In this session, learn how the Greek Orthodox Archdiocese of America was able to customize their Incapsula service to accommodate a single sign-on solution.
In this session, learn how The Economist approached migrating to the cloud and moving economist.com from legacy datacenters to Amazon Web Services (AWS).
Learn everything from the Imperva resources you can count on when you need help, to how you can bolster your security and performance by working with the Incapsula support organization.
In this presentation, we cover advanced mitigation techniques used by Behemoth 2 – our latest mitigation platform – as well as real-life examples of different DDoS attack vectors and traffic samples. Plus, learn how we utilize a network of 4.7 Tbps to handle complex high throughput attacks and get a heads up on the latest trends we’re seeing in DDoS attacks.
Get an inside look at Incapsula Security, straight from the Security Research Team. Plus, get your vulnerability management strategy on track by assessing the automated threats you face and learn about the new security features we’re working on to keep you protected.
IncapRules are an integral method to customize Incapsula for your specific applications and environment. However, we find that our enterprise clients may have questions on building advanced rules or need help understanding how to write them for complex scenarios. In this session, Jeff Serota, Technical Account Manager, discusses the interface, some of the most common filters and actions, and how a large client collaborated with our security team to thwart credential stuffing on their client self-service portal.
Data Breaches: Protecting Your Database from the Evening NewsSolarWinds
In this webinar presented by Joey D’Antoni you will learn about security techniques you can use within your network and in the broader SQL Server® ecosystem to protect your data from attackers, both inside and outside of your firm.
In this session, learn how The Economist approached migrating to the cloud and moving economist.com from legacy datacenters to Amazon Web Services (AWS).
Learn everything from the Imperva resources you can count on when you need help, to how you can bolster your security and performance by working with the Incapsula support organization.
In this presentation, we cover advanced mitigation techniques used by Behemoth 2 – our latest mitigation platform – as well as real-life examples of different DDoS attack vectors and traffic samples. Plus, learn how we utilize a network of 4.7 Tbps to handle complex high throughput attacks and get a heads up on the latest trends we’re seeing in DDoS attacks.
Get an inside look at Incapsula Security, straight from the Security Research Team. Plus, get your vulnerability management strategy on track by assessing the automated threats you face and learn about the new security features we’re working on to keep you protected.
IncapRules are an integral method to customize Incapsula for your specific applications and environment. However, we find that our enterprise clients may have questions on building advanced rules or need help understanding how to write them for complex scenarios. In this session, Jeff Serota, Technical Account Manager, discusses the interface, some of the most common filters and actions, and how a large client collaborated with our security team to thwart credential stuffing on their client self-service portal.
Data Breaches: Protecting Your Database from the Evening NewsSolarWinds
In this webinar presented by Joey D’Antoni you will learn about security techniques you can use within your network and in the broader SQL Server® ecosystem to protect your data from attackers, both inside and outside of your firm.
Why Your Customers Care About Compliance and You Should TooAmazon Web Services
As you're expanding your business into regulated markets, addressing compliance requirements can feel overwhelming. AWS has developed a robust compliance portfolio designed to help you and your customers meet compliance goals. During this session we will discuss ways to implement, market, and communicate compliance to your customers and grow your business in regulated industries. We’ll also cover common objections from customers and how you can find information to counter these concerns—and you’ll have time to discuss and share your own customer’s objections.
Speakers:
Kristin Haught - Technical PM III, AWS
Bill Reid - Sr Mgr, Solutions Architecture, AWS
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...AirTight Networks
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carriers - by AirTight CEO David King
@WBAlliance #WGCSFO October 10th 2014
Outline
(1) The Sweet Spot of Adoption = Technology Drivers + Customer Expectations + Service Provider Needs
We’ll focus on what is disrupting the Wi-Fi space today and how carriers can take advantage of the inflection points happening in the industry, such as cloud, HotSpot 2.0, 802.11ac and IoT.
We will cover how Wi-Fi can address key concerns of carriers as they face the threat of shrinking margins, high customer acquisition costs and a lack of customer loyalty.
We will address how to use Wi-Fi to:
- Reduce the cost of onboarding and supporting new customers
- Provide higher value, context-driven engagement
- Deliver relevant offerings driven by context-based analytics – based on location, social profiles, loyalty
(2) There’s a New Stack in Town
What will the new mobile stack look like and what can carriers learn from the Wi-Fi industry?
- Software driven approach is re-allocating money from HW manufacturers
- Revenues are moving towards those who can build applications and ecosystems around the new value of Wi-Fi – those who can help customers monetize the connectivity.
- What are the components of the new stack?
- Wi-Fi is a proof point of what the new mobile stack will look like
o Monetization
o Brand Engagement
o Actionable Analytics
o Behavioral Security and Onboarding
o High Performance Access
(3) Service provider enablement through secure cloud-managed Wi-Fi
Why has cloud-managed Wi-Fi has garnered so much interest from the carrier side?
It starts with faster time to market – being able to
- test and deploy new business programs quickly
- conduct rapid trials across geographies and customer bases
- accelerate response time to security threats.
The low hanging fruit for carriers are distributed business customers; they are an underserved segment – simply because there are no efficiencies of scale. Cloud Wi-Fi gives you the ability to serve this customer base profitably. It delivers shorter onboarding times and easier connection management and troubleshooting for these types of customers.
(4) New paradigm in cloud management
What does it mean to have a scalable and cost-efficient cloud, and why should carriers care?
The economics of carrier business put emphasis on manageability and scale. Operational efficiencies are now just as important as AP performance. Cost efficiencies will drive cost of adding new customers down.
What should carriers look for in cloud Wi-Fi? We’ll discuss the critical components of a carrier-grade cloud backend:
- Scalability
- Manageability
- Security
- Cost efficient architecture
- Super tenancy to manage multiple customers
[What are our proof points? Largest cloud footprint with 17,000 locations.
Simplify security with Trend Micro Managed Rules for AWS WAFAmazon Web Services
Here are the slides presented by René Gundersen at the perimeter protection event held in Stockholm on how to simplify security with Trend Micro Managed Rules for AWS WAF
Data exfiltration—also called data extrusion, data exportation, or data theft—is the unauthorized transfer of data. It is a very serious challenge to business because attackers go after business critical or highly confidential data. Data exfiltration can be done manually by a person, or automated using scripts. Attack sophistication increases by the day. Signature-based techniques to defend against attacks are limited and cannot protect against zero-day attacks. To counter this, we use machine learning (ML) techniques. ML is effective at solving many problems in computer vision, robotics, etc., and is increasingly used in security. Learn an ML technique called anomaly detection, and other state-of-the-art techniques to identify data exfiltration attempts.
You automated your deployment, elasticized your workloads, and dynamically provisioned your fleet. What do you do next?
Tackle automating your security needs using the latest capabilities in the cloud! There’s no single path to building an automated and continuous security architecture that works for every organization, but certain key principles and techniques are used by the early adopter cloud elite that give them distinct advantages.
It's time to re-think your organization’s processes and behaviors to demonstrate the latest efficiencies in your security operations.
In this webinar, learn how Intuit implements cloud security automation with Evident.io and other innovative cloud technologies.
This slide deck covers:
- How security will be integrated into the overall processes of development and deployment.
- How to tie security acceptance tests, a subset of your key security controls, right into the end of your functional testing process to promote builds with confidence at greater speed.
- How to be successful with API-enabled, continuous security tools in the cloud.
- How to operationalize security alarms, enabling world-class incident response and remediation capabilities.
Unlock the Intelligent Data Center with VMware & ZenossZenoss
Data centers are dynamic creatures of rapid change. Virtualization, micro-services, containers, software-defined solutions—there are so many IT components being adopted and enhanced every single day.
And, frankly, the complexity of these technologies make it extremely difficult to digest and analyze issues, and, ultimately, avoid service disruptions. Identifying issues through layers of abstraction delays resolution and costs your team, your clients, and your business time, money and credibility.
So how do you avoid service disruptions, and, when issues do arise, expedite root cause analysis without missing something important?
Join us for our webinar Unlock the Intelligent Data Center with VMware & Zenoss, where we’ll show you an abundance of options for agentless network support, faster MTTR, and how to make your data center intelligent.
Prevent Hacking: 10 Steps to Secure your WordPress SiteDr. Rachna Jain
Why should you care to prevent hacking of your WordPress site? Because your website is the home of your online business- and when it gets hacked, it can be upsetting, frustrating, and feel violating, not to mention expensive in terms of lost business. Even if your site receives very few visitors, or you have set your site up for some private purpose- if it appears online, you need to take certain steps to prevent hacking.
Unfortunately, hacking is becoming increasingly common, as more and more websites are brought online and owned by businesses who do not understand how to keep them updated and secure.
There are 10 steps you can take, ahead of time, to prevent your website from being hacked.
CEO of Evident.io, Tim Prendergast, sharing insights into the powerful combination of Cloud Security and DevOps practices at Velocity Conference 2015 in Santa Clara, CA USA. Learn how agility, security, and automation can be combined to perform continuous security assessments, real-time automated defensive measures, and other exciting security capabilities!
The threat model for IoT devices is very different from the threat model for cloud applications. Customers must understand what these threats are, prioritize them effectively, and navigate the growing ecosystem of partners that give customers tools to build secure IoT solutions. We showcase how to leverage partner solutions to mitigate threats, explain how to avoid common pitfalls, and make it clear that all IoT solutions must incorporate end-to-end security from the start. We begin with the steps to take in the manufacturing process, how to provision and authenticate devices in the field, and we cover solutions that can help customers comply with IT requirements in the maintenance phase of the product lifecycle.
Introduction to the Security Perspective of the Cloud Adoption FrameworkAmazon Web Services
The Security Perspective of the AWS Cloud Adoption Framework (CAF) provides a framework for maturation via a structured program that incorporates best practices and processes to define, build, and optimize how you operate security controls in the AWS Cloud. The Security Perspective of the CAF provides a set of five core foundational themes designed to help you structure your selection and implementation of controls that are right for your business: AWS Identity and Access Management, detective controls, infrastructure security, data protection, and incident response. During this session, you will learn how to put the Security Perspective of the CAF into practice.
Speaker: Bill Reid - Sr. Manager, Solutions Architecture, AWS
The journey of cloud migration isn’t a straight and narrow path, and enterprise DevSecOps teams generally use a variety of tools to reach their goal. In this webinar, we will deep dive into SAP Concur’s journey, and how they are leveraging Contrast Security’s embedded application security model and AWS in tandem to “shift left”, create a seamless developer experience, and deliver secure application workloads on the cloud.
Join key executives from SAP Concur, AWS and Contrast Security as they discuss how to avoid the pitfalls and pioneer a secure cloud path to success.
In this webinar, you will learn:
The start: Why SAP Concur moved to AWS
The next step: Cloud enables increased velocity
The chutes and ladders: Security challenges with increased software velocity
The resolution: Design Architectures and Deployment Models between Contrast Security and AWS
The lessons learned: Continuous Improvement & Best Practices.
Why Your Customers Care About Compliance and You Should TooAmazon Web Services
As you're expanding your business into regulated markets, addressing compliance requirements can feel overwhelming. AWS has developed a robust compliance portfolio designed to help you and your customers meet compliance goals. During this session we will discuss ways to implement, market, and communicate compliance to your customers and grow your business in regulated industries. We’ll also cover common objections from customers and how you can find information to counter these concerns—and you’ll have time to discuss and share your own customer’s objections.
Speakers:
Kristin Haught - Technical PM III, AWS
Bill Reid - Sr Mgr, Solutions Architecture, AWS
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...AirTight Networks
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carriers - by AirTight CEO David King
@WBAlliance #WGCSFO October 10th 2014
Outline
(1) The Sweet Spot of Adoption = Technology Drivers + Customer Expectations + Service Provider Needs
We’ll focus on what is disrupting the Wi-Fi space today and how carriers can take advantage of the inflection points happening in the industry, such as cloud, HotSpot 2.0, 802.11ac and IoT.
We will cover how Wi-Fi can address key concerns of carriers as they face the threat of shrinking margins, high customer acquisition costs and a lack of customer loyalty.
We will address how to use Wi-Fi to:
- Reduce the cost of onboarding and supporting new customers
- Provide higher value, context-driven engagement
- Deliver relevant offerings driven by context-based analytics – based on location, social profiles, loyalty
(2) There’s a New Stack in Town
What will the new mobile stack look like and what can carriers learn from the Wi-Fi industry?
- Software driven approach is re-allocating money from HW manufacturers
- Revenues are moving towards those who can build applications and ecosystems around the new value of Wi-Fi – those who can help customers monetize the connectivity.
- What are the components of the new stack?
- Wi-Fi is a proof point of what the new mobile stack will look like
o Monetization
o Brand Engagement
o Actionable Analytics
o Behavioral Security and Onboarding
o High Performance Access
(3) Service provider enablement through secure cloud-managed Wi-Fi
Why has cloud-managed Wi-Fi has garnered so much interest from the carrier side?
It starts with faster time to market – being able to
- test and deploy new business programs quickly
- conduct rapid trials across geographies and customer bases
- accelerate response time to security threats.
The low hanging fruit for carriers are distributed business customers; they are an underserved segment – simply because there are no efficiencies of scale. Cloud Wi-Fi gives you the ability to serve this customer base profitably. It delivers shorter onboarding times and easier connection management and troubleshooting for these types of customers.
(4) New paradigm in cloud management
What does it mean to have a scalable and cost-efficient cloud, and why should carriers care?
The economics of carrier business put emphasis on manageability and scale. Operational efficiencies are now just as important as AP performance. Cost efficiencies will drive cost of adding new customers down.
What should carriers look for in cloud Wi-Fi? We’ll discuss the critical components of a carrier-grade cloud backend:
- Scalability
- Manageability
- Security
- Cost efficient architecture
- Super tenancy to manage multiple customers
[What are our proof points? Largest cloud footprint with 17,000 locations.
Simplify security with Trend Micro Managed Rules for AWS WAFAmazon Web Services
Here are the slides presented by René Gundersen at the perimeter protection event held in Stockholm on how to simplify security with Trend Micro Managed Rules for AWS WAF
Data exfiltration—also called data extrusion, data exportation, or data theft—is the unauthorized transfer of data. It is a very serious challenge to business because attackers go after business critical or highly confidential data. Data exfiltration can be done manually by a person, or automated using scripts. Attack sophistication increases by the day. Signature-based techniques to defend against attacks are limited and cannot protect against zero-day attacks. To counter this, we use machine learning (ML) techniques. ML is effective at solving many problems in computer vision, robotics, etc., and is increasingly used in security. Learn an ML technique called anomaly detection, and other state-of-the-art techniques to identify data exfiltration attempts.
You automated your deployment, elasticized your workloads, and dynamically provisioned your fleet. What do you do next?
Tackle automating your security needs using the latest capabilities in the cloud! There’s no single path to building an automated and continuous security architecture that works for every organization, but certain key principles and techniques are used by the early adopter cloud elite that give them distinct advantages.
It's time to re-think your organization’s processes and behaviors to demonstrate the latest efficiencies in your security operations.
In this webinar, learn how Intuit implements cloud security automation with Evident.io and other innovative cloud technologies.
This slide deck covers:
- How security will be integrated into the overall processes of development and deployment.
- How to tie security acceptance tests, a subset of your key security controls, right into the end of your functional testing process to promote builds with confidence at greater speed.
- How to be successful with API-enabled, continuous security tools in the cloud.
- How to operationalize security alarms, enabling world-class incident response and remediation capabilities.
Unlock the Intelligent Data Center with VMware & ZenossZenoss
Data centers are dynamic creatures of rapid change. Virtualization, micro-services, containers, software-defined solutions—there are so many IT components being adopted and enhanced every single day.
And, frankly, the complexity of these technologies make it extremely difficult to digest and analyze issues, and, ultimately, avoid service disruptions. Identifying issues through layers of abstraction delays resolution and costs your team, your clients, and your business time, money and credibility.
So how do you avoid service disruptions, and, when issues do arise, expedite root cause analysis without missing something important?
Join us for our webinar Unlock the Intelligent Data Center with VMware & Zenoss, where we’ll show you an abundance of options for agentless network support, faster MTTR, and how to make your data center intelligent.
Prevent Hacking: 10 Steps to Secure your WordPress SiteDr. Rachna Jain
Why should you care to prevent hacking of your WordPress site? Because your website is the home of your online business- and when it gets hacked, it can be upsetting, frustrating, and feel violating, not to mention expensive in terms of lost business. Even if your site receives very few visitors, or you have set your site up for some private purpose- if it appears online, you need to take certain steps to prevent hacking.
Unfortunately, hacking is becoming increasingly common, as more and more websites are brought online and owned by businesses who do not understand how to keep them updated and secure.
There are 10 steps you can take, ahead of time, to prevent your website from being hacked.
CEO of Evident.io, Tim Prendergast, sharing insights into the powerful combination of Cloud Security and DevOps practices at Velocity Conference 2015 in Santa Clara, CA USA. Learn how agility, security, and automation can be combined to perform continuous security assessments, real-time automated defensive measures, and other exciting security capabilities!
The threat model for IoT devices is very different from the threat model for cloud applications. Customers must understand what these threats are, prioritize them effectively, and navigate the growing ecosystem of partners that give customers tools to build secure IoT solutions. We showcase how to leverage partner solutions to mitigate threats, explain how to avoid common pitfalls, and make it clear that all IoT solutions must incorporate end-to-end security from the start. We begin with the steps to take in the manufacturing process, how to provision and authenticate devices in the field, and we cover solutions that can help customers comply with IT requirements in the maintenance phase of the product lifecycle.
Introduction to the Security Perspective of the Cloud Adoption FrameworkAmazon Web Services
The Security Perspective of the AWS Cloud Adoption Framework (CAF) provides a framework for maturation via a structured program that incorporates best practices and processes to define, build, and optimize how you operate security controls in the AWS Cloud. The Security Perspective of the CAF provides a set of five core foundational themes designed to help you structure your selection and implementation of controls that are right for your business: AWS Identity and Access Management, detective controls, infrastructure security, data protection, and incident response. During this session, you will learn how to put the Security Perspective of the CAF into practice.
Speaker: Bill Reid - Sr. Manager, Solutions Architecture, AWS
The journey of cloud migration isn’t a straight and narrow path, and enterprise DevSecOps teams generally use a variety of tools to reach their goal. In this webinar, we will deep dive into SAP Concur’s journey, and how they are leveraging Contrast Security’s embedded application security model and AWS in tandem to “shift left”, create a seamless developer experience, and deliver secure application workloads on the cloud.
Join key executives from SAP Concur, AWS and Contrast Security as they discuss how to avoid the pitfalls and pioneer a secure cloud path to success.
In this webinar, you will learn:
The start: Why SAP Concur moved to AWS
The next step: Cloud enables increased velocity
The chutes and ladders: Security challenges with increased software velocity
The resolution: Design Architectures and Deployment Models between Contrast Security and AWS
The lessons learned: Continuous Improvement & Best Practices.
: FICO® Customer Communication Services (CCS) is an analytically powered cloud-based communication service that helps Financial Services organizations optimize the customer experience by providing important account alerts such as fraud detection, payment validations, loan application status, and renewal reminders. As described by VP Simon Woollett, while utilizing the AWS cloud brought numerous benefits to FICO® CSS, the platform’s security features have provided the assurance that all data (including credit card information) is protected, a sentiment that FICO® can confidently pass on to their customers.
: Grid Computing in the cloud is driven by numerous motivations – scalability, agility, security, price, enterprise data governance, just to name a few. The results are the ability to innovate faster and experiment with less risks and costs. AWS Financial Services Technology Leader Yinal Ozkan and Intel Sales Development Manager Steve Conn go through specific benefits grid computing in the cloud can bring to all organizations (particularly in Financial Services), share customer use cases, and discuss different computing consumption models.
Introduction to Serverless on AWS - Builders Day JerusalemAmazon Web Services
Serverless computing allows you to build and run applications without the need for provisioning or managing servers. With serverless computing, you can build web, mobile, and IoT backends; run stream processing or big data workloads; run chatbots, and more.
In this session, we will learn how to get started with serverless computing with AWS Lambda, which lets you run code without provisioning or managing servers.
Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018Amazon Web Services
Modernization involves implementing business processes and technology that provide your business applications with high availability, agility, and elasticity. Nowhere is this more important than in breaking apart the monolith. Modernizing an application as part of a migration can be extremely successful if you follow the AWS migration methodology of “discover, plan, migrate, and optimize” as you move that application to the cloud. In this session, we share what we learned from over 400 successful migrations. We also show you how to virtually break a monolith to a modernized architecture as part of the planning phase and accelerate your migration using container technologies and application discovery tools.
Building the Glue for Service Discovery & Load Balancing MicroservicesSargun Dhillon
One of the challenges that comes from deploying multi-tiered distributed systems, or microservices, atop a dynamic scheduler is the introduction of new problems surrounding load balancing. There are some inherent challenges in building a load balancer that's meant to operate in a highly available way, without any single points of failure. In this talk, Sargun Dhillon will walk through the distributed load balancing mechanism that he built for Mesos. This service discovery mechanism is meant to have the same kinds of features, api, and availability that existed in legacy, statically partitioned environments. The purpose of this is to ease the transition, and remove some of the largest road blocks in moving applications over to modern datacenters. In addition, he will speak to why he built it as opposed to other alternatives for service discovery and load balancing such as using Zookeeper, and the challenges that came from it. We built a library called Lashup that has a membership protocol, a multicast layer, failure detector, and CRDT key/value store. This has allowed us to build applications that orchestrate Mesos clusters with great ease.
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...Amazon Web Services
With Amazon EC2, Amazon EBS, Amazon S3, AWS KMS, and more, Intuit’s data platform was able meet the requirements of high availability and rapid infrastructure scaling for 100 percent of the tax year’s seasonal demands. In this session, Intuit answers questions such as: Which portions of a complex system can be forklifted directly? Which need to be reengineered? How can highly sensitive data be migrated and stored securely in AWS? Are operational best practices in AWS different than those on premises? Intuit shares its strategy for establishing sufficient confidence in your business partners and delivering 100 percent product uptime.
API Design Essentials - Akana Platform OverviewAkana
API Management has changed a lot in the past four years. It has gone from a toy prototype to a required foundational component in every enterprise architecture. Being foundational, an API management solution must address the needs of each role that takes part in an API’s success. The Akana Platform provides an end-to-end API Management solution. It enables each role with the tools needed for designing, implementing, securing, managing, monitoring, and publishing APIs in the cloud, hybrid, or on premises. This webinar we will provide a detailed look into Akana’s Platform API design capabilities with a live demo.
In this webinar, you will learn:
• What roles play a key part in an enterprise API management solution?
• Where does API Management fit within your enterprise architecture?
• What capabilities does the Akana Platform provide?
• Demo of how to design APIs in the Akana Platform
D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...Imperva Incapsula
Learn about the most important aspects of a Web Application Firewall your organization needs to have in place to protect against the most critical web application security risks. Plus, see how we’re evolving to ensure you’re protected against new attack campaigns.
Scott Helme, renowned security researcher and international speaker, shares his unique perspective on content security policy and how security has evolved.
Phil Williams, Principal Cloud Solutions Architect, explains how to evaluate your exposure to DDoS attack and how to best shape your defenses to budget requirements.
D3SF17- Using Incap Rules to Customize Your Security and Access ControlImperva Incapsula
IncapRules are an integral method to customize Incapsula for your specific applications and environment. However, we find that our enterprise clients may have questions on building advanced rules or need help understanding how to write them for complex scenarios. In this session, Peter Klimek, Principal Security Engineer, discusses the interface, some of the most common filters and actions, and how a large client collaborated with our security team to thwart credential stuffing on their client self-service portal.
D3SF17- Boost Your Website Performance with Application Delivery RulesImperva Incapsula
Incapsula introduced Application Delivery Rules (ADR) in October of 2016, but many clients have not tapped into their powerful abilities. In this session, Jeff Serota, Technical Account manager, provides an overview of ADR, discusses how they differ from IncapRules, and teaches you how to leverage them in your own Incapsula deployment.
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...Imperva Incapsula
It can be challenging for security teams to cut through the clutter of SIEM logs in order to analyze security information and alerts. In this session, Bryan Jones, Senior Security Engineer, walks you through the 5 major configuration steps needed to help you better manage security issues across your entire tech stack.
In this session, David Ting, VP of Engineering at DataVisor, explores the latency challenges associated with a global client base and what can be learned when implementing a performance-improving solution.
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons LearnedImperva Incapsula
Moving your critical applications from on-premises servers to the cloud can be a daunting prospect — but it doesn't need to be. Drawing on over 5 years of experience bringing some of the largest CMS sites on the Web into the cloud, Vasken Hauri, VP of Engineering at 10up, covers the key aspects you'll need to consider to ensure a smooth and successful migration. He also touches on some best practices you can apply post-migration to keep your sites secure, performant, and worry-free in an era where our toasters can launch DDoS attacks.
Keynote presentation by Dvir Shapira, Director of Product Management. Opening remarks include a look at where we’ve been in terms of the Internet as a whole and Internet security and performance, as well as where we’re going.
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...Imperva Incapsula
As more people shop online, it’s critical that your website meets—and even exceeds—their expectations. Online shoppers want sites that are easy to use and don’t waste their time.
According to a recent Imperva Incapsula survey, more than 60% of users said they wouldn’t wait more than five seconds for a site to load. And almost 70% said that poor website performance would cause them to leave a site and never return.
If you’re serious about reaping the benefits of the significant growth in online shopping, it’s time to get your web “house” in order. And a new free webinar from Imperva can help.
A secure web server isn’t really secure if the infrastructure supporting it remains vulnerable. Unless you implement infrastructure protection, your non-HTTP assets are vulnerable and you may not be as protected as you think you are.
You may be like others who need to get better DDoS protection but haven’t been able to or had to settle for an imperfect solution because of deployment limitations such as protocol dependencies and BGP restrictions. Incapsula IP Protection has now overcome these barriers — and we are the only service that can do it.
At this webinar our product experts will discuss how Incapsula customers are adopting IP Protection and bringing their DDoS protection to the next level. We’ll also have a discussion with Imperva CISO Shahar Ben-Hador who will share insights on how we use IP Protection and real-world lessons learned.
You need to protect more than just your web servers from DDoS attacks. We’ll address these questions:
Why do you need to protect more than just your web servers?
What were the limitations others ran into when they tried to do it?
How did Incapsula help them overcome the limitations?
...and much more!
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...Imperva Incapsula
DDoS attacks are bigger and more sophisticated than ever before. Odds are your business is going to be attacked – and without an effective mitigation strategy, you don't stand a chance.
In this webinar Andrew Shoemaker a DDoS simulation expert from NimbusDDOS gives you a rare glimpse into how hackers find the weak points in your defenses and exploit them to level devastating DDoS attacks. You'll see real world examples of the tactics and methods used to create tailored DDoS attacks that can bring down a targeted network or application, and learn how best to defend them.
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
By Nabeel Saeed
This presentation explores the current DDoS attack landscape, it covers the basics of DDoS attacks, current trends including the most recent results from the newly published 2015 Imperva Incapsula DDoS Report. It also discusses a detailed analysis of one of today’s modern, multi-vector DDoS attacks. While dissecting this DDoS attack, this presentation explores the anatomy and timeline of the attack, as well as the steps used to mitigate each phase of the assault. This session will close with a review of the aspects of effective DDoS protection solutions used to combat these sophisticated denial of service attacks.
Migrating from Akamai to Incapsula: What You Need to KnowImperva Incapsula
The webinar gives an overview of and compares the two platforms: Incapsula and Akamai. In addition to the benefits of migrating to Incapsula, it covers planning, transitioning, configuring Incapsula and lessons learned from the field.
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceImperva Incapsula
All too often, online threats such as DDoS attacks, scrapers, or traffic that consumes too much bandwidth are disrupting or slowing down SaaS websites. It is now more important than ever to keep website traffic flowing quickly without service interruptions.
Tempus Technologies’ president, Jason Sweitzer, talks about the technological challenges his company faced and the solutions his team adopted to increase website acceleration and uptime.
Join us for Incapsula’s free 30-minute webinar to learn how you can increase your website’s uptime and enhance its performance. We’ll be discussing opportunities SaaS companies can explore through WAF protection, frontend SSL, failover ISPs, and against DDoS attacks and using Incapsula solutions.
Is the Cloud Going to Kill Traditional Application Delivery?Imperva Incapsula
Application delivery controllers provide load balancing, acceleration, traffic shaping and other services that improve the performance, availability and security of web applications. But with more and more web application developers hosting their applications in the cloud, using application delivery hardware is often a non-starter.
This presentation discusses the architecture of a new type of service called the Application Delivery Cloud. This new cloud service not only offers critical performance, availability and security capabilities to web application vendors, it goes beyond its hardware analog to deliver new capabilities that today’s applications require, including regional content policies and up-to-the-minute security intelligence.
You’ve seen the headlines—"[Well-Known Company] Falls Victim To Hackers".
These data breaches result in the theft of millions of names, passwords, credit card numbers, and other personal data. Imagine if such a breach lead to the theft of your application's data. . .
If multi-national companies with dedicated security teams and expansive budgets aren’t immune to the impact of hackers, how can you adequately prepare yourself to defeat this threat?
This presentation will explore the web application threat landscape. It will zero in on some of the most common attacks wreaking havoc on the internet, teaching you how to defend your online assets from them.
This presentation will discuss:
• The major security breaches of 2014
• Web application threats and common attack types
• How to defend against today’s common attacks
• Automated tools to help simplify website security
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.