The document summarizes new developments in single sign-on (SSO) tools, including acquisitions and product launches. It reviews several SSO products and notes other vendors who declined participation. Five trends are highlighted: 1) growing use of multi-factor authentication, 2) increased integration with mobile device management, 3) cloud services dominance, 4) identity providers, and 5) proliferation of applications. The author provides contact information and links for additional information.
Slides from a webinar that I and Dell Virtualization Evangelist Hassan Fahimi gave in March 2016. We provide a complete overview of OpenStack and Foglight for OpenStack.
ArcBlock Presents 5 Winning Factors to Building a Successful DAppArcBlock
ArcBlock's Technical Learning Series presents part 2 of our Designing DApps series. This session is focused on the 5 winning factors for designing, building and launching a successful DApp.
https://www.arcblock.io
VDIworks Cloud Desktops Made Easy! (Introduction)Terell Jones
VDIworks Cloud Desktops Made Easy is an introduction to two exciting platforms to deliver virtual desktops either as hosted VDI, or Desktops as a Service (DaaS).
Kaseya Connect 2012 - Deploying Apps With Software Deployment And UpdateKaseya
Managing and deploying custom and 3rd party applications has never been easier. This technical session will review the various methods and best practices for configuring proper software deployment profiles through this powerful new integrated module.
Presented By: Kirk Feathers, Sr. Product Specialist, & Ben Lavalley, Sr. Product Marketing Manager & Thai N. Huynh and Kash'ka Fain, 501cTech
Dutch Microsoft & Security Meetup - How to protect my data in Office 365?Maarten Eekels
My slides for the presentation I did at the Dutch Microsoft & Security Meetup that took place on May 23rd, 2019. Topics include MFA, Conditional Access, Identity Protection, Privileged Identity Management, Unified Labelling, DLP.
Slides from a webinar that I and Dell Virtualization Evangelist Hassan Fahimi gave in March 2016. We provide a complete overview of OpenStack and Foglight for OpenStack.
ArcBlock Presents 5 Winning Factors to Building a Successful DAppArcBlock
ArcBlock's Technical Learning Series presents part 2 of our Designing DApps series. This session is focused on the 5 winning factors for designing, building and launching a successful DApp.
https://www.arcblock.io
VDIworks Cloud Desktops Made Easy! (Introduction)Terell Jones
VDIworks Cloud Desktops Made Easy is an introduction to two exciting platforms to deliver virtual desktops either as hosted VDI, or Desktops as a Service (DaaS).
Kaseya Connect 2012 - Deploying Apps With Software Deployment And UpdateKaseya
Managing and deploying custom and 3rd party applications has never been easier. This technical session will review the various methods and best practices for configuring proper software deployment profiles through this powerful new integrated module.
Presented By: Kirk Feathers, Sr. Product Specialist, & Ben Lavalley, Sr. Product Marketing Manager & Thai N. Huynh and Kash'ka Fain, 501cTech
Dutch Microsoft & Security Meetup - How to protect my data in Office 365?Maarten Eekels
My slides for the presentation I did at the Dutch Microsoft & Security Meetup that took place on May 23rd, 2019. Topics include MFA, Conditional Access, Identity Protection, Privileged Identity Management, Unified Labelling, DLP.
Cloud Security & Cloud Encryption Explained by Porticor the industry leader in Cloud Data Security. Learn from Porticor the issues for cloud security and how to protect your data in the cloud. Learn more about cloud security at http://www.porticor.com
Prevent Data Leakage Using Windows Information Protection (WIP)BeyondTrust
Catch the full presentation here: https://www.beyondtrust.com/resources/webinar/prevent-data-leakage-using-windows-information-protection-wip/
In this presentation from his webinar, security expert for Microsoft-based systems, Russell Smith examines how the Windows 10 Anniversary Update can be used to prevent data leaks--and without negatively impacting the user experience, on both personal and company-owned devices. Learn why Microsoft believes WIP offers a better solution than traditional DLP, what the requirements are for WIP, how to make it work for your enterprise, and how WIP can be used in conjunction with least privilege security,application whitelisting, and Azure Rights Management.
This presentation and the webinar covers:
What is Data Leakage Protection (DLP)?
WIP vs. DLP
WIP requirements
Implementing WIP in your environment
Using WIP as part of a defense-in-depth strategy
Tdswe 1810 learn how to create a secure and modern windows devicePer Larsen
Getting your corporate Windows devices enrolled as a standard user with a security baseline that you trust and customized for a better end user experience. Deploying Windows LOB application from different sources for both simple and complex scenarios.
https://tdswe.se/events/manage-your-windows-device-in-a-modern-way/
Title: Ansible - Save time with automation!
All of us know how painfull can be to manage IT infrastructure! In this session wee'll see what Ansible is and how it can help to simplify day to day operations, from the simplest to the most complex one.
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Proofpoint
Cloud-based file sharing and collaboration solutions are ripe for the picking, but what’s right for one organization might not be right for another. Accellion presented the pros and cons of various cloud computing choices at the InfoSec World 2013 Conference & Expo last month. To learn more about the top cloud considerations for file sharing and collaboration and to find out where you stand on the privacy and public cloud debate, check out this presentation entitled ”Do You Know Where Your Data Is?
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud CollaborationProofpoint
Rama Kolappan, Mobile Director with Accellion, recently addressed the topic of Enabling Secure and Mobile Cloud Collaboration at Secure Seattle 2013 . The 3 key messages to enterprises:
1) You are not alone; mobile productivity challenges face all types of organizations.
2) The BYOD trend can do more good than harm.
3) Sharing enterprise content securely in this era of the iPad is realistic and easier than you think.
The “Other” 5 Things You Need to Care About in Active DirectoryScriptLogic
The chances are that you spend your days working with just one aspect of Active Directory. There are another five areas that need your attention so that you can ensure that your Active Directory is working perfectly. Join us to learn about the other 5 areas of Active Directory management that you really should care about.
In this webinar, we will cover 6 areas of Active Directory management:
1. Auditing
2. Security
3. GPO's
4. Accounts
5. Recovery
6. Health
Join Concentrated Technology’s Greg Shields and ScriptLogic’s Nick Cavalancia as they compare free tips and tools for managing Active Directory to ScriptLogic’s Active Administrator solution.
What happens when a security researcher finds a hole in your code? Do have a clear policy to submit this kind of findings? Most not. Responsible Disclosure is something every company should manage, and Bug Bounties Programs help to improve the security as well as be in contact with the hacker community. During the talk we will see how a Responsible Disclosure Program or a BugBounty Program works, and how the company should focus and not forget about other mitigations and counter mesures related to security
There are numerous analytical techniques that can be used to examine Big Data sources. I describe several of the more popular ones in this talk for a Washington University roundtable discussion in July 2015
Social Media Research at Comms Service ProvidersDavid Strom
This is a presentation that Jeff Edlund at HP and I gave in Nov. 2011 at the SNCR annual conference, presenting some preliminary results about our research.
Cloud Security & Cloud Encryption Explained by Porticor the industry leader in Cloud Data Security. Learn from Porticor the issues for cloud security and how to protect your data in the cloud. Learn more about cloud security at http://www.porticor.com
Prevent Data Leakage Using Windows Information Protection (WIP)BeyondTrust
Catch the full presentation here: https://www.beyondtrust.com/resources/webinar/prevent-data-leakage-using-windows-information-protection-wip/
In this presentation from his webinar, security expert for Microsoft-based systems, Russell Smith examines how the Windows 10 Anniversary Update can be used to prevent data leaks--and without negatively impacting the user experience, on both personal and company-owned devices. Learn why Microsoft believes WIP offers a better solution than traditional DLP, what the requirements are for WIP, how to make it work for your enterprise, and how WIP can be used in conjunction with least privilege security,application whitelisting, and Azure Rights Management.
This presentation and the webinar covers:
What is Data Leakage Protection (DLP)?
WIP vs. DLP
WIP requirements
Implementing WIP in your environment
Using WIP as part of a defense-in-depth strategy
Tdswe 1810 learn how to create a secure and modern windows devicePer Larsen
Getting your corporate Windows devices enrolled as a standard user with a security baseline that you trust and customized for a better end user experience. Deploying Windows LOB application from different sources for both simple and complex scenarios.
https://tdswe.se/events/manage-your-windows-device-in-a-modern-way/
Title: Ansible - Save time with automation!
All of us know how painfull can be to manage IT infrastructure! In this session wee'll see what Ansible is and how it can help to simplify day to day operations, from the simplest to the most complex one.
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Proofpoint
Cloud-based file sharing and collaboration solutions are ripe for the picking, but what’s right for one organization might not be right for another. Accellion presented the pros and cons of various cloud computing choices at the InfoSec World 2013 Conference & Expo last month. To learn more about the top cloud considerations for file sharing and collaboration and to find out where you stand on the privacy and public cloud debate, check out this presentation entitled ”Do You Know Where Your Data Is?
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud CollaborationProofpoint
Rama Kolappan, Mobile Director with Accellion, recently addressed the topic of Enabling Secure and Mobile Cloud Collaboration at Secure Seattle 2013 . The 3 key messages to enterprises:
1) You are not alone; mobile productivity challenges face all types of organizations.
2) The BYOD trend can do more good than harm.
3) Sharing enterprise content securely in this era of the iPad is realistic and easier than you think.
The “Other” 5 Things You Need to Care About in Active DirectoryScriptLogic
The chances are that you spend your days working with just one aspect of Active Directory. There are another five areas that need your attention so that you can ensure that your Active Directory is working perfectly. Join us to learn about the other 5 areas of Active Directory management that you really should care about.
In this webinar, we will cover 6 areas of Active Directory management:
1. Auditing
2. Security
3. GPO's
4. Accounts
5. Recovery
6. Health
Join Concentrated Technology’s Greg Shields and ScriptLogic’s Nick Cavalancia as they compare free tips and tools for managing Active Directory to ScriptLogic’s Active Administrator solution.
What happens when a security researcher finds a hole in your code? Do have a clear policy to submit this kind of findings? Most not. Responsible Disclosure is something every company should manage, and Bug Bounties Programs help to improve the security as well as be in contact with the hacker community. During the talk we will see how a Responsible Disclosure Program or a BugBounty Program works, and how the company should focus and not forget about other mitigations and counter mesures related to security
There are numerous analytical techniques that can be used to examine Big Data sources. I describe several of the more popular ones in this talk for a Washington University roundtable discussion in July 2015
Social Media Research at Comms Service ProvidersDavid Strom
This is a presentation that Jeff Edlund at HP and I gave in Nov. 2011 at the SNCR annual conference, presenting some preliminary results about our research.
Listen to Your Customers: How IT Can Provide Better SupportDavid Strom
For a weibar sponsored by Citrix 11/15.
IT needs to provide the best possible support to its end users. Indeed, treating them as your customers is critical. We’ll cover some of the lessons learned from the best and worst customer-facing organizations to see how IT can make improvements in this area.
An IAM for Beginner's session presented by Dr. Matthias Tristl, ForgeRock Senior Instructor
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
DevSecOps is a recent offshoot of the DevOps movement, which doubles down on the importance of security. As security continues to be downplayed or ignored even as the threat landscape explodes, DevSecOps promotes a set of well-developed design principles and engineering patterns which involve security owners and product designers much earlier. DevSecOps lays out a robust and practical blueprint for building security features into the design process, leveraging new engineering tools and patterns and creating a secure, defensible software right from the start.
Join Chris Knotts, Innovation Product Director at Cprime, to:
- Learn how the concept of "shifting left" applies to application security and how to prioritize security requirements earlier in the design process
- Get an introduction to a few of the most effective engineering tools for implementing DevSecOps, including popular code scanners, dependency checkers, and free open-source products
- Understand how progress with DevSecOps depends on roles and stakeholders outside of just security staff
Understanding Zero Trust Security for IBM iPrecisely
As security threats continue to evolve and increase, companies need to also adapt their approach to IT security. One important concept that is gaining in popularity and adoption is zero trust security. The main concept behind the zero trust security model is "never trust, always verify,” which means that devices should not be trusted by default, even if they are connected to a permissioned network such as a corporate LAN and even if they were previously verified.
Zero Trust means moving beyond a perimeter security strategy. As companies offer customers and business partners new digital experiences and processes, networks can be local, in the cloud, or a combination or hybrid with resources anywhere as well as workers in any location. This dynamic is impacting IBM i customers and zero trust security is an important element of a modern security strategy.
Join us for this webcast to hear about:
• Understanding zero trust security concepts
• Zero trust security in the real world
• Zero trust security for IBM i environments
Securing and governing a multi-tenant data lake within the financial industryDataWorks Summit
Standard Bank South Africa is a Hortonworks client, with several multi-node clusters hosting Hortonworks Data Platform (HDP) and Hortonworks Data Flow (HDF). This presentation will discuss the technical detail of implementing security, governance and multi-tenancy on a "Data Lake" within the finance industry. The talk will address the team's experiences, challenges, failures and learnings that we took away from this behemoth of an adventure.
After introducing Standard Bank and the Hadoop admin team, the presentation will describe the security and governance journey Standard Bank has undergone since the project's inception in 2015, as well as the roadmap for the future ahead.
Presentation structure:
1. Team introduction with background information
2. Environment overview (Where we are - Current)
-----Security
---------Authentication through Kerberos and LDAP/ AD
---------Authorization through Ranger and Centrify
---------Transparent Data Encryption (TDE) at rest
-----Governance
---------Centralized auditing
---------Ranger policies and data steward ownership
-----Multi-Tenancy
---------Data lake Vs. data analytics platform
---------Edge nodes Vs. API framework through Knox
3. How did we get to this stage? (Past)
-----Challenges faced (Kerberos, AD integration, SSL)
-----How we overcame these challenges
4. Future challenges we foresee (Future)
-----How we are planning to prepare for them
Speakers
Ian Pillay, Hadoop Administrator, Standard Bank
Brad Smith, Hadoop Administrator, Standard Bank
Value proposition of SSI tech providers - Self-Sovereign IdentitySSIMeetup
Talk with Vladimir Vujovic, Senior Digital Innovation Manager from SICPA about product definition and value proposition of Issuer/Holder/Verifier software of SSI tech providers. Why is it hard to convey the right message to the audience coming from outside of SSI domain. How different SSI tech providers define their offering and the language they use to convey the message. What is really the value proposition of SSI tech providers who are offering their Issuer/Verifier software to the market. How big regulation initiatives like the one in Europe for eIDAS v2 are driving the market and roadmaps for SSI tech providers and how will such initiative will have impact to the rest of the world in terms of regulation, but some of the underlying technical standards. What is the place of SSI platforms in the broader Identity landscape and when are we going to see more maturity from the market.
Kabelo Sekele- Government in Transformation: Cloud Powered Security, Identity...itnewsafrica
Kabelo Sekele, Executive Director Strategy & New Business Development and Partnerships at Phakamo Tech delivered a presentation on Government in Transformation: Cloud Powered Security, Identity & Compliance at Public Sector Cybersecurity Summit 2023 on the 3rd of October 2023. #PublicSec2023 #Conference #Cybersecurity #PublicSector
Proven Practices for Office 365 Deployment, Security and ManagementPerficient, Inc.
Learn how the single sign-on and automated account provisioning for Office 365 can stop the cloud password sprawl, close security holes and free up IT time for new projects. This covers topics such as how to drive cloud app adoption, centralize, standardize and automate access, leverage active directory without the expense and risk of replicating it, and to ultimately simply your Office 365 deployment.
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Emrah Alpa, CISSP CEH CCSK
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Finance Industry. ArcSight, Fortify, Voltage, NetIQ, Data Discovery and File Analysis suites.
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
Key components of the Enterprise Mobility Suite are Azure AD Premium, Windows Intune and Azure Rights Management.
Learn from Peter De Tender, Microsoft Infrastructure Architect, MCT and MVP not only what the Microsoft Enterprise Mobility Suite is, but also how one can deploy it in an enterprise organization. By attending this session, you will gain the knowledge to optimize the adoption of IT, BYOD and SaaS as the core cloud solution components. Key concepts that will be covered are identity and access management, mobile device management and data protection.
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...Outpost24
In this webinar, our expert will discuss why CISOs must embrace unified cyber risk management for greater consolidation and simplification of business risk to build trust and maximize business resilience.
Security as an Enabler for the Digital World - CISO PerspectiveApigee | Google Cloud
A successful API strategy requires a strong partnership between the business, IT, and security functions. Rather than as a hindrance, security increasingly is viewed as a business enabler, with CISOs and CSOs playing a critical role in implementing “guardrails” for safe, secure and compliant API services and security architectures free of unnecessary complexity.
Ultimately, a secure API platform enables developers and DevOps to focus on innovation—by improving the mobile user experience and deploying apps in the cloud, with appropriate security controls built-in. In this webcast, Apigee’s Subra Kumaraswamy and Saba Software CSO Randy Barr will explore how CISOs and CSOs partner with IT and business leaders for a safe and secure journey to cloud, SaaS, and mobile services.
Join to learn about:
- The role of the security officer in helping IT and business meet objectives
- How smart and secure API guardrails remove friction in consuming APIs while protecting sensitive data exposed via APIs.
- Best practices that work for an API centric enterprise
Download podcast: http://bit.ly/1B6h3TR
"Running enterprise workloads with sensitive data in AWS is hard and requires an in-depth understanding about software-defined security risks. At re:Invent 2014, Intuit and AWS presented ""Enterprise Cloud Security via DevSecOps"" to help the community understand how to embrace AWS features and a software-defined security model. Since then, we've learned quite a bit more about running sensitive workloads in AWS.
We've evaluated new security features, worked with vendors, and generally explored how to develop security-as-code skills. Come join Intuit and AWS to learn about second-year lessons and see how DevSecOps is evolving. We've built skills in security engineering, compliance operations, security science, and security operations to secure AWS-hosted applications. We will share stories and insights about DevSecOps experiments, and show you how to crawl, walk, and then run into the world of DevSecOps."
We provide our clients with the ability to improve the productivity and competitiveness of their organization or business, through the implementation and customization of technological solutions and consulting services for the automation, interoperability, and alignment of their processes, data, applications, and infrastructure with organizational goals and objectives.
We have expertise in helping our retail business clients in domains like lifestyle, apparels, food & beverages, gift stores, electronics, hardware, footwear, books. We help clients in many ways like building brand value, SEO, AI, Analytics, suggestion which help consumers to shop using these sites and also increase the profit for our clients.
https://fewerclicks.in/
Security Essentials For Startups Taking Their First Steps As Cloud Providers.
This deck is based on the the below paper: https://chapters.cloudsecurityalliance.org/israel/papers/
Brian Kellner, Collective 2014 - Technology empowers the modern workforceSitrion
Success is the perfect combination of vision and technology. As the follow-on to Daniel’s opening conversation, Brian Kellner will walk us through Sitrion’s product strategy. Unveiling the new ways in which our platform will meet your business goals, this session will talk about the technology trends being seen in the industry and how Sitrion is addressing these requirements. Brian will explore our enterprise approach for both on-premise and cloud requirements with experience and access as the main drivers.
For any organization managed security services play an important role in enhancing the security posture, alerting against top vulnerabilities along with rapid and anywhere deployment.
Protecting your digital and online privacyDavid Strom
I gave this talk in October 2019 about ways that your digital and online habits can be tracked and what kind of data you inadvertently leak, along with tools that you can use to protect your privacy.
How to market your book in today's social media worldDavid Strom
Self-published authors need to learn how to use various digital tools to help them market their books. This seminar will show you some of the more common and inexpensive ones
This is a talk I gave in St. Louis in April 2018 about how businesses need to understand the Internet of Things and how they can better protect themselves.
How to make your mobile phone safe from hackersDavid Strom
While the news about laptop camera covers can make any of us paranoid, the real cyber threat comes from the computer we all carry in our pockets and purses: our mobile phones. I will describe some of the more dangerous cyber threats that can turn your phone into a recording device and launch pad for hackers, and how you can try to prevent these in your daily life.
Security disasters can emanate from many places but often the main contributor is the disconnect that exists between CIO’s (and executives in general) and the technical staff. This disconnect can give life to the scariest undead creature in the business world: <b>the bad idea zombie.
Navigating the PCI Self-Assessment questionaireDavid Strom
This questionnaire was created for smaller merchants who are not required to comply through an on-site data security assessment with a Qualified Security Assessor
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
3. Agenda
• What’s new in the SSO world
• 5 megatrends in SSO
• How the various products stack up
4. Products reviewed
• Centrify’s Identity Service (and AVG SSO)
• Microsoft’s Azure AD Premium
• Okta’s Identity and Mobility Management
• OneLogin
• Ping Identity’s Ping One
• Secure Auth’s IdP
• SmartSignin
5. Lots of other SSO tools
• NetIQ, WSO2, Covisint, CA, Janrain, RSA,
Radiant Logic, SalesForce and Sailpoint all
turned me down for my review. Boo!
• Allidm, Atricore, JoshuaTree, nLight, OpenIAM,
OpenIDM, OpenRegistry, OSIAM and Soffid
are all open source tools
• Bitium.com
6. What is new
• RSA has purchased Symplified
• SmartSignIn was acquired by PerfectCloud
• LogMeIn Meldium
• Salesforce identity management service
• Intel/McAfee bundles Cloud Identity Manager
with Web Gateway
29. Questions?
• Copies of this presentation:
http://slideshare.net/davidstrom
• My blog: http://strominator.com
• Follow me on Twitter: @dstrom
• Old school: david@strom.com
http://strominator.com 29
Editor's Notes
The single sign on field has widened its reach in terms of overall functionality and integration across the enterprise network. There are support for additional authentication factors, major integration points with mobile device managers and identity providers, and cloud-based solutions. I review 7 different tools and talk about which are more appropriate for particular situations.
My name is David Strom and I have been covering enterprise technology for more than 25 years, starting out in IT and end user computing back in the early 1980s when PCs were first coming into companies. I then moved into tech journalism and you can see here some of the places that I have written for including the New York Times and various TechTarget properties. I have also written two books on computer networking and built dozens of technical websites as well.
products have expanded their support for additional authentication factors. Back three years ago, one additional factor was about what you could expect. Now, all of the products have solid multifactor authentication (MFA) protection with some such as Okta and Centrify creating their own one-time password mobile apps
few products are moving towards integrating mobile device management (MDM) as part of their identity service offerings. Gartner sees a bright future when the two types of products can be better integrated, and we agree. While not yet as capable as a true MDM tool such as VMware’s AirWatch or Citrix’ Xen Mobile, these SSO tools such as Okta, Ping and Centrify have a better mobile focus and could be a good choice if you want to protect your mobile endpoints with more than just their login passwords but don’t want to purchase a separate MDM solution.
are focused on their cloud-based solutions. The cloud vendors typically supply two URLs: one for users for a common login to their apps, and another one for IT administrators for management tasks. This means these have only a small footprint for their on-premises software, mostly for handling Active Directory synchronization and browser extensions. This can be a challenge for a multi-tenant environment such as a reseller or an MSP offers: fortunately, Ping and AVG have MSP versions so they can provision multiple end user customers quickly and more capably.
products have deepened their support for multiple identity management providers. Products have gotten more serious about publishing their own identity APIs and SDKs. That along with the ability to reach into the Active Directory schema means that it is now easier to automatically provision hundreds of users at once with very little operator intervention. This makes SSO tools useful if you have to onboard a lot of staff quickly, such as for an incoming college class or if you are merging with another corporation and want their employees to have access to your corporate applications infrastructure, or where you intend to federate your identity access.
almost all of the products now support thousands of applications for their automated sign-on routines can some come with catalogs that you can browse to find your particular apps. Overall the products are getting easier to install and integrate into your existing collection of apps and servers. While the vast majority of these apps are just stored username/password pairs, this still demonstrates that vendors have gotten better at making their tools much more capable and applicable in a greater number of situations.
Microsoft’s Azure Active Directory supports more than 1500 SaaS-based apps for its SSO.
Centrify has a nice summary map that shows you where your devices are located.
On the left you see some of the MDM settings which is as capable as a full-blown MDM product.
On the right is the properties sheet for how you configure its AD connector, which is where Centrify had its origins.Centrify has been around the AD space for several years and its integration is fairly seamless. Once you download the connector and install it on your Windows Server, there isn’t much to do. You can set up an active/active redundant support for a second AD server by just installing a second or third connector: these take care of doing the load balancing of AD authentication requests and automatically failover if there is some connection issue. It supports Windows Servers since the 64-bit 2003 vintage. It also supports Integrated Windows Authentications so you can sign into your local Windows desktops and apps.
Okta supports MFA on an individual app level. Over the past several years, Okta has beefed up its MFA functionality. It now offers a mobile app, Okta Verify, as a one-time password generator. It also supports other MFA methods, including Google Authenticator, SMS texts, Symantec VIP, RSA SecurID and Duo Security tokens, along with choosing from a list of security Q&A. MFA credentials can be demanded every time, or periodically or for specific groups. They also can be set up to protect particular apps.
Speaking of mobile apps, Okta has its own mobile app that can provide a secure browsing session and allow you to sign in to your apps from your phone, just as you would do from your desktop. It contains some MDM functionality, although it is not as capable as a full MDM tool such as an AirWatch.
There are now 11 preset report types, including showing unused applications. That can come in handy when it is time to renegotiate your software licenses.
OneLogin’s MFA policy page has several options and supports a variety of one time password techniques.
OneLogin was the other co-winner of my2012 review and while it is still strong, its user interface has become a bit unwieldy and it has fallen in terms of our overall score.
free forever” trial account that doesn’t include MFA and other advanced features but might be useful to try it out. Impressively, this includes unlimited users and up to 8 protected apps.
For Okta’s AD import you’ll need to download and install its AD Domain Agent to your Windows Server 2003 R2 or later. It took a call to their tech support to activate this agent. Once you connect to a local AD domain, you next import and assign users. The process is a bit more involved than Centrify.
. There are several different editions, beginning at $2/user/month. The enterprise version, which includes MFA and user provisioning, costs $8/user/month. This includes basic support: premium 24x7 support is extra. MDM features adds an additional $4/user/month.
Onelogin supports a variety of applications, here is a quick search of the various Google Apps and how they connect to each one
OneLogin also has numerous SAML toolkits in a variety of languages such as .Net, Java and Ruby to make it easier to integrate your apps into its SSO routines. If you have homegrown apps and you want to make use of this protocol, this is reason enough to consider them on your short list.
Ping has been in the identity management space for many years and has some of the largest customers around the world, including doing Walmart’s SSO. When they began they were mostly an on-premises solution with their PingFederate product but recently they have focused on the cloud and offer a series of related products including their cloud-based PingOne, their web access tool PingAccess and their OTP soft token generator PingID. They also have a mobile app where you can access your portal page too. While that is a lot of different software bits to keep track of, it is how they can be flexible in supporting lots of different circumstances. Ping would be a stronger product if they would consolidate some of their various features and focus on the cloud as a primary delivery vehicle. If that isn’t important to you, or if you have complex federation needs, then you should give them more consideration and you will probably end up with using their on-premises Ping Federate.
Ping provides these instructions on how to integrate a typical app with its SSO routines.
Pricing starts at $2 per user per month for PingOne.
PingOne supports four identity providers: their own through either their Ping Federate or PingOne, Google’s OpenID using OAuth, AD through its own connector, or a third-party SAML connector. The AD connector needs .Net Framework v4 to work.
Out of all the products Itested, SecureAuth has the most flexibility and the worst user interface, a combination that can be vexing at times. It is easy to get lost in its series of cascading menus, and while it still remains a very capable product, the others have passed it by in terms of ease of configuration.
The real strength of SecureAuth always has been with its various post-authentication workflow activities. There is a large list of actions that can happen after your users authenticate themselves, and it has gotten larger since we last looked at them. For example, you can bring a user to an app store catalog or have them check a near field communications tag, launch a mobile app or take them directly inside IBM’s Websphere. There are dozens more choices, and this is all under another tab with that name.
SecureAuth charges for its server and then separately for its users. A sample 100-user configuration would cost $5940 the first year.
Secure Auth has this really nice risk based authentication
SmartSignIn now support seven different identity providers (including Amazon, Netsuite and AD) with several more on the horizon and more than 7,000 app integrations.
Their user management screen shows you how easy it is to add users and apps to the SSO routine.
When it comes to MFA support SmartSignin is the weakest of the set of products we reviewed, which is ironic because they pioneered having a second passphrase back in 2012 and still make use of it to login to their SSO portal.
They have three pricing plans that you can get details online: free for individuals, a $6 per user per month business plan and an $8 per user per month for enterprise. You can sign up for any of these for free for 15 days.
SmartSign app provisioning screen
Pricing assumes an annual contract, and some of the tools charge extra for MDM or for MFA access
http://www.networkworld.com/article/2933387/access-control/review-single-sign-on-tools-offer-impressive-new-capabilities.html
Ran in Network World 6/15
Thanks everyone for listening to me and good luck with your own Big Data explorations.