Learning Objectives:
- Using the new AWS Shield Advanced for EC2 to protect your internet-facing game servers
- How to build an architecture best suited for your title
- Best Practices Checklist for your new release
How to Easily and Securely Connect Devices to AWS IoT - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Understand the features of AWS IoT and how to use them
- Articulate architectures for IoT applications across commercial, consumer, and industrial use cases
- Hints and tips for keeping devices secure
Learning Objectives:
- Deep dive on Lambda@Edge and the most recent developments
- Learn how to run your Lambda functions at multiple locations closer to the end viewer
- Learn how it can apply to your web development use cases
The document discusses cloud-native DDoS attack mitigation strategies on AWS. It outlines three pillars of protection: built-in protection for all AWS customers against common network and transport layer attacks, optional advanced DDoS protection with AWS Shield Advanced, and tools like AWS WAF and VPC for customized application-layer protections. True stories are presented showing how AWS services like CloudFront and Shield helped customers migrate mitigation from on-premises to the cloud and defend against large sophisticated attacks.
In this session, we provide an overview of how AWS thinks about threat detection and remediation. We summarize the challenges of traditional threat detection efforts and explain how AWS helps address these challenges. We also provide an overview of key AWS services that can be used to detect and remediate threats to AWS. Finally, we conclude with examples of threat detection and remediation on AWS and an provide an opportunity for key service demos.
ENT201 Simplifying Microsoft Architectures with AWS ServicesAmazon Web Services
Learn how to architect fully available and scalable Microsoft solutions and environments in AWS. Find out how Microsoft solutions can leverage various AWS services to achieve more resiliency, replace unnecessary complexity, simplify architecture, provide scalability, and introduce DevOps concepts, such as compliance, governance, automation, and repeatability. Also, plan authentication and authorization, and explore various hybrid scenarios with other cloud environment and on-premises solutions or infrastructure. Learn about common architecture patterns for network design, Microsoft Active Directory, and business productivity solutions like Dynamics AX, CRM, and Microsoft SharePoint, also common scenarios for custom .NET, .NET Core with Microsoft SQL deployments and migrations.
DEM09 [Repeat] Fearless: From Monolith to Serverless with DynatraceAmazon Web Services
Dynatrace is a monitoring platform that can help companies migrate from monolithic architectures to microservices and serverless architectures. It uses AI to automatically map dependencies, detect where to split up monoliths, validate performance and scalability at each step, and provide automated root cause analysis. Dynatrace monitoring and APIs help optimize architectures, automate deployments, and enable self-healing throughout the migration process.
The General Data Protection Regulation (GDPR) takes effect May 25, 2018. Complying with GDPR can be challenging, but AWS can guide you through the process. In this session we explain the automation mechanisms AWS offers its customers to help with their compliance programs. Specific GDPR articles are matched to tooling, so knowledge of both is helpful in understanding the material.
The document discusses DevSecOps, which expands the DevOps collaboration between development and operations to include security automation. It describes how DevSecOps aims to have security that meets the pace of innovation, works at scale in scalable infrastructure, and is less friction. The document outlines how to implement DevSecOps through automation, making security everyone's responsibility. It provides examples of DevSecOps pipelines and common use cases like AWS landing zones and CI/CD pipelines. A demo scenario shows how infrastructure code is deployed through a DevSecOps pipeline that includes security validation checks. Monitoring tools like CloudTrail, AWS Config, and CloudWatch are discussed for providing visibility into security.
How to Easily and Securely Connect Devices to AWS IoT - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Understand the features of AWS IoT and how to use them
- Articulate architectures for IoT applications across commercial, consumer, and industrial use cases
- Hints and tips for keeping devices secure
Learning Objectives:
- Deep dive on Lambda@Edge and the most recent developments
- Learn how to run your Lambda functions at multiple locations closer to the end viewer
- Learn how it can apply to your web development use cases
The document discusses cloud-native DDoS attack mitigation strategies on AWS. It outlines three pillars of protection: built-in protection for all AWS customers against common network and transport layer attacks, optional advanced DDoS protection with AWS Shield Advanced, and tools like AWS WAF and VPC for customized application-layer protections. True stories are presented showing how AWS services like CloudFront and Shield helped customers migrate mitigation from on-premises to the cloud and defend against large sophisticated attacks.
In this session, we provide an overview of how AWS thinks about threat detection and remediation. We summarize the challenges of traditional threat detection efforts and explain how AWS helps address these challenges. We also provide an overview of key AWS services that can be used to detect and remediate threats to AWS. Finally, we conclude with examples of threat detection and remediation on AWS and an provide an opportunity for key service demos.
ENT201 Simplifying Microsoft Architectures with AWS ServicesAmazon Web Services
Learn how to architect fully available and scalable Microsoft solutions and environments in AWS. Find out how Microsoft solutions can leverage various AWS services to achieve more resiliency, replace unnecessary complexity, simplify architecture, provide scalability, and introduce DevOps concepts, such as compliance, governance, automation, and repeatability. Also, plan authentication and authorization, and explore various hybrid scenarios with other cloud environment and on-premises solutions or infrastructure. Learn about common architecture patterns for network design, Microsoft Active Directory, and business productivity solutions like Dynamics AX, CRM, and Microsoft SharePoint, also common scenarios for custom .NET, .NET Core with Microsoft SQL deployments and migrations.
DEM09 [Repeat] Fearless: From Monolith to Serverless with DynatraceAmazon Web Services
Dynatrace is a monitoring platform that can help companies migrate from monolithic architectures to microservices and serverless architectures. It uses AI to automatically map dependencies, detect where to split up monoliths, validate performance and scalability at each step, and provide automated root cause analysis. Dynatrace monitoring and APIs help optimize architectures, automate deployments, and enable self-healing throughout the migration process.
The General Data Protection Regulation (GDPR) takes effect May 25, 2018. Complying with GDPR can be challenging, but AWS can guide you through the process. In this session we explain the automation mechanisms AWS offers its customers to help with their compliance programs. Specific GDPR articles are matched to tooling, so knowledge of both is helpful in understanding the material.
The document discusses DevSecOps, which expands the DevOps collaboration between development and operations to include security automation. It describes how DevSecOps aims to have security that meets the pace of innovation, works at scale in scalable infrastructure, and is less friction. The document outlines how to implement DevSecOps through automation, making security everyone's responsibility. It provides examples of DevSecOps pipelines and common use cases like AWS landing zones and CI/CD pipelines. A demo scenario shows how infrastructure code is deployed through a DevSecOps pipeline that includes security validation checks. Monitoring tools like CloudTrail, AWS Config, and CloudWatch are discussed for providing visibility into security.
In this workshop, you learn how to use AWS IoT on the cloud and at the edge with AWS Greengrass. We show you how to connect devices to AWS IoT and AWS Greengrass; we discuss the the architecture, and you have the opportunity to install and configure device communication using AWS Greengrass. In addition, you create various device communication scenarios with AWS Greengrass and simulate the data flow with sensor data. Attendees in workshop need an AWS account and are asked to bring their laptop.
Demandbase cut its container costs by 79% by using Spotinst to manage its EC2 Spot Instances. Spotinst uses predictive analytics and machine learning to identify Spot Instances at risk of interruption and seamlessly moves workloads to prevent downtime. Demandbase was able to scale its workloads without increasing costs and move test environments to SpotInstances that were previously not possible due to interruptions. They now use SpotInstances for production and achieved dramatic cost savings by integrating Spotinst with their Rancher environments.
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...Amazon Web Services
This document discusses using AWS services for ingesting, storing, sharing, and analyzing video content. It describes how to stream live video from millions of devices using Amazon Kinesis Video Streams and then analyze the video using Amazon Rekognition. It also provides an example of building a system to detect faces on video streams from cameras using DeepLens and storing the results in databases like DynamoDB for further processing.
Microservices are a great way to segment your application into well-defined, self-contained units of functionality. Come join us in this chalk talk as we discuss two common architectures for deploying microservices: containers and serverless.
Speaker: Rajanikanth Bhargava Chilakapati - Solutions Architect, AWS
How to Bring Microsoft Apps to AWS - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Learn how AWS can help you to improve performance, increase availability, and improve the security posture for your Microsoft workloads
- Learn best practices to ensure maximum performance and availability for your Microsoft workloads while migrating to the AWS Cloud
- Learn about Microsoft on AWS Licensing Options
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...Amazon Web Services
Enterprises increasingly segregate workloads (or teams) into multiple AWS accounts as a best practice for security and billing purposes. Some enterprises even have healthy security budgets largely driven by legal requirements. But, what do you do if you don't have a regulatory imperative and the budget that comes with it? This session discusses Turner's journey from a handful of accounts to a secure, multi-account AWS environment. We discuss how we automate and audit across a global organization using almost exclusively native AWS tools.
This document discusses enterprise applications on AWS. It covers using AWS to extend on-premises data centers, connecting to AWS, backup and archiving data on AWS, disaster recovery strategies, and using AWS for development and testing. It also discusses running key enterprise workloads like Oracle, SAP, and Microsoft on AWS.
Hybrid Cloud Storage: Why HUSCO International Left Traditional Storage BehindAmazon Web Services
When CIO Eric Hanson joined HUSCO International’s leadership team, he quickly set about identifying opportunities for his organization to reduce storage costs and improve performance. Using his previous experience at a multi-location manufacturing firm, he determined that HUSCO International’s challenges with file latency, increasing storage costs, and inability to collaborate cross-site could be solved by transitioning from traditional storage using NetApp filers to a consolidated cloud infrastructure powered by Panzura and Amazon S3.
Register for our upcoming webinar to learn how HUSCO International is using Panzura and Amazon S3 to take advantage of cloud storage economics that has the potential to save the company hundreds of thousands of dollars annually.
This document provides an overview and summary of AWS storage services that can be used for migrating data to AWS. It discusses AWS Snowball and Snowmobile appliances that can physically move large amounts of data to AWS storage services like S3. It also describes the AWS Storage Gateway, which allows on-premises applications to access AWS storage using standard storage protocols. Additional services covered include Amazon Kinesis Firehose for loading streaming data, AWS Direct Connect for private connectivity, and AWS Migration Hub and Application Discovery Service for discovery and tracking of servers and databases during migration.
Building an Immersive VR Streaming Solution on AWS - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Understand key EC2 Spot Instances concepts and common usage patterns for maximum scale and cost optimization in the cloud
- Leverage lower compute costs to better compete on price and, as a result, winning more business
- Leverage the full scale of the AWS cloud for faster results
The document discusses automated response to distributed denial-of-service (DDoS) and web application firewall (WAF) attacks in AWS. It describes AWS Shield for automatic protection against common network and transport layer DDoS attacks, AWS WAF for filtering web traffic and blocking malicious requests, and AWS Firewall Manager for centrally managing WAF rules across multiple accounts at scale. Demos show setting up Shield Advanced monitoring and mitigating a UDP flood attack, using WAF to quickly deploy a patch for a vulnerability, and Firewall Manager automating compliance of new accounts.
The session covers how Cisco SD-WAN can be used to extend the WAN connectivity to AWS. We show how the Viptela-based SD-WAN solution accelerates the path to cloud migration while maintaining the application SLA using the policy-based app fabric model. We cover Viptela's cloud-first network management, orchestration, and overlay technologies with industry-leading routing platforms, services, and SD-WAN capabilities from Cisco. We also cover how a customer deployed Cisco SD-WAN and the benefits they achieved, how a customer extended Cisco SD-WAN fabric to AWS, and the benefits of consistent security and segmentation, policy, network visibility, and connectivity options across branch, campus, data center, and cloud. This session is brought to you by AWS Partner, Cisco.
ENT307 Move your Desktops and Apps to AWS with Amazon WorkSpaces and AppStre...Amazon Web Services
The document discusses modernizing desktop and application delivery with AWS. It provides an overview of Amazon WorkSpaces and Amazon AppStream 2.0 for providing virtual cloud desktops and streaming applications. It discusses how these services can help address issues with traditional desktops and VDI like management overhead, security, and flexibility. Examples are given of how various organizations have used these services to support remote workers, mobility, and security.
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...Amazon Web Services
A key component of Cisco hybrid cloud portfolio is Cloud Connect. In this session, we review how Cloud Connect solutions can securely extend your private networks into the AWS Cloud and ensure the application experience. The products we cover include the CSR1000v and vEdge with Umbrella integration. This session is brought to you by AWS Partner, Cisco.
Replicate and Manage Data Using Managed Databases and Serverless Technologies Amazon Web Services
If you have disparate datasets within your data center and on AWS, it can be challenging to manage all of them while you extract and analyze data. In this workshop, we use AWS managed database services, migration tools, and serverless technologies to replicate data and manage it in the cloud. We replicate an on-premises database to Amazon Aurora using AWS Database Migration Service, and we show you how Aurora Serverless can automatically scale your database and reduce your database costs. Ensure that you have an AWS account, and familiarize yourself with the AWS Management Console at least a day before the workshop. You don't need any credit on the account.
In this session, we review how the combined use of Amazon Web Services native tools, advanced modeling, and machine learning techniques can simplify many of the hardest security problems that are within the customer’s responsibility. Join us as we explore how services like Amazon Virtual Private Cloud flow logs, AWS CloudTrail, and Amazon Inspector combine to enable highly automated, scalable, and comprehensive security for your AWS applications. Learn how to effectively harness the data provided by AWS for security, and understand how Cisco Stealthwatch Cloud and AWS create an integrated, effective security solution.
With VMware Cloud on AWS, not only can you consume VMware products on AWS, but you can also use AWS native services from virtual machines running within VMware Cloud on AWS. Come learn about our latest features and how you can take advantage of the best of both VMware and AWS for your environment. This session is brought to you by AWS Partner, VMware.
In this workshop, we explore features and functions of the AWS IoT service. We start out by covering the AWS ecosystem as it relates to IoT. Next, we cover the AWS IoT service in greater detail, review some best practices for IoT solutions, and look at some common architectural patterns. With this foundation in place, we explore the AWS IoT service hands on with an IoT device and accompanying lab exercises. To get the most out of this workshop you need to have an AWS account created before the workshop begins. You should also bring a laptop so you can connect to the IoT device and perform the workshop lab exercises.
In this popular session, discover how Amazon EBS can take your application deployments on Amazon EC2 to the next level. Learn about Amazon EBS features and benefits, how to identify applications that are appropriate for use with Amazon EBS, best practices, and details about its performance and volume types. The target audience is storage administrators, application developers, applications owners, and anyone who wants to understand how to optimize performance for Amazon EC2 using the power of Amazon EBS.
IoT Building Blocks_ From Edge Devices to Analytics in the Cloud Amazon Web Services
In this session, we explore features and functions of AWS IoT services. We first cover AWS IoT fundamentals and our partner ecosystem. Then we discuss AWS IoT services in greater detail, review best practices for IoT solutions, and look at some common architectural patterns. With this foundation in place, we explore a use case for IoT applications. Leave this session with an understanding of how to start building IoT applications with AWS IoT.
Edge immersion days module 2 - protect your application at the edge using a...RoiElbaz1
The document discusses Amazon Web Services' (AWS) cloud-native protections against distributed denial-of-service (DDoS) attacks and web application threats. It describes AWS WAF for inspecting and mitigating layer 7 attacks, AWS Shield Standard for automatic protection against common network attacks, and AWS Shield Advanced for additional detection and monitoring capabilities. The document also provides an overview of DDoS trends, the benefits of a cloud-native defense approach, and example customer implementations of AWS WAF and Shield services.
Automating DDos and WAF responses - AWS Summit Cape Town 2018Amazon Web Services
Speaker: Andrew Kane, AWS
Level: 300/400
Security professionals and full-stack engineers will learn how to defend against distributed denial of service (DDoS) attacks and web application exploits by using automation to monitor activity, configure rate limiting, and deploy network filtering rules. You will become an expert in advanced techniques to help you protect and monitor your AWS networks and resources using services such as AWS Web Application Firewall, AWS Shield, AWS CloudWatch, and more. You will also learn how to use Lambda functions to automate event response and integrate with your security operations tools.
In this workshop, you learn how to use AWS IoT on the cloud and at the edge with AWS Greengrass. We show you how to connect devices to AWS IoT and AWS Greengrass; we discuss the the architecture, and you have the opportunity to install and configure device communication using AWS Greengrass. In addition, you create various device communication scenarios with AWS Greengrass and simulate the data flow with sensor data. Attendees in workshop need an AWS account and are asked to bring their laptop.
Demandbase cut its container costs by 79% by using Spotinst to manage its EC2 Spot Instances. Spotinst uses predictive analytics and machine learning to identify Spot Instances at risk of interruption and seamlessly moves workloads to prevent downtime. Demandbase was able to scale its workloads without increasing costs and move test environments to SpotInstances that were previously not possible due to interruptions. They now use SpotInstances for production and achieved dramatic cost savings by integrating Spotinst with their Rancher environments.
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...Amazon Web Services
This document discusses using AWS services for ingesting, storing, sharing, and analyzing video content. It describes how to stream live video from millions of devices using Amazon Kinesis Video Streams and then analyze the video using Amazon Rekognition. It also provides an example of building a system to detect faces on video streams from cameras using DeepLens and storing the results in databases like DynamoDB for further processing.
Microservices are a great way to segment your application into well-defined, self-contained units of functionality. Come join us in this chalk talk as we discuss two common architectures for deploying microservices: containers and serverless.
Speaker: Rajanikanth Bhargava Chilakapati - Solutions Architect, AWS
How to Bring Microsoft Apps to AWS - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Learn how AWS can help you to improve performance, increase availability, and improve the security posture for your Microsoft workloads
- Learn best practices to ensure maximum performance and availability for your Microsoft workloads while migrating to the AWS Cloud
- Learn about Microsoft on AWS Licensing Options
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...Amazon Web Services
Enterprises increasingly segregate workloads (or teams) into multiple AWS accounts as a best practice for security and billing purposes. Some enterprises even have healthy security budgets largely driven by legal requirements. But, what do you do if you don't have a regulatory imperative and the budget that comes with it? This session discusses Turner's journey from a handful of accounts to a secure, multi-account AWS environment. We discuss how we automate and audit across a global organization using almost exclusively native AWS tools.
This document discusses enterprise applications on AWS. It covers using AWS to extend on-premises data centers, connecting to AWS, backup and archiving data on AWS, disaster recovery strategies, and using AWS for development and testing. It also discusses running key enterprise workloads like Oracle, SAP, and Microsoft on AWS.
Hybrid Cloud Storage: Why HUSCO International Left Traditional Storage BehindAmazon Web Services
When CIO Eric Hanson joined HUSCO International’s leadership team, he quickly set about identifying opportunities for his organization to reduce storage costs and improve performance. Using his previous experience at a multi-location manufacturing firm, he determined that HUSCO International’s challenges with file latency, increasing storage costs, and inability to collaborate cross-site could be solved by transitioning from traditional storage using NetApp filers to a consolidated cloud infrastructure powered by Panzura and Amazon S3.
Register for our upcoming webinar to learn how HUSCO International is using Panzura and Amazon S3 to take advantage of cloud storage economics that has the potential to save the company hundreds of thousands of dollars annually.
This document provides an overview and summary of AWS storage services that can be used for migrating data to AWS. It discusses AWS Snowball and Snowmobile appliances that can physically move large amounts of data to AWS storage services like S3. It also describes the AWS Storage Gateway, which allows on-premises applications to access AWS storage using standard storage protocols. Additional services covered include Amazon Kinesis Firehose for loading streaming data, AWS Direct Connect for private connectivity, and AWS Migration Hub and Application Discovery Service for discovery and tracking of servers and databases during migration.
Building an Immersive VR Streaming Solution on AWS - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Understand key EC2 Spot Instances concepts and common usage patterns for maximum scale and cost optimization in the cloud
- Leverage lower compute costs to better compete on price and, as a result, winning more business
- Leverage the full scale of the AWS cloud for faster results
The document discusses automated response to distributed denial-of-service (DDoS) and web application firewall (WAF) attacks in AWS. It describes AWS Shield for automatic protection against common network and transport layer DDoS attacks, AWS WAF for filtering web traffic and blocking malicious requests, and AWS Firewall Manager for centrally managing WAF rules across multiple accounts at scale. Demos show setting up Shield Advanced monitoring and mitigating a UDP flood attack, using WAF to quickly deploy a patch for a vulnerability, and Firewall Manager automating compliance of new accounts.
The session covers how Cisco SD-WAN can be used to extend the WAN connectivity to AWS. We show how the Viptela-based SD-WAN solution accelerates the path to cloud migration while maintaining the application SLA using the policy-based app fabric model. We cover Viptela's cloud-first network management, orchestration, and overlay technologies with industry-leading routing platforms, services, and SD-WAN capabilities from Cisco. We also cover how a customer deployed Cisco SD-WAN and the benefits they achieved, how a customer extended Cisco SD-WAN fabric to AWS, and the benefits of consistent security and segmentation, policy, network visibility, and connectivity options across branch, campus, data center, and cloud. This session is brought to you by AWS Partner, Cisco.
ENT307 Move your Desktops and Apps to AWS with Amazon WorkSpaces and AppStre...Amazon Web Services
The document discusses modernizing desktop and application delivery with AWS. It provides an overview of Amazon WorkSpaces and Amazon AppStream 2.0 for providing virtual cloud desktops and streaming applications. It discusses how these services can help address issues with traditional desktops and VDI like management overhead, security, and flexibility. Examples are given of how various organizations have used these services to support remote workers, mobility, and security.
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...Amazon Web Services
A key component of Cisco hybrid cloud portfolio is Cloud Connect. In this session, we review how Cloud Connect solutions can securely extend your private networks into the AWS Cloud and ensure the application experience. The products we cover include the CSR1000v and vEdge with Umbrella integration. This session is brought to you by AWS Partner, Cisco.
Replicate and Manage Data Using Managed Databases and Serverless Technologies Amazon Web Services
If you have disparate datasets within your data center and on AWS, it can be challenging to manage all of them while you extract and analyze data. In this workshop, we use AWS managed database services, migration tools, and serverless technologies to replicate data and manage it in the cloud. We replicate an on-premises database to Amazon Aurora using AWS Database Migration Service, and we show you how Aurora Serverless can automatically scale your database and reduce your database costs. Ensure that you have an AWS account, and familiarize yourself with the AWS Management Console at least a day before the workshop. You don't need any credit on the account.
In this session, we review how the combined use of Amazon Web Services native tools, advanced modeling, and machine learning techniques can simplify many of the hardest security problems that are within the customer’s responsibility. Join us as we explore how services like Amazon Virtual Private Cloud flow logs, AWS CloudTrail, and Amazon Inspector combine to enable highly automated, scalable, and comprehensive security for your AWS applications. Learn how to effectively harness the data provided by AWS for security, and understand how Cisco Stealthwatch Cloud and AWS create an integrated, effective security solution.
With VMware Cloud on AWS, not only can you consume VMware products on AWS, but you can also use AWS native services from virtual machines running within VMware Cloud on AWS. Come learn about our latest features and how you can take advantage of the best of both VMware and AWS for your environment. This session is brought to you by AWS Partner, VMware.
In this workshop, we explore features and functions of the AWS IoT service. We start out by covering the AWS ecosystem as it relates to IoT. Next, we cover the AWS IoT service in greater detail, review some best practices for IoT solutions, and look at some common architectural patterns. With this foundation in place, we explore the AWS IoT service hands on with an IoT device and accompanying lab exercises. To get the most out of this workshop you need to have an AWS account created before the workshop begins. You should also bring a laptop so you can connect to the IoT device and perform the workshop lab exercises.
In this popular session, discover how Amazon EBS can take your application deployments on Amazon EC2 to the next level. Learn about Amazon EBS features and benefits, how to identify applications that are appropriate for use with Amazon EBS, best practices, and details about its performance and volume types. The target audience is storage administrators, application developers, applications owners, and anyone who wants to understand how to optimize performance for Amazon EC2 using the power of Amazon EBS.
IoT Building Blocks_ From Edge Devices to Analytics in the Cloud Amazon Web Services
In this session, we explore features and functions of AWS IoT services. We first cover AWS IoT fundamentals and our partner ecosystem. Then we discuss AWS IoT services in greater detail, review best practices for IoT solutions, and look at some common architectural patterns. With this foundation in place, we explore a use case for IoT applications. Leave this session with an understanding of how to start building IoT applications with AWS IoT.
Edge immersion days module 2 - protect your application at the edge using a...RoiElbaz1
The document discusses Amazon Web Services' (AWS) cloud-native protections against distributed denial-of-service (DDoS) attacks and web application threats. It describes AWS WAF for inspecting and mitigating layer 7 attacks, AWS Shield Standard for automatic protection against common network attacks, and AWS Shield Advanced for additional detection and monitoring capabilities. The document also provides an overview of DDoS trends, the benefits of a cloud-native defense approach, and example customer implementations of AWS WAF and Shield services.
Automating DDos and WAF responses - AWS Summit Cape Town 2018Amazon Web Services
Speaker: Andrew Kane, AWS
Level: 300/400
Security professionals and full-stack engineers will learn how to defend against distributed denial of service (DDoS) attacks and web application exploits by using automation to monitor activity, configure rate limiting, and deploy network filtering rules. You will become an expert in advanced techniques to help you protect and monitor your AWS networks and resources using services such as AWS Web Application Firewall, AWS Shield, AWS CloudWatch, and more. You will also learn how to use Lambda functions to automate event response and integrate with your security operations tools.
Governments have unique scale and technology requirements that can push them toward hybrid architectures in order to meet mission objectives. AWS is leveraging its global footprint of edge locations to enable scalable hybrid solutions that help remove complexity and risk in government cloud architectures and deployments that require large or global scale capabilities. This session will describe the current Global Edge Infrastructure, the AWS portfolio utilizing Regional and Edge services (Direct Connect, CloudFront, R53, WAF, AWS Shield, and Snowball Edge) and explore scalable Disaster Recovery, Private connectivity, Cyber and Storage solutions built using Regional and Edge services.
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útokyVladimir Simek
This document discusses how to protect web applications from DDoS attacks on AWS. It covers the types and trends of DDoS threats, best practices for web architecture, and AWS security services like AWS Shield, AWS WAF, and Firewall Manager that provide built-in and customizable DDoS mitigation. It also includes a demo and discusses pricing models for AWS DDoS protection services.
In this talk, we will introduce several methods of threat detection and remediation on AWS, including GuardDuty, Macie, WAF, Shield, Lambda, AWS Config, Systems Manager and Inspector. We will do a brief overview of each of these services, and then talk about how to put them all together, to have a comprehensive thread detection and remediation solution. We will also discuss how to use these services across multiple AWS accounts and regions, to cover the governance needs of enterprise AWS deployments.
Speaker: Jesse Fuchs - Sr. Solutions Architect, AWS
AWS Security Week: Intro To Threat Detection & RemediationAmazon Web Services
AWS Security Week at the San Francisco Loft: Introduction to Threat Detection and Remediation on AWS
Presenter: Jeff Levine, Sr. Security Solutions Architect, AWS
Learn how AWS customers are implementing robust security posture for their A...Amazon Web Services
This document discusses Amazon Web Services security services including AWS Shield Standard, AWS Shield Advanced, AWS WAF, and security automations. It provides examples of how customers such as Slack, Rovio, Netflix, Pearson, and Niantic have used these services to protect against threats like DDoS attacks, bots, and application vulnerabilities.
VMware and AWS will jointly discuss the challenges addressed by VMware Cloud on AWS, the architecture of the service, integration with native AWS services, unique benefits, and popular use cases. You will learn about consumption options, pricing, value-add services, total cost of ownership versus alternatives, and view some customer success stories. Finally, you will see a demo and learn how to get started using the service, with time reserved at the end for questions and answers.
Secure & Automate AWS Deployments with Next-Generation on SecurityAmazon Web Services
Building seamless, consistent security policies across on-premises and cloud IT environments can be challenging without comprehensive workload visibility. Palo Alto Networks provides organizations with the visibility and automation needed to create and update security policies in your cloud environment in real time. Learn how you can gain greater control over your applications, automatically create consistent and uniform security policies, and prevent known and unknown threats within application flows.
Michael South, AWS Security Acceleration Business Development
Matt McLimans, Public Cloud Consultant Engineer, Palo Alto Networks
Mark Nunnikhoven, Vice President of Cloud Research at Trend Micro
This session is designed to introduce you to fundamental cloud computing and AWS security concepts that will help you prepare for the Security Week sessions, demos, and workshops. We will also provide an overview of the Security pillar of the AWS Cloud Adoption Framework (CAF) and talk about how AWS keeps humans away from data—and how you can, too.
Il cloud ibrido fa riferimento all'uso di risorse locali in aggiunta alle risorse pubbliche del cloud. Un cloud ibrido consente a un'organizzazione di migrare applicazioni e dati nel cloud, estendere la capacità del data center, utilizzare nuove funzionalità native del cloud, avvicinare le applicazioni ai clienti e creare una soluzione di backup e disaster recovery con una elevata disponibilità. In questa sessione verranno presentate le principali architetture ed i tool AWS per realizzarle.
How to Architect and Bring to Market SaaS on AWS GovCloud (US)Amazon Web Services
AWS GovCloud (US) is an isolated AWS region designated to allow US government agencies and organizations in highly-regulated industries to move sensitive data and regulated IT workloads to the cloud by addressing their specific regulatory and compliance requirements. These organizations are increasingly integrating SaaS technologies into their IT environments; however, they often require SaaS products to address the same compliance features of the GovCloud region. This session will discuss how SaaS vendors should approach migrating to GovCloud (US), key architecture, compliance and operational considerations and best practices for bringing a SaaS product on GovCloud (US) to market. This session also shows you how to meet acquisition and procurement policies with AWS Marketplace for AWS GovCloud (US).
Introduction to Hybrid Cloud on AWS - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- Understand Hybrid Cloud architecture options
- Understand AWS portfolio of capabilities to support Hybrid Cloud
- Understand AWS partnerships with VMWare, Microsoft and other key enterprise players help you execute your Hybrid Cloud strategy
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...Amazon Web Services
As companies employ DevOps practices to push applications faster into production through better collaboration and automated testing, security is often seen as an inhibitor to speed. The challenge for many organizations is getting applications delivered at a fast pace while embedding security at the speed of DevOps. In this session, learn how AWS Marketplace products and customers help make DevSecOps a well-orchestrated methodology to ensure the speed, stability, and security of your applications.
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Amazon Web Services
As companies employ DevOps practices to push applications faster into production through better collaboration and automated testing, security is often seen as an inhibitor to speed. The challenge for many organizations is getting applications delivered at a fast pace while embedding security at the speed of DevOps. In this session, learn how AWS Marketplace products and customers help make DevSecOps a well-orchestrated methodology to ensure the speed, stability, and security of your applications.
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Amazon Web Services
Join us, and learn how we made AWS our backbone, modularized our software for the cloud, and gained an immediate surge in velocity. In this session, we walk you through some of the unexpected security challenges we faced and hopefully save you a few headaches. Discover what security issues you need to address, how to avoid costly unused instances in your deployments, and why your current security tools won’t help. We show you how a major transformation landed us on AWS, and we share how we overcame challenges and advanced our business while innovating in a new direction. This session is brought to you by AWS partner, Barracuda Networks Inc.
The Executive Security Simulation takes senior security management and IT/business executive teams through an experiential exercise that illuminates key decision points for a successful and secure cloud journey. During this team-based, game-like competitive simulation, participants leverage an industry case study to make strategic security, risk, and compliance time-based decisions and investments. Participants experience the impact of these investments and decisions on the critical aspects of their secure cloud adoption. Join this workshop to gain an understanding of the major success factors to lead security, risk, and compliance in the cloud, and learn applicable decision and investment approaches to specific secure cloud adoption journeys. AWS facilitators translate lessons learned in the simulation into real-life examples and practical advice for your team.
by Bill Reid, Sr. Manager of Solutions Architecture, AWS
This session is designed to introduce you to fundamental cloud computing and AWS security concepts that will help you prepare for the Security Week sessions, demos, and labs.
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Amazon Web Services
If left unmitigated, Distributed Denial of Service (DDoS) attacks have the potential to harm application availability or impair application performance. DDoS attacks can also act as a smoke screen for intrusion attempts or as a harbinger for attacks against non-cloud infrastructure. Accordingly, it's crucial that developers architect for DDoS resiliency and maintain robust operational capabilities that allow for rapid detection and engagement during high-severity events. In this session, you learn how to build a DDoS-resilient application and how to use services like AWS Shield and Amazon CloudWatch to defend against DDoS attacks and automate response to attacks in progress.
Similar to Protect Your Game Servers from DDoS Attacks - AWS Online Tech Talks (20)
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
Il Forecasting è un processo importante per tantissime aziende e viene utilizzato in vari ambiti per cercare di prevedere in modo accurato la crescita e distribuzione di un prodotto, l’utilizzo delle risorse necessarie nelle linee produttive, presentazioni finanziarie e tanto altro. Amazon utilizza delle tecniche avanzate di forecasting, in parte questi servizi sono stati messi a disposizione di tutti i clienti AWS.
In questa sessione illustreremo come pre-processare i dati che contengono una componente temporale e successivamente utilizzare un algoritmo che a partire dal tipo di dato analizzato produce un forecasting accurato.
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
La varietà e la quantità di dati che si crea ogni giorno accelera sempre più velocemente e rappresenta una opportunità irripetibile per innovare e creare nuove startup.
Tuttavia gestire grandi quantità di dati può apparire complesso: creare cluster Big Data su larga scala sembra essere un investimento accessibile solo ad aziende consolidate. Ma l’elasticità del Cloud e, in particolare, i servizi Serverless ci permettono di rompere questi limiti.
Vediamo quindi come è possibile sviluppare applicazioni Big Data rapidamente, senza preoccuparci dell’infrastruttura, ma dedicando tutte le risorse allo sviluppo delle nostre le nostre idee per creare prodotti innovativi.
Ora puoi utilizzare Amazon Elastic Kubernetes Service (EKS) per eseguire pod Kubernetes su AWS Fargate, il motore di elaborazione serverless creato per container su AWS. Questo rende più semplice che mai costruire ed eseguire le tue applicazioni Kubernetes nel cloud AWS.In questa sessione presenteremo le caratteristiche principali del servizio e come distribuire la tua applicazione in pochi passaggi
Vent'anni fa Amazon ha attraversato una trasformazione radicale con l'obiettivo di aumentare il ritmo dell'innovazione. In questo periodo abbiamo imparato come cambiare il nostro approccio allo sviluppo delle applicazioni ci ha permesso di aumentare notevolmente l'agilità, la velocità di rilascio e, in definitiva, ci ha consentito di creare applicazioni più affidabili e scalabili. In questa sessione illustreremo come definiamo le applicazioni moderne e come la creazione di app moderne influisce non solo sull'architettura dell'applicazione, ma sulla struttura organizzativa, sulle pipeline di rilascio dello sviluppo e persino sul modello operativo. Descriveremo anche approcci comuni alla modernizzazione, compreso l'approccio utilizzato dalla stessa Amazon.com.
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
L’utilizzo dei container è in continua crescita.
Se correttamente disegnate, le applicazioni basate su Container sono molto spesso stateless e flessibili.
I servizi AWS ECS, EKS e Kubernetes su EC2 possono sfruttare le istanze Spot, portando ad un risparmio medio del 70% rispetto alle istanze On Demand. In questa sessione scopriremo insieme quali sono le caratteristiche delle istanze Spot e come possono essere utilizzate facilmente su AWS. Impareremo inoltre come Spreaker sfrutta le istanze spot per eseguire applicazioni di diverso tipo, in produzione, ad una frazione del costo on-demand!
In recent months, many customers have been asking us the question – how to monetise Open APIs, simplify Fintech integrations and accelerate adoption of various Open Banking business models. Therefore, AWS and FinConecta would like to invite you to Open Finance marketplace presentation on October 20th.
Event Agenda :
Open banking so far (short recap)
• PSD2, OB UK, OB Australia, OB LATAM, OB Israel
Intro to Open Finance marketplace
• Scope
• Features
• Tech overview and Demo
The role of the Cloud
The Future of APIs
• Complying with regulation
• Monetizing data / APIs
• Business models
• Time to market
One platform for all: a Strategic approach
Q&A
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
Per creare valore e costruire una propria offerta differenziante e riconoscibile, le startup di successo sanno come combinare tecnologie consolidate con componenti innovativi creati ad hoc.
AWS fornisce servizi pronti all'utilizzo e, allo stesso tempo, permette di personalizzare e creare gli elementi differenzianti della propria offerta.
Concentrandoci sulle tecnologie di Machine Learning, vedremo come selezionare i servizi di intelligenza artificiale offerti da AWS e, anche attraverso una demo, come costruire modelli di Machine Learning personalizzati utilizzando SageMaker Studio.
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
Con l'approccio tradizionale al mondo IT per molti anni è stato difficile implementare tecniche di DevOps, che finora spesso hanno previsto attività manuali portando di tanto in tanto a dei downtime degli applicativi interrompendo l'operatività dell'utente. Con l'avvento del cloud, le tecniche di DevOps sono ormai a portata di tutti a basso costo per qualsiasi genere di workload, garantendo maggiore affidabilità del sistema e risultando in dei significativi miglioramenti della business continuity.
AWS mette a disposizione AWS OpsWork come strumento di Configuration Management che mira ad automatizzare e semplificare la gestione e i deployment delle istanze EC2 per mezzo di workload Chef e Puppet.
Scopri come sfruttare AWS OpsWork a garanzia e affidabilità del tuo applicativo installato su Instanze EC2.
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
Vuoi conoscere le opzioni per eseguire Microsoft Active Directory su AWS? Quando si spostano carichi di lavoro Microsoft in AWS, è importante considerare come distribuire Microsoft Active Directory per supportare la gestione, l'autenticazione e l'autorizzazione dei criteri di gruppo. In questa sessione, discuteremo le opzioni per la distribuzione di Microsoft Active Directory su AWS, incluso AWS Directory Service per Microsoft Active Directory e la distribuzione di Active Directory su Windows su Amazon Elastic Compute Cloud (Amazon EC2). Trattiamo argomenti quali l'integrazione del tuo ambiente Microsoft Active Directory locale nel cloud e l'utilizzo di applicazioni SaaS, come Office 365, con AWS Single Sign-On.
Dal riconoscimento facciale al riconoscimento di frodi o difetti di fabbricazione, l'analisi di immagini e video che sfruttano tecniche di intelligenza artificiale, si stanno evolvendo e raffinando a ritmi elevati. In questo webinar esploreremo le possibilità messe a disposizione dai servizi AWS per applicare lo stato dell'arte delle tecniche di computer vision a scenari reali.
Amazon Web Services e VMware organizzano un evento virtuale gratuito il prossimo mercoledì 14 Ottobre dalle 12:00 alle 13:00 dedicato a VMware Cloud ™ on AWS, il servizio on demand che consente di eseguire applicazioni in ambienti cloud basati su VMware vSphere® e di accedere ad una vasta gamma di servizi AWS, sfruttando a pieno le potenzialità del cloud AWS e tutelando gli investimenti VMware esistenti.
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
Molte aziende oggi, costruiscono applicazioni con funzionalità di tipo ledger ad esempio per verificare lo storico di accrediti o addebiti nelle transazioni bancarie o ancora per tenere traccia del flusso supply chain dei propri prodotti.
Alla base di queste soluzioni ci sono i database ledger che permettono di avere un log delle transazioni trasparente, immutabile e crittograficamente verificabile, ma sono strumenti complessi e onerosi da gestire.
Amazon QLDB elimina la necessità di costruire sistemi personalizzati e complessi fornendo un database ledger serverless completamente gestito.
In questa sessione scopriremo come realizzare un'applicazione serverless completa che utilizzi le funzionalità di QLDB.
Con l’ascesa delle architetture di microservizi e delle ricche applicazioni mobili e Web, le API sono più importanti che mai per offrire agli utenti finali una user experience eccezionale. In questa sessione impareremo come affrontare le moderne sfide di progettazione delle API con GraphQL, un linguaggio di query API open source utilizzato da Facebook, Amazon e altro e come utilizzare AWS AppSync, un servizio GraphQL serverless gestito su AWS. Approfondiremo diversi scenari, comprendendo come AppSync può aiutare a risolvere questi casi d’uso creando API moderne con funzionalità di aggiornamento dati in tempo reale e offline.
Inoltre, impareremo come Sky Italia utilizza AWS AppSync per fornire aggiornamenti sportivi in tempo reale agli utenti del proprio portale web.
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
In queste slide, gli esperti AWS e VMware presentano semplici e pratici accorgimenti per facilitare e semplificare la migrazione dei carichi di lavoro Oracle accelerando la trasformazione verso il cloud, approfondiranno l’architettura e dimostreranno come sfruttare a pieno le potenzialità di VMware Cloud ™ on AWS.
1) The document discusses building a minimum viable product (MVP) using Amazon Web Services (AWS).
2) It provides an example of an MVP for an omni-channel messenger platform that was built from 2017 to connect ecommerce stores to customers via web chat, Facebook Messenger, WhatsApp, and other channels.
3) The founder discusses how they started with an MVP in 2017 with 200 ecommerce stores in Hong Kong and Taiwan, and have since expanded to over 5000 clients across Southeast Asia using AWS for scaling.
This document discusses pitch decks and fundraising materials. It explains that venture capitalists will typically spend only 3 minutes and 44 seconds reviewing a pitch deck. Therefore, the deck needs to tell a compelling story to grab their attention. It also provides tips on tailoring different types of decks for different purposes, such as creating a concise 1-2 page teaser, a presentation deck for pitching in-person, and a more detailed read-only or fundraising deck. The document stresses the importance of including key information like the problem, solution, product, traction, market size, plans, team, and ask.
This document discusses building serverless web applications using AWS services like API Gateway, Lambda, DynamoDB, S3 and Amplify. It provides an overview of each service and how they can work together to create a scalable, secure and cost-effective serverless application stack without having to manage servers or infrastructure. Key services covered include API Gateway for hosting APIs, Lambda for backend logic, DynamoDB for database needs, S3 for static content, and Amplify for frontend hosting and continuous deployment.
This document provides tips for fundraising from startup founders Roland Yau and Sze Lok Chan. It discusses generating competition to create urgency for investors, fundraising in parallel rather than sequentially, having a clear fundraising narrative focused on what you do and why it's compelling, and prioritizing relationships with people over firms. It also notes how the pandemic has changed fundraising, with examples of deals done virtually during this time. The tips emphasize being fully prepared before fundraising and cultivating connections with investors in advance.
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
This document discusses Amazon's machine learning services for building conversational interfaces and extracting insights from unstructured text and audio. It describes Amazon Lex for creating chatbots, Amazon Comprehend for natural language processing tasks like entity extraction and sentiment analysis, and how they can be used together for applications like intelligent call centers and content analysis. Pre-trained APIs simplify adding machine learning to apps without requiring ML expertise.
Amazon Elastic Container Service (Amazon ECS) è un servizio di gestione dei container altamente scalabile, che semplifica la gestione dei contenitori Docker attraverso un layer di orchestrazione per il controllo del deployment e del relativo lifecycle. In questa sessione presenteremo le principali caratteristiche del servizio, le architetture di riferimento per i differenti carichi di lavoro e i semplici passi necessari per poter velocemente migrare uno o più dei tuo container.