman and CEO of Symantec, joins Sanjay Beri, CEO of Netskope, to talk about technology, cybersecurity, and how the best leaders get others to buy into the strategy and vision needed to execute in today’s complex business environment. Get sage advice from John ranging from his career at IBM to CEO of Symantec, to VC investor with Lightspeed Venture Partners. Join us for this live discussion as we dive into topics like bringing others along in executing your strategy and vision, how the ever-changing technology and cybersecurity is opening up new opportunities to drive innovation in your organization, and predictions for what’s to come in the technology and cybersecurity landscape over the next decade.
-
How to Secure Your Print Environment in 2024 AND BEYOND | PrinterLogic Webinar
By:
Type: Video
What does print security look like in 2024? To Greg and Justin, print security isn't as simple as installing security patches and staying up-to-date on your print hardware. It's about reducing your print infrastructure and migrating to the cloud to leverage modern integrations with identity providers, automating security updates, and choosing a solution that follows ISO and SOC 2 security frameworks to keep your print data protected. This webinar, led by Vasion's DevOps Director, Justin Scott, and Principal Architect, Greg Smith, highlights how eliminating your print servers paves a clear path for you to strengthen your print security and set you up for long-term success.
-
Solution: Red Hat OpenShift Data Foundation & SMCI Servers
By:
Type: Replay
This presentation will look into how Red Hat OpenShift® Data Foundation (ODF), software-defined storage, is integrated with and optimized for the Red Hat OpenShift Container Platform. We will also look into how OpenShift Data Foundation 4.x is built on Red Hat Ceph® Storage, Rook, and NooBaa to provide container native storage services that support block, file, and object services. OpenShift Data Foundation will deploy anywhere OpenShift does: on-premise or in the public cloud. We will also look at how Red Hat ODF supports a variety of traditional and cloud-native workloads, including: Block storage for databases and messaging. Shared file storage for continuous integration and data aggregation. Object storage for archival, backup, and media storage. With OpenShift 4.x, Red Hat has rearchitected OpenShift to bring the power of Kubernetes Operators to transform our enterprise-grade Kubernetes distribution with automating complex workflows, i.e., deployment, bootstrapping, configuration, provisioning, scaling, upgrading, monitoring, and resource management. In conjunction, OpenShift Data Foundation and Supermicro servers will transform the storage customer experience by making it easier for Supermicro and Red Hat customers to install, upgrade and manage storage on OpenShift.
-
Focus: Application Virtualisation
By: TechTarget ComputerWeekly.com
Type: eGuide
This e-guide focuses on application virtualisation and how big companies are finding various ways to stop applications adversely affecting each other.
-
A developer's guide to operators
By:
Type: Talk
Today, mature tooling, such as package management or provisioning tools, covers the installation and deployment of applications. But is there tooling available for managing an application? How are operational tasks covered? Software operators are the answer. The software operator is a design pattern, a proven approach to implement real-world operation tasks with source code. Software operators cover configuration, updating, scaling, running backups or performing health checks. Because they are the beating heart of organisations’ IT, they have more sophisticated transparency, reliability and data security requirements. How do you go about developing them? Join our webinar for best practices. We will cover: - What are software operators? - Why is it important to develop secure software operators? - Guidelines for delivering high-quality operators
-
ISSA International Series: Breach Report- Review the Various Breach Reports
By:
Type: Replay
This session will cover the traditional breach reports as well as a new style of reports and analysis. Moderator: Matt Mosley, Vice President of Security Products, Devo Speakers: Scott Parker, Sr. Principal Systems Engineer, Symantec Gabe Chomic, President, ISSA-UK Gary Marsden, Senior Director, Data Protection Services, Gemalto
-
Dissecting the Golden SAML Attack Used by Attackers Exploiting SUNBURST Backdoor
By:
Type: Video
In this on-demand webinar, Randy Franklin Smith briefly introduces you to federation and SAML and how it works in Office 365. Then he will discuss how attackers exploited selected installations of the SUNBURST backdoor to laterally move to the victim organization’s ADFS server and stole its private key. Then, joined by the very knowledgeable security researchers Sally Vincent and Dan Kaiser from LogRhythm Labs, we will show you •How a Golden SAML attack works •Possible ways to mitigate via preventive controls •Methods for detection via SIEM rules and threat hunting •What Office 365 logs do and don’t tell us about federated logins You will see an actual demonstration of an attack by Sally, and we’ll cover the actual event IDs you need to monitor and attempt to correlate from: •Domain controllers •ADFS servers •Office 365 audit log This is a highly technical session we think you will really enjoy and benefit from. Especially because we expect to see a lot more Golden SAML attacks this year. Watch on-demand now!
-
[APAC] Dissecting Golden SAML attack attackers used to exploit SUNBURST backdoor
By:
Type: Replay
In this on-demand webinar, Randy Franklin Smith briefly introduces you to federation and SAML and how it works in Office 365. Then he will discuss how attackers exploited selected installations of the SUNBURST backdoor to laterally move to the victim organization’s ADFS server and stole its private key. Then, joined by the very knowledgeable security researchers Sally Vincent and Dan Kaiser from LogRhythm Labs, we will show you •How a Golden SAML attack works •Possible ways to mitigate via preventive controls •Methods for detection via SIEM rules and threat hunting •What Office 365 logs do and don’t tell us about federated logins You will see an actual demonstration of an attack by Sally, and we’ll cover the actual event IDs you need to monitor and attempt to correlate from: •Domain controllers •ADFS servers •Office 365 audit log This is a highly technical session we think you will really enjoy and benefit from. Especially because we expect to see a lot more Golden SAML attacks this year. Watch on-demand now!
-
Dissecting the Golden SAML Attack Used by Attackers Exploiting SUNBURST Backdoor
By:
Type: Replay
In this on-demand webinar, Randy Franklin Smith briefly introduces you to federation and SAML and how it works in Office 365. Then he will discuss how attackers exploited selected installations of the SUNBURST backdoor to laterally move to the victim organization’s ADFS server and stole its private key. Then, joined by the very knowledgeable security researchers Sally Vincent and Dan Kaiser from LogRhythm Labs, we will show you •How a Golden SAML attack works •Possible ways to mitigate via preventive controls •Methods for detection via SIEM rules and threat hunting •What Office 365 logs do and don’t tell us about federated logins You will see an actual demonstration of an attack by Sally, and we’ll cover the actual event IDs you need to monitor and attempt to correlate from: •Domain controllers •ADFS servers •Office 365 audit log This is a highly technical session we think you will really enjoy and benefit from. Especially because we expect to see a lot more Golden SAML attacks this year. Watch on-demand now!
-
MS SQL Server Simplified: Performance, Security & Availability DBaaS
By:
Type: Replay
Between patching, provisioning, copy data management, and data protection, MS SQL Server admins are busier than ever. Add in the challenge of managing these tasks across clouds, and admins find themselves working nights and weekends to keep databases up and running. The good news is that these tasks can be dramatically simplified and streamlined! In this short webinar, you’ll learn how using a consolidated, cloud-agnostic platform and modern DBaaS solution can dramatically reduce the time spent on error-prone, repetitive manual tasks to support SQL Server. We'll also show you how to improve security, performance and availability leaving your evenings and weekend time free from providing SQL Server support.
-
MS SQL Server Simplified: Performance, Security & Availability DBaaS
By:
Type: Replay
Between patching, provisioning, copy data management, and data protection, MS SQL Server admins are busier than ever. Add in the challenge of managing these tasks across clouds, and admins find themselves working nights and weekends to keep databases up and running. The good news is that these tasks can be dramatically simplified and streamlined! In this short webinar, you’ll learn: - How using a consolidated, cloud-agnostic platform and modern DBaaS solution can dramatically reduce the time spent on error-prone - How to reduce repetitive manual tasks to support SQL Server - How to improve security, performance and availability, leaving your evenings and weekend time free from providing SQL Server support
-
HDS TechTour Workshop 4–Ensure Compliance with Fast-discovery Storage Solution
By:
Type: Video
Organizations must now pay extraordinary attention to data protection. However, it is no longer limited to archiving. It now needs to be an active, open and automated data management platform where data of all kinds are readily accessible and properly protected. Watch the video to understand how Hitachi Content Platform (HCP) and Symantec Enterprise Vault (EV) integrated solution give a helping hand.
-
Automate the Dreaded Task of Software Asset Management
By:
Type: Replay
Nlyte’s Gary Paquette uncovers how you can automate discovery, management, and reporting with Nlyte Software Optimizer agentless software. What you will learn from the webinar: - Organic installation and distribution of software - Lack of visibility in current and new deployments - Matching databases to physical and virtual - Reconciliation between required services versus installed - Inaccurate systems, too many systems and files
-
Enhancing Service Availability with Kubernetes in Power-Interrupted Environments
By:
Type: Talk
Running on-premise applications in developing countries like the Philippines often means dealing with frequent power interruptions that can last for hours or even days, severely impacting service availability to clients. Kubernetes offers a solution by automatically provisioning services and maintaining replicas, significantly reducing downtime and ensuring continuity. However, setting up Kubernetes in such an environment is complex. In this session, Justine will guide you through the process of spinning up a Kubernetes cluster from baremetal servers using k0s over Tailscale VPN. First, we will discuss how to bootstrap the cluster automatically using k0sctl. Then, we will write the configuration necessary for our setup. Finally, we will provision a basic server to verify that our setup is working. We will cover both the basic and specific configurations needed to make the cluster work effectively, including configurations for integrating Tailscale and Calico for networking. Join us to discover how to self-host Kubernetes to enhance service availability and resilience for on-premise applications.
-
IT Project: Virtualisation
By: TechTarget ComputerWeekly.com
Type: eGuide
Virtualisation, in all its forms, has dramatically changed the way enterprise datacentres are operated, managed and built over the course of the past decade or so.
-
Landlord Buy to Let Guide - a lot to consider
By:
Type: Video
We have created a buy to let guide for Landlords, this is the first of four installments which covers some of the things you will need to consider.
-
Landlord Buy to Let Guide - perfect tenants
By:
Type: Video
We have created a buy to let guide for Landlords, this is the second of four installments which talks about what makes perfect tenants.