"CSC engineers will demonstrate enterprise policy, governance, and security products to deploy and manage enterprise and industry applications AWS. We will demonstrate automated provisioning and management of big data platforms and industry specific enterprise applications with automatically provisioned secure network connectivity from the datacenter to AWS over layer 2 routed AT&T NetBond (provides AWS DirectConnect access) connection. We will demonstrate how applications blueprinted on CSC's Agility Platform can be re-hosted on AWS in minutes or re-instantiated across multiple AWS regions. CSC Cybersecurity will also demonstrate how CSC can provide agile & consumption based endpoint security for workloads in any cloud or virtual infrastructure, providing enterprise management and 24x7 monitoring of workload compliance, vulnerabilities, and potential threats.
Session sponsored by CSC."
When evaluating and planning migrating your data from on premises to the Cloud, you might encounter physical limitations. Amazon offers a suite of tools to help you surmount these limitations by moving data using networks, roads, and technology partners. In this session, we discuss how to move large amounts of data into and out of the Cloud in batches, increments, and streams.
AWS offers you the ability to add additional layers of security to your data at rest in the cloud, providing access control as well scalable and efficient encryption features. Flexible key management options allow you to choose whether to have AWS manage the encryption keys or to keep complete control over the keys yourself. In this session, you will learn how to secure data when using AWS services. We will discuss data encryption using Key Management Service, S3 access controls, edge and host access security, and database platform security features.
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...Amazon Web Services
We constantly hear about huge hacks in the media, with companies losing millions of dollars in an instant. While this problem is large for the enterprise side of the world, it is even more detrimental when it comes to the fedspace. CloudCheckr Co-Founder & CEO Aaron Newman will highlight effective strategies and tools that AWS users can employ to improve their security posture. Often times the biggest threat to security is the human, Aaron will go through ways to work around this and how you can shore up security to avoid these errors. Specific emphasis will be placed upon leveraging native AWS services and the talk will include concrete steps that users can begin employing immediately. Learn More: https://aws.amazon.com/government-education/
When evaluating and planning migrating your data from on premises to the Cloud, you might encounter physical limitations. Amazon offers a suite of tools to help you surmount these limitations by moving data using networks, roads, and technology partners. In this session, we discuss how to move large amounts of data into and out of the Cloud in batches, increments, and streams.
AWS offers you the ability to add additional layers of security to your data at rest in the cloud, providing access control as well scalable and efficient encryption features. Flexible key management options allow you to choose whether to have AWS manage the encryption keys or to keep complete control over the keys yourself. In this session, you will learn how to secure data when using AWS services. We will discuss data encryption using Key Management Service, S3 access controls, edge and host access security, and database platform security features.
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...Amazon Web Services
We constantly hear about huge hacks in the media, with companies losing millions of dollars in an instant. While this problem is large for the enterprise side of the world, it is even more detrimental when it comes to the fedspace. CloudCheckr Co-Founder & CEO Aaron Newman will highlight effective strategies and tools that AWS users can employ to improve their security posture. Often times the biggest threat to security is the human, Aaron will go through ways to work around this and how you can shore up security to avoid these errors. Specific emphasis will be placed upon leveraging native AWS services and the talk will include concrete steps that users can begin employing immediately. Learn More: https://aws.amazon.com/government-education/
(SEC320) Leveraging the Power of AWS to Automate Security & ComplianceAmazon Web Services
"You’ve made the move to AWS and are now reaping the benefits of decreased costs and increased business agility. How can you reap those same benefits for your cloud security and compliance operations? As building cloud-native applications requires different skill sets, architectures, integrations, and processes, implementing effective, scalable, and robust security for the cloud requires rethinking everything from your security tools to your team culture.
Attend this session to learn how to start down the path toward security and compliance automation and hear how DevSecOps leaders such as Intuit and Capital One are using AWS, DevOps, and automation to transform their security operations.
Session sponsored by evident.io"
Amazon WorkSpaces is a secure, managed, virtual desktop service running on the AWS cloud. The service helps organizations support a modern mobile workforce, improve information security, and save money with a pay-as-you-go model. In this session, we'll cover how cloud desktops can benefit your organization, what's new with Amazon WorkSpaces, and some of the top technical considerations like user identity and access management, VPC design, network traffic flow, and application delivery. This session is for IT professionals and business decision makers interested in learning how to simplify desktop management and productivity for their organizations.
AWS offers you the ability to add additional layers of security to your data at rest in the cloud, providing access control as well scalable and efficient encryption features. Flexible key management options allow you to choose whether to have AWS manage the encryption keys or to keep complete control over the keys yourself. In this session, you will learn how to secure data when using AWS services. We will discuss data encryption using Key Management Service, S3 access controls, edge and host access security, and database platform security features.
Dev ops on aws deep dive on continuous delivery - TorontoAmazon Web Services
Today’s cutting-edge companies have software release cycles measured in days instead of months. This agility is enabled by the DevOps practice of continuous delivery, which automates building, testing, and deploying all code changes. This automation helps you catch bugs sooner and accelerates developer productivity. In this session, we’ll share the processes that Amazon’s engineers use to practice DevOps and discuss how you can bring these processes to your company by using a new set of AWS tools (AWS CodePipeline and AWS CodeDeploy). These services were inspired by Amazon's own internal developer tools and DevOps culture.
Wild Rydes (www.wildrydes.com) needs your help! With fresh funding from its seed investors, Wild Rydes is seeking to build the world’s greatest mobile/VR/AR unicorn transportation system. The scrappy startup needs a first-class webpage to begin marketing to new users and to begin its plans for global domination. Join us to help Wild Rydes build a website using a serverless architecture. You’ll build a scalable website using services like AWS Lambda, Amazon API Gateway, Amazon DynamoDB, and Amazon S3. Join this workshop to hop on the rocket ship!
To complete this workshop, you'll need:
Your laptop
AWS Account
AWS Command Line Interface
Google Chrome
git
Text Editor
ENT302 Deep Dive on AWS Management Tools and New LaunchesAmazon Web Services
As companies shift workloads into the cloud, IT organizations are required to manage an increasing number of cloud resources. AWS provides a broad set of services that help IT organizations with provisioning, tracking, auditing, configuration management, and cost management of their AWS resources. In this session, we will explore the AWS Management Tools suite of services that support the lifecycle management of AWS resources at scale and enable IT governance and compliance. The Deep Dive on AWS Management Tools session will benefit both new and experienced IT administrators, systems administrators, and developers operating infrastructure on AWS and interested in learning about the AWS resource management capabilities.
(SEC203) Journey to Securing Time Inc's Move to the CloudAmazon Web Services
"Learn how Time Inc. met security requirements as they transitioned from their data centers to the AWS cloud. Colin Bodell, CTO from Time Inc. will start off this session by presenting Time’s objective to move away from on-premise and co-location data centers to AWS and the cost savings that has been realized with this transition. Chris Nicodemo from Time Inc. and Derek Uzzle from Alert Logic will then share lessons learned in the journey to secure dozens of high volume media websites during the migration, and how it has enhanced overall security flexibility and scalability. They will also provide a deep dive on the solutions Time has leveraged for their enterprise security best practices, and show you how they were able to execute their security strategy.
Who should attend: InfoSec and IT management.
Session sponsored by Alert Logic."
My slides from the re:Invent Recap Conferences.
The AWS Well-Architected Framework enables customers to understand best practices around security, reliability, performance, and cost optimisation when building systems on AWS. This approach helps customers make informed decisions and weigh the pros and cons of application design patterns for the cloud. In this session, you'll learn how to follow AWS guidelines and best practices. By developing a strategy based on Amazon Web Services's Well-Architected Framework, you will be able to significantly increase the frequency of code deployments and reduce deployment times. As a result, you will be able to deliver more scalable, dynamic and resilient applications.
AWS offers you the ability to add additional layers of security to your data at rest in the cloud, providing access control as well scalable and efficient encryption features. Flexible key management options allow you to choose whether to have AWS manage the encryption keys or to keep complete control over the keys yourself. In this session, you will learn how to secure data when using AWS services. We will discuss data encryption using Key Management Service, S3 access controls, edge and host access security, and database platform security features.
AWS re:Invent 2016 was AWS’ largest event yet with over 32,000 attendees, 400 breakout sessions, and two keynotes of new product announcements. In this talk, we’ll explore the core themes of AWS re:Invent 2016 such as serverless and artificial intelligence. We will also drill down into several of the services and features unveiled including AWS Batch, AWS Shield, Aurora for Postgres, X-Ray, Polly, Lex, Rekognition, AWS Step Functions. Light appetizers and refreshments will be provided.
In this session we will introduce you briefly to Fanatical Support for AWS, before diving into migration strategies for moving your applications to the cloud, which can maximize agility and competitive advantage within your business as part of the migration process. Session sponsored by Rackspace.
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...Amazon Web Services
AWS offers a variety of methods to migrate your data into the cloud. You may want to begin performing regular backups, start collecting device streams, migrate a large datastore once, or just gain dedicated connectivity and then figure out what to do next. How do you know what option works best with your architecture(s)?
This webinar will give you an overview of the six data migration tools we offer, including the strengths and weaknesses of each, as well as their complementary opportunities.
Learning Objectives:
Gain an overview of cloud data migration
Learn the basics of the six transfer services (Direct Connect, Gateway, Snowball, Disk transfer, Firehose, 3rd party partners)
Understand the strengths and weaknesses of each service, and opportunities to layer them together
Who Should Attend:
Developers, IT Professionals, Storage and Backup Administrators, who are familiar with the concept of cloud storage but concerned about how to move their data in effectively
What is Innovation? How can cloud computing help you innovate? How can you make your applications smarter? Predictive? How can you interpret data and anticipate trends? With AWS Artificial Intelligence Solutions: Machine Learning, Rekognition, Polly; with serverless - Lambda, Step Functions.
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...Amazon Web Services
With security-relevant services such as AWS Config, VPC Flow Logs, Amazon CloudWatch Events, and AWS Lambda, you now have the ability to programmatically wrangle security events that may occur within your AWS environment, including prevention, detection, response, and remediation. This session covers the process of automating security event response with various AWS building blocks, taking several ideas from drawing board to code, and gaining confidence in your coverage by proactively testing security monitoring and response effectiveness before anyone else does.
by Rahul Sareen, Sr. Consultant, AWS
In this workshop you'll learn to build a web application using a serverless architecture. With fresh funding from its seed investors, Wild Rydes (www.wildrydes.com) is seeking to build the world’s greatest mobile/VR/AR unicorn transportation system. The scrappy startup needs a first-class webpage to begin marketing to new users and to begin its plans for global domination. Join us to help Wild Rydes build a website using a serverless architecture. You’ll build a scalable website using services like AWS Lambda, Amazon API Gateway, Amazon DynamoDB, Amazon Cognito, and Amazon S3.
Scaling Security Operations and Automating Governance: Which AWS Services Sho...Amazon Web Services
This session enables security operators to automate governance and implement use cases addressed by AWS services such as AWS CloudTrail, AWS Config Rules, Amazon CloudWatch Events, and Trusted Advisor. Based on the nature of vulnerabilities, internal processes, compliance regimes, and other priorities, this session discusses the service to use when. We also show how to detect, report, and fix vulnerabilities, or gain more information about attackers. We dive deep into new features and capabilities of relevant services and use an example from an AWS customer, Siemens AG, about how to best automate governance and scale. A prerequisite for this session is knowledge of security and basic software development using Java, Python, or Node.
AWS and its partners offer a wide range of tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. AWS provides security-specific tools and features across network security, configuration management, access control and data security. In addition, AWS provides monitoring and logging tools to can provide full visibility into what is happening in your environment. In this session, you will get introduced to the range of security tools and features that AWS offers, and the latest security innovations coming from AWS.
(SEC310) Keeping Developers and Auditors Happy in the CloudAmazon Web Services
Often times, developers and auditors can be at odds. The agile, fast-moving environments that developers enjoy will typically give auditors heartburn. The more controlled and stable environments that auditors prefer to demonstrate and maintain compliance are traditionally not friendly to developers or innovation. We'll walk through how Netflix moved its PCI and SOX environments to the cloud and how we were able to leverage the benefits of the cloud and agile development to satisfy both auditors and developers. Topics covered will include shared responsibility, using compartmentalization and microservices for scope control, immutable infrastructure, and continuous security testing.
AWS IoT is a managed cloud platform that allows connected IoT devices to easily and securely interact with cloud applications and other devices. In this session, we will discuss how constrained devices can leverage the AWS IoT service to send data to the cloud and receive commands back to the device using the protocol of their choice. We will discuss how devices can connect securely using MQTT and HTTP protocols, and how developers and businesses can leverage the AWS IoT Rules Engine, Thing Shadows, and accelerate prototype development using AWS IoT Device SDKs. Finally, we will cover new features released since the launch of AWS IoT including integration with Amazon Machine Learning and Amazon ElasticSearch Service.
"Amazon Inspector is a new service from AWS that identifies security issues in your application deployments. Use Inspector with your applications to assess your security posture and identify areas that can be improved. Inspector works with your Amazon EC2 instances to monitor activity in your applications and system.
This session will cover getting started with Inspector, how to automate the process, how to manage and act on findings, and additional ways you can enhance your development and release lifecycle using Inspector."
When implementing SharePoint you might think that you are adding just another technology to your heterogeneous IT environment. But after a while you realize, that users are doing things with SharePoint that you did not expect them to do. This talk dives into the dynamics of adopting SharePoint as a platform, and shows you a how to setup an operational governance practice using a structured governance framework.
(SEC320) Leveraging the Power of AWS to Automate Security & ComplianceAmazon Web Services
"You’ve made the move to AWS and are now reaping the benefits of decreased costs and increased business agility. How can you reap those same benefits for your cloud security and compliance operations? As building cloud-native applications requires different skill sets, architectures, integrations, and processes, implementing effective, scalable, and robust security for the cloud requires rethinking everything from your security tools to your team culture.
Attend this session to learn how to start down the path toward security and compliance automation and hear how DevSecOps leaders such as Intuit and Capital One are using AWS, DevOps, and automation to transform their security operations.
Session sponsored by evident.io"
Amazon WorkSpaces is a secure, managed, virtual desktop service running on the AWS cloud. The service helps organizations support a modern mobile workforce, improve information security, and save money with a pay-as-you-go model. In this session, we'll cover how cloud desktops can benefit your organization, what's new with Amazon WorkSpaces, and some of the top technical considerations like user identity and access management, VPC design, network traffic flow, and application delivery. This session is for IT professionals and business decision makers interested in learning how to simplify desktop management and productivity for their organizations.
AWS offers you the ability to add additional layers of security to your data at rest in the cloud, providing access control as well scalable and efficient encryption features. Flexible key management options allow you to choose whether to have AWS manage the encryption keys or to keep complete control over the keys yourself. In this session, you will learn how to secure data when using AWS services. We will discuss data encryption using Key Management Service, S3 access controls, edge and host access security, and database platform security features.
Dev ops on aws deep dive on continuous delivery - TorontoAmazon Web Services
Today’s cutting-edge companies have software release cycles measured in days instead of months. This agility is enabled by the DevOps practice of continuous delivery, which automates building, testing, and deploying all code changes. This automation helps you catch bugs sooner and accelerates developer productivity. In this session, we’ll share the processes that Amazon’s engineers use to practice DevOps and discuss how you can bring these processes to your company by using a new set of AWS tools (AWS CodePipeline and AWS CodeDeploy). These services were inspired by Amazon's own internal developer tools and DevOps culture.
Wild Rydes (www.wildrydes.com) needs your help! With fresh funding from its seed investors, Wild Rydes is seeking to build the world’s greatest mobile/VR/AR unicorn transportation system. The scrappy startup needs a first-class webpage to begin marketing to new users and to begin its plans for global domination. Join us to help Wild Rydes build a website using a serverless architecture. You’ll build a scalable website using services like AWS Lambda, Amazon API Gateway, Amazon DynamoDB, and Amazon S3. Join this workshop to hop on the rocket ship!
To complete this workshop, you'll need:
Your laptop
AWS Account
AWS Command Line Interface
Google Chrome
git
Text Editor
ENT302 Deep Dive on AWS Management Tools and New LaunchesAmazon Web Services
As companies shift workloads into the cloud, IT organizations are required to manage an increasing number of cloud resources. AWS provides a broad set of services that help IT organizations with provisioning, tracking, auditing, configuration management, and cost management of their AWS resources. In this session, we will explore the AWS Management Tools suite of services that support the lifecycle management of AWS resources at scale and enable IT governance and compliance. The Deep Dive on AWS Management Tools session will benefit both new and experienced IT administrators, systems administrators, and developers operating infrastructure on AWS and interested in learning about the AWS resource management capabilities.
(SEC203) Journey to Securing Time Inc's Move to the CloudAmazon Web Services
"Learn how Time Inc. met security requirements as they transitioned from their data centers to the AWS cloud. Colin Bodell, CTO from Time Inc. will start off this session by presenting Time’s objective to move away from on-premise and co-location data centers to AWS and the cost savings that has been realized with this transition. Chris Nicodemo from Time Inc. and Derek Uzzle from Alert Logic will then share lessons learned in the journey to secure dozens of high volume media websites during the migration, and how it has enhanced overall security flexibility and scalability. They will also provide a deep dive on the solutions Time has leveraged for their enterprise security best practices, and show you how they were able to execute their security strategy.
Who should attend: InfoSec and IT management.
Session sponsored by Alert Logic."
My slides from the re:Invent Recap Conferences.
The AWS Well-Architected Framework enables customers to understand best practices around security, reliability, performance, and cost optimisation when building systems on AWS. This approach helps customers make informed decisions and weigh the pros and cons of application design patterns for the cloud. In this session, you'll learn how to follow AWS guidelines and best practices. By developing a strategy based on Amazon Web Services's Well-Architected Framework, you will be able to significantly increase the frequency of code deployments and reduce deployment times. As a result, you will be able to deliver more scalable, dynamic and resilient applications.
AWS offers you the ability to add additional layers of security to your data at rest in the cloud, providing access control as well scalable and efficient encryption features. Flexible key management options allow you to choose whether to have AWS manage the encryption keys or to keep complete control over the keys yourself. In this session, you will learn how to secure data when using AWS services. We will discuss data encryption using Key Management Service, S3 access controls, edge and host access security, and database platform security features.
AWS re:Invent 2016 was AWS’ largest event yet with over 32,000 attendees, 400 breakout sessions, and two keynotes of new product announcements. In this talk, we’ll explore the core themes of AWS re:Invent 2016 such as serverless and artificial intelligence. We will also drill down into several of the services and features unveiled including AWS Batch, AWS Shield, Aurora for Postgres, X-Ray, Polly, Lex, Rekognition, AWS Step Functions. Light appetizers and refreshments will be provided.
In this session we will introduce you briefly to Fanatical Support for AWS, before diving into migration strategies for moving your applications to the cloud, which can maximize agility and competitive advantage within your business as part of the migration process. Session sponsored by Rackspace.
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...Amazon Web Services
AWS offers a variety of methods to migrate your data into the cloud. You may want to begin performing regular backups, start collecting device streams, migrate a large datastore once, or just gain dedicated connectivity and then figure out what to do next. How do you know what option works best with your architecture(s)?
This webinar will give you an overview of the six data migration tools we offer, including the strengths and weaknesses of each, as well as their complementary opportunities.
Learning Objectives:
Gain an overview of cloud data migration
Learn the basics of the six transfer services (Direct Connect, Gateway, Snowball, Disk transfer, Firehose, 3rd party partners)
Understand the strengths and weaknesses of each service, and opportunities to layer them together
Who Should Attend:
Developers, IT Professionals, Storage and Backup Administrators, who are familiar with the concept of cloud storage but concerned about how to move their data in effectively
What is Innovation? How can cloud computing help you innovate? How can you make your applications smarter? Predictive? How can you interpret data and anticipate trends? With AWS Artificial Intelligence Solutions: Machine Learning, Rekognition, Polly; with serverless - Lambda, Step Functions.
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...Amazon Web Services
With security-relevant services such as AWS Config, VPC Flow Logs, Amazon CloudWatch Events, and AWS Lambda, you now have the ability to programmatically wrangle security events that may occur within your AWS environment, including prevention, detection, response, and remediation. This session covers the process of automating security event response with various AWS building blocks, taking several ideas from drawing board to code, and gaining confidence in your coverage by proactively testing security monitoring and response effectiveness before anyone else does.
by Rahul Sareen, Sr. Consultant, AWS
In this workshop you'll learn to build a web application using a serverless architecture. With fresh funding from its seed investors, Wild Rydes (www.wildrydes.com) is seeking to build the world’s greatest mobile/VR/AR unicorn transportation system. The scrappy startup needs a first-class webpage to begin marketing to new users and to begin its plans for global domination. Join us to help Wild Rydes build a website using a serverless architecture. You’ll build a scalable website using services like AWS Lambda, Amazon API Gateway, Amazon DynamoDB, Amazon Cognito, and Amazon S3.
Scaling Security Operations and Automating Governance: Which AWS Services Sho...Amazon Web Services
This session enables security operators to automate governance and implement use cases addressed by AWS services such as AWS CloudTrail, AWS Config Rules, Amazon CloudWatch Events, and Trusted Advisor. Based on the nature of vulnerabilities, internal processes, compliance regimes, and other priorities, this session discusses the service to use when. We also show how to detect, report, and fix vulnerabilities, or gain more information about attackers. We dive deep into new features and capabilities of relevant services and use an example from an AWS customer, Siemens AG, about how to best automate governance and scale. A prerequisite for this session is knowledge of security and basic software development using Java, Python, or Node.
AWS and its partners offer a wide range of tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. AWS provides security-specific tools and features across network security, configuration management, access control and data security. In addition, AWS provides monitoring and logging tools to can provide full visibility into what is happening in your environment. In this session, you will get introduced to the range of security tools and features that AWS offers, and the latest security innovations coming from AWS.
(SEC310) Keeping Developers and Auditors Happy in the CloudAmazon Web Services
Often times, developers and auditors can be at odds. The agile, fast-moving environments that developers enjoy will typically give auditors heartburn. The more controlled and stable environments that auditors prefer to demonstrate and maintain compliance are traditionally not friendly to developers or innovation. We'll walk through how Netflix moved its PCI and SOX environments to the cloud and how we were able to leverage the benefits of the cloud and agile development to satisfy both auditors and developers. Topics covered will include shared responsibility, using compartmentalization and microservices for scope control, immutable infrastructure, and continuous security testing.
AWS IoT is a managed cloud platform that allows connected IoT devices to easily and securely interact with cloud applications and other devices. In this session, we will discuss how constrained devices can leverage the AWS IoT service to send data to the cloud and receive commands back to the device using the protocol of their choice. We will discuss how devices can connect securely using MQTT and HTTP protocols, and how developers and businesses can leverage the AWS IoT Rules Engine, Thing Shadows, and accelerate prototype development using AWS IoT Device SDKs. Finally, we will cover new features released since the launch of AWS IoT including integration with Amazon Machine Learning and Amazon ElasticSearch Service.
"Amazon Inspector is a new service from AWS that identifies security issues in your application deployments. Use Inspector with your applications to assess your security posture and identify areas that can be improved. Inspector works with your Amazon EC2 instances to monitor activity in your applications and system.
This session will cover getting started with Inspector, how to automate the process, how to manage and act on findings, and additional ways you can enhance your development and release lifecycle using Inspector."
When implementing SharePoint you might think that you are adding just another technology to your heterogeneous IT environment. But after a while you realize, that users are doing things with SharePoint that you did not expect them to do. This talk dives into the dynamics of adopting SharePoint as a platform, and shows you a how to setup an operational governance practice using a structured governance framework.
Enterprise Adoption – Patterns for Success with AWS - BusinessAmazon Web Services
Enterprises are using AWS to both develop new sources of customer value as well as reinventing their core. In this session we will provide insights into the successful adoption patterns that have emerged. We will also discuss how enterprises have successfully navigated the people and processes challenges that initially inhibited enterprise wide adoption. Finally, we will provide you with a framework to assess where you are on your Cloud journey and tangible takeaways that will help you accelerate.
Speaker: Shannon O'Brien, Enterprise Sales Manager, Amazon Web Services
Featured Customer - Strategy&
"Wipro is one of India's largest publicly traded companies and the seventh largest IT services firm in the world. In this session, we showcase the structured methods that Wipro has used in enabling enterprises to take advantage of the cloud. These cover identifying workloads and application profiles that could benefit, re-structuring enterprise application and infrastructure components for migration, rapid and thorough verification and validation, and modifying component monitoring and management.
Several of these methods can be tailored to the individual client or functional context, so specific client examples are presented. We also discuss the enterprise experience of enabling many non-IT functions to benefit from the cloud, such as sales and training. More functions included in the cloud increase the benefit drawn from a cloud-enabled IT landscape.
Session sponsored by Wipro."
Best Practices for Protecting Cloud Workloads - November 2016 Webinar SeriesAmazon Web Services
Traditional backup software works for on-premises workloads, but protecting the data for workloads running in the cloud is a new game. Backup windows may be non-existent, data may be scattered across geographies and platforms, and there may simply be too much to effectively traverse with traditional methods. Protecting cloud workload data requires some adjustments to your thinking. Join our storage experts to learn more about best practices for preventing loss, rolling back to recovery points, and fitting into backup windows. We will cover protection features and design considerations for protecting data with S3, Glacier, EBS and EFS.
Learning Objectives:
• Learn how to design for recovery points and recovery times using the native AWS storage tools for file, block and object storage
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...Jürgen Ambrosi
Nell'ambito del ciclo dei webinar CRUI, Commvault introduce il tema dell'adattamento delle strategie di data protection alle infrastrutture Cloud. Commvault tramite la propria piattaforma di Singular Information Management ha l’obiettivo di raggiungere un livello di protezione del dato il più elevato possibile. Abbinata alla piattaforma Microsoft Azure permette di trarre il massimo vantaggio possibile dal cloud e di garantire livelli di servizio convenienti, sicuri e flessibili. In un mercato in cui il cloud è il contesto di riferimento per la riduzione dei costi di capitale, l’uso della accoppiata Azure – Commvault permette di incrementare la velocità delle procedure, permettendo di risparmiare tempo e risorse.
La piattaforma Commvault è in grado di gestire semplicemente qualsiasi tipologia di ambiente composto da macchine fisiche, macchine virtuali, applicazioni,
desktop, laptop o cloud con la possibilità di accedere ai propri dati da semplici interfacce web o anche da applicazioni per smartphone e tablet.
Durante il seminario sono state illustrate le principali caratteristiche della piattaforma per valutarne la rilevanza per il Sistema dell’Istruzione e della Ricerca.
Getting Started with Amazon Inspector - AWS June 2016 Webinar SeriesAmazon Web Services
The flexibility and scale of the AWS Cloud and the emergence of DevOps have combined to allow developers to build and deploy applications faster than ever before. Assessing these applications for security risks without slowing down the development process can be a challenge with traditional vulnerability assessment tools designed for on-premises infrastructure. Amazon Inspector, an automated security assessment service, addresses this by integrating security assessments directly into the development process of applications running on Amazon Elastic Compute Cloud (Amazon EC2).
In this session, we will review Amazon Inspector for performing host security assessments and how it can become a seamless part of your devops lifecycle. We will run through a demo of setting up assessment targets and templates, installing the AWS agent, and running assessments. We will explore the findings generated by an assessment and discuss how you can automate the running of assessments.
Learning Objectives:
An overview and the value of Security Assessment testing with Amazon Inspector
How customer sign up for, configure, and use the service
Understand AWS Agent and assessment data security
Enterprise DevOps is different then DevOps in startups and smaller companies. This session how AWS/CSC address this. How AWS IaaS level automation via CloudFormation, UserData, Console, APIS and some PaaS OpsWorks/Beanstalk is complimented by CSC Agility Platform. CSC Agility adds application compliance and security to the AWS infrastructure compliance and security. CSC Agility allows for the creation of architecture blueprints for predefined application offerings.
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)Amazon Web Services
Cloud governance is critical to executing a systemic, supportable, and sustainable cloud transformation strategy. This session explores best practices to achieve that model, including standards policies, automation that consistently applies and enforces policies and controls, self-service capabilities that enable agility and speed, and automated monitoring and cost management that ensure operational integrity. A well-developed cloud governance model enables customers to improve operational integrity, reliability, performance, and transparency using the AWS cloud. This session guides you through a best practice governance model, including policy considerations and recommendations, self-service automation methods towards IT-as-a-Service, and use case examples.
Why are agencies struggling to drive digital business strategy?Ian Crocombe
As we move into the digitally connected age, progressive brands are moving digital beyond the marketing team and into the boardroom. With the growth of Labs programmes, Accelerators and Lean products, many agencies digital offerings are looking increasingly irrelevant. We’ll look at the trends, tools and models that agencies can use to maintain their role as a trusted strategic partner.
AWS re:Invent 2016: Preparing for a Large-Scale Migration to AWS (ENT212)Amazon Web Services
Many organizations rely on a TCO calculation to build a business case for migration to the Cloud. Unfortunately, this approach overlooks organizational readiness and wider economic factors, such as the total cost and the benefits of migration. This session provides executives with a toolkit for measuring readiness and developing a compelling business case.
Get Informed About Cloud Computing for Enterprise IT by Opus Interactivejerianasmith
If you’re still getting up to speed on the benefits of cloud computing, you’re not alone. The 2012 Cloud Computing Outlook Survey revealed that 61% of organizations are in the information gathering or planning stages or have an approved cloud computing strategy.
Opus Interactive conducted a live webinar that provides valuable information to help your enterprise take advantage of cloud computing to secure data, save money and meet business goals.
From the Amazon Web Services Singapore & Malaysia Summits 2015 Track 1 Breakout, 'The Journey to Digital Enterprise' Presented by Daniel Angelucci, CTO, CSC AMEA
The migration of legacy applications and databases to the cloud is always a challenging activity. However, with the right strategy and meticulous execution, workload migration can be made seamless.
At CCS Technologies, we manage all technical, service, and commercial aspects of migrating your legacy systems to the cloud. Our team of experts offers guidance on suitable migration strategies for moving data and applications from on-premise to the cloud, or for moving from one cloud service provider to another. We take care of every aspect of migration and leave you with a hassle-free optimized setup on the cloud with zero downtime.
Know more: https://ccs-technologies.com/infra-cloud-services/#ics_cs
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...Amazon Web Services
Does moving core business applications to AWS make sense for your organization? This session covers key business and IT considerations gathered from industry experts and real-world enterprise customers who have chosen to move their mission critical ERP applications to the AWS cloud, resulting in lower costs and better service.
This session covers the following:
- Insights from industry experts and analysts, who explain how the cloud affects costs from three angles: launch, operations, and long-term infrastructure expense
- Review of how time-to-value and cloud launch processes differ from on-premises infrastructure
- How AWS offers increased security and reliability over what some enterprises can afford on their own
Sponsored by Infor
Developers are constantly seeking an easier and faster way to build and ship new and modern software features and capabilities based on the latest and greatest cloud APIs. DevOps teams and IT professionals, on the other hand, face the challenge of controlling security, compliance, performance, scalability, and availability of the underlying infrastructure environments. Can both of these initiatives be achieved?
These slides based on the webinar featuring Torsten Volk, research director at leading IT analyst firm EMA, highlight how to bridge the gap between these two key initiatives and transform corporate IT into an accelerator for digital transformation.
Check Point Software Technologies: Secure Your AWS WorkloadsAmazon Web Services
Hosting workloads on AWS provides organizations with agility, speed, efficiency, and reduced costs. Check Point vSEC further enhances this experience by delivering advanced, multi-layered threat prevention security for your AWS workloads, protecting assets and enabling secure connectivity from enterprise networks to your AWS resources. Register for our upcoming webinar to learn how Check Point vSEC on AWS provided customers with an advanced threat prevention solution to enable secure application delivery. Learn how to migrate your applications and workloads to AWS with vSEC’s comprehensive security solution tailored to help protect your cloud environment.
Join us to learn:
• How Check Point vSEC enabled customers to confidently migrate from an on-premises infrastructure to AWS
• How to prevent network attacks and data breaches when hosting workloads in a cloud-based environment
• How Courtagen Life Sciences secured their cloud environment to maintain compliance, reduce IT expenses and leverage the full capabilities of the AWS Cloud
Who should attend:
IT Admins, Security Admins, Cloud Admins, Business Decision Makers, Compliance & governance officers, Line of Business leaders, DevOps engineers & architects
The Accenture Cloud Innovation Center harnesses the full potential of Cloud to custom build latest generation solutions for our clients. Commvault has partnered with ACIC to prototype solutions mainly focusing on three of its products:
- Hybrid Cloud Distributed Microservices on Software Defined Infrastructure
- Workloads and Migration Management in Hybrid Cloud Context
- E-Discovery and Automation for GDPR Compliance.
The use cases main topics are: Data Center Modernization & Cloud Foundation Engineering and Application Cloud Engineering & Digital Transformation.
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM CloudMichael Elder
Delivering quickly means leaving automation across applications and infrastructure as a wholistic approach to development, test, and operations. At IBM, we've made it easy to extend your existing VMware platform onto IBM Cloud - from provisioning new VMware clusters with vRealize Automation management all the way through deploying and operating your applications using IBM UrbanCode Deploy, the market leading DevOps release automation provider. We'll show you how to optimize existing app delivery processes without significantly re-architecting what you're running today. We will demonstrate how the creation of infrastructure automation can be done seamlessly onto the Cloud Foundation platform with direct UrbanCode integration into vRealize.
BigFix Multicloud Management is a single solution to manage and secure cloud workloads across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform, eliminating the need to acquire and deploy each cloud provider’s native services. Now continuously discover all cloud instances; apply patches, and track security configurations and software inventory to ensure workloads meet security and compliance standards. The same infrastructure is leveraged to manage cloud workloads and on-premise endpoints, significantly reducing administration overhead while consistently meeting security and compliance requirements.
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
Il Forecasting è un processo importante per tantissime aziende e viene utilizzato in vari ambiti per cercare di prevedere in modo accurato la crescita e distribuzione di un prodotto, l’utilizzo delle risorse necessarie nelle linee produttive, presentazioni finanziarie e tanto altro. Amazon utilizza delle tecniche avanzate di forecasting, in parte questi servizi sono stati messi a disposizione di tutti i clienti AWS.
In questa sessione illustreremo come pre-processare i dati che contengono una componente temporale e successivamente utilizzare un algoritmo che a partire dal tipo di dato analizzato produce un forecasting accurato.
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
La varietà e la quantità di dati che si crea ogni giorno accelera sempre più velocemente e rappresenta una opportunità irripetibile per innovare e creare nuove startup.
Tuttavia gestire grandi quantità di dati può apparire complesso: creare cluster Big Data su larga scala sembra essere un investimento accessibile solo ad aziende consolidate. Ma l’elasticità del Cloud e, in particolare, i servizi Serverless ci permettono di rompere questi limiti.
Vediamo quindi come è possibile sviluppare applicazioni Big Data rapidamente, senza preoccuparci dell’infrastruttura, ma dedicando tutte le risorse allo sviluppo delle nostre le nostre idee per creare prodotti innovativi.
Ora puoi utilizzare Amazon Elastic Kubernetes Service (EKS) per eseguire pod Kubernetes su AWS Fargate, il motore di elaborazione serverless creato per container su AWS. Questo rende più semplice che mai costruire ed eseguire le tue applicazioni Kubernetes nel cloud AWS.In questa sessione presenteremo le caratteristiche principali del servizio e come distribuire la tua applicazione in pochi passaggi
Vent'anni fa Amazon ha attraversato una trasformazione radicale con l'obiettivo di aumentare il ritmo dell'innovazione. In questo periodo abbiamo imparato come cambiare il nostro approccio allo sviluppo delle applicazioni ci ha permesso di aumentare notevolmente l'agilità, la velocità di rilascio e, in definitiva, ci ha consentito di creare applicazioni più affidabili e scalabili. In questa sessione illustreremo come definiamo le applicazioni moderne e come la creazione di app moderne influisce non solo sull'architettura dell'applicazione, ma sulla struttura organizzativa, sulle pipeline di rilascio dello sviluppo e persino sul modello operativo. Descriveremo anche approcci comuni alla modernizzazione, compreso l'approccio utilizzato dalla stessa Amazon.com.
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
L’utilizzo dei container è in continua crescita.
Se correttamente disegnate, le applicazioni basate su Container sono molto spesso stateless e flessibili.
I servizi AWS ECS, EKS e Kubernetes su EC2 possono sfruttare le istanze Spot, portando ad un risparmio medio del 70% rispetto alle istanze On Demand. In questa sessione scopriremo insieme quali sono le caratteristiche delle istanze Spot e come possono essere utilizzate facilmente su AWS. Impareremo inoltre come Spreaker sfrutta le istanze spot per eseguire applicazioni di diverso tipo, in produzione, ad una frazione del costo on-demand!
In recent months, many customers have been asking us the question – how to monetise Open APIs, simplify Fintech integrations and accelerate adoption of various Open Banking business models. Therefore, AWS and FinConecta would like to invite you to Open Finance marketplace presentation on October 20th.
Event Agenda :
Open banking so far (short recap)
• PSD2, OB UK, OB Australia, OB LATAM, OB Israel
Intro to Open Finance marketplace
• Scope
• Features
• Tech overview and Demo
The role of the Cloud
The Future of APIs
• Complying with regulation
• Monetizing data / APIs
• Business models
• Time to market
One platform for all: a Strategic approach
Q&A
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
Per creare valore e costruire una propria offerta differenziante e riconoscibile, le startup di successo sanno come combinare tecnologie consolidate con componenti innovativi creati ad hoc.
AWS fornisce servizi pronti all'utilizzo e, allo stesso tempo, permette di personalizzare e creare gli elementi differenzianti della propria offerta.
Concentrandoci sulle tecnologie di Machine Learning, vedremo come selezionare i servizi di intelligenza artificiale offerti da AWS e, anche attraverso una demo, come costruire modelli di Machine Learning personalizzati utilizzando SageMaker Studio.
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
Con l'approccio tradizionale al mondo IT per molti anni è stato difficile implementare tecniche di DevOps, che finora spesso hanno previsto attività manuali portando di tanto in tanto a dei downtime degli applicativi interrompendo l'operatività dell'utente. Con l'avvento del cloud, le tecniche di DevOps sono ormai a portata di tutti a basso costo per qualsiasi genere di workload, garantendo maggiore affidabilità del sistema e risultando in dei significativi miglioramenti della business continuity.
AWS mette a disposizione AWS OpsWork come strumento di Configuration Management che mira ad automatizzare e semplificare la gestione e i deployment delle istanze EC2 per mezzo di workload Chef e Puppet.
Scopri come sfruttare AWS OpsWork a garanzia e affidabilità del tuo applicativo installato su Instanze EC2.
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
Vuoi conoscere le opzioni per eseguire Microsoft Active Directory su AWS? Quando si spostano carichi di lavoro Microsoft in AWS, è importante considerare come distribuire Microsoft Active Directory per supportare la gestione, l'autenticazione e l'autorizzazione dei criteri di gruppo. In questa sessione, discuteremo le opzioni per la distribuzione di Microsoft Active Directory su AWS, incluso AWS Directory Service per Microsoft Active Directory e la distribuzione di Active Directory su Windows su Amazon Elastic Compute Cloud (Amazon EC2). Trattiamo argomenti quali l'integrazione del tuo ambiente Microsoft Active Directory locale nel cloud e l'utilizzo di applicazioni SaaS, come Office 365, con AWS Single Sign-On.
Dal riconoscimento facciale al riconoscimento di frodi o difetti di fabbricazione, l'analisi di immagini e video che sfruttano tecniche di intelligenza artificiale, si stanno evolvendo e raffinando a ritmi elevati. In questo webinar esploreremo le possibilità messe a disposizione dai servizi AWS per applicare lo stato dell'arte delle tecniche di computer vision a scenari reali.
Amazon Web Services e VMware organizzano un evento virtuale gratuito il prossimo mercoledì 14 Ottobre dalle 12:00 alle 13:00 dedicato a VMware Cloud ™ on AWS, il servizio on demand che consente di eseguire applicazioni in ambienti cloud basati su VMware vSphere® e di accedere ad una vasta gamma di servizi AWS, sfruttando a pieno le potenzialità del cloud AWS e tutelando gli investimenti VMware esistenti.
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
Molte aziende oggi, costruiscono applicazioni con funzionalità di tipo ledger ad esempio per verificare lo storico di accrediti o addebiti nelle transazioni bancarie o ancora per tenere traccia del flusso supply chain dei propri prodotti.
Alla base di queste soluzioni ci sono i database ledger che permettono di avere un log delle transazioni trasparente, immutabile e crittograficamente verificabile, ma sono strumenti complessi e onerosi da gestire.
Amazon QLDB elimina la necessità di costruire sistemi personalizzati e complessi fornendo un database ledger serverless completamente gestito.
In questa sessione scopriremo come realizzare un'applicazione serverless completa che utilizzi le funzionalità di QLDB.
Con l’ascesa delle architetture di microservizi e delle ricche applicazioni mobili e Web, le API sono più importanti che mai per offrire agli utenti finali una user experience eccezionale. In questa sessione impareremo come affrontare le moderne sfide di progettazione delle API con GraphQL, un linguaggio di query API open source utilizzato da Facebook, Amazon e altro e come utilizzare AWS AppSync, un servizio GraphQL serverless gestito su AWS. Approfondiremo diversi scenari, comprendendo come AppSync può aiutare a risolvere questi casi d’uso creando API moderne con funzionalità di aggiornamento dati in tempo reale e offline.
Inoltre, impareremo come Sky Italia utilizza AWS AppSync per fornire aggiornamenti sportivi in tempo reale agli utenti del proprio portale web.
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
Molte organizzazioni sfruttano i vantaggi del cloud migrando i propri carichi di lavoro Oracle e assicurandosi notevoli vantaggi in termini di agilità ed efficienza dei costi.
La migrazione di questi carichi di lavoro, può creare complessità durante la modernizzazione e il refactoring delle applicazioni e a questo si possono aggiungere rischi di prestazione che possono essere introdotti quando si spostano le applicazioni dai data center locali.
In queste slide, gli esperti AWS e VMware presentano semplici e pratici accorgimenti per facilitare e semplificare la migrazione dei carichi di lavoro Oracle accelerando la trasformazione verso il cloud, approfondiranno l’architettura e dimostreranno come sfruttare a pieno le potenzialità di VMware Cloud ™ on AWS.
Amazon Elastic Container Service (Amazon ECS) è un servizio di gestione dei container altamente scalabile, che semplifica la gestione dei contenitori Docker attraverso un layer di orchestrazione per il controllo del deployment e del relativo lifecycle. In questa sessione presenteremo le principali caratteristiche del servizio, le architetture di riferimento per i differenti carichi di lavoro e i semplici passi necessari per poter velocemente migrare uno o più dei tuo container.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
2. What to Expect from the Session
• Demonstrate enterprise policy, governance, and security capabilities
that support the deployment and management of enterprise and
industry applications on AWS using CSC’s Agility Platform
• Demonstrate the value of blueprinting enterprise applications and
environments
• Demonstrate secure and managed connectivity to AWS
• Present how CSC provides agile and consumption-based endpoint
security for workloads in AWS providing enterprise management and
24x7 monitoring of workload compliance, vulnerabilities, and potential
threats
3. The Market Is Embracing an Application-Centric, Hybrid Cloud Model
Business execs demand greater IT
agility and innovation
This is fostering greater adoption of
hybrid cloud models
71% say their
organizations need to
embrace new technology or
lose market share
47% of businesses
are making technology and
cloud decisions without getting
the IT department involved
… and sidestepping enterprise governance
controls when central IT doesn’t deliver
… and a shift to cloud platforms and
apps, not just infrastructure
Projected allocation of cloud spend
2013 – 2015
Hybrid
43% Private
25%Public
32%
4. Forward-Thinking IT Organizations Are Adopting Hybrid Cloud Operating
Models to Provide IT as a Service
Virtualize Automation Hybrid Clouds IT as a Service
Improve
asset
utilization and
ROI
Defer data
center build-
outs
Launch initial
private cloud
Self-service access
and on-demand
provisioning
Policy-driven
cloud
governance
Compressed
SDLC and tool
chain
automation
IaaS and PaaS
standardization
Fully
transparent and
auditable
service usage
Broadly adopt utility
cost model with
chargeback
Redundant service
options with low
switching costs
Optimize
variable-to-
fixed costs by
project
Transparent linkage
of demand,
capacity, and costs
5. • Accelerate AWS benefits to the enterprise, while ensuring compliance with IT
standards, governance, and security requirements
• Expand cloud service portfolios to enterprise platforms and apps (not just
IaaS), available on a self-service, on-demand basis directly to the end users that
need them
• Rapidly obtain the benefits of hybrid environments using a pay-as-you-go OPEX
model and CSC managed services, rather than attempt to build internally with scarce
skills/capital
+Amazon is the undisputed public
cloud market share leader and is
innovating faster than anyone else in
public cloud.
CSC has the market-leading cloud
management and orchestration platform
and strong expertise in enterprise
application migration to cloud.
CSC Enterprise Cloud Services For AWS
The AWS and CSC Partnership
6. INCLUDED:
BizCloud
BizCloud HC
INCLUDED:
Public
Clouds
Private
Clouds
Dev Test Prod
IaaS
Platforms
Apps
Store SDLC Tools
CSC Agility Platform as a Service For AWS
Manage/Govern Enterprise IT Services Across Hybrid Environments
• Pay-as-you-go model
• CSC Agility Platform provided as-a-Service
• CSC-managed services including
consolidated billing, helpdesk, and OS-
level services
• Integrated hybrid cyber-security model
• Extensible policy engine for cloud
governance
• Cloud-portable blueprints for applications
and platforms
• Additional public and private cloud
adapters available
7. CLOUD-PORTABLE
BLUEPRINTS
POLICY-DRIVEN
GOVERNANCE
APPLICATION RELEASE
AUTOMATION (ARA)
Put platforms and apps in
“cloud-portable blueprints.”
Embed IT standards
Use policies to automate
governance/compliance,
right sizing, right placement, etc.
Consume cloud IT services
not just from storefronts, but
directly from SDLC tooling
Accelerating Benefits Using CSC Agility Platform
Others…
BroadCloud
Support
CSC
8. CSC Managed Hybrid Cloud Service
The CSC Managed Hybrid Cloud service provides secure dedicated access between on-premises
infrastructure and the AWS Cloud. IT organizations easily migrate workloads and take advantage of cost
savings when allocating resources for dynamic projects. The CSC Managed Hybrid Cloud service
integrates technology from AWS, Brocade, AT&T, and Intel:
• AWS: Customers use AWS DirectConnect to establish private connectivity between AWS and data
centers, offices, or colocation environments.
• Brocade vRouter and the Brocade vADC: Provides additional secure access, reliability, advanced
networking, and application performance across on-premises infrastructure into an AWS VPC using
IPsec, vRouting, and application load balancing. Brocade leverages Data Plane Development Kit
(DPDK) to deliver performance, boosting packet processing and throughput.
• AT&T Netbond: Allows direct provisioning of 1G and 10G high-speed connections to an AWS VPC
within the AWS cloud infrastructure and global availability zones.
• Intel® Xeon® E5 processor: Enables Amazon EC2 to increase networking capabilities.
9. CSC Hybrid Cloud Service – A Cloud
Networking Strategy Foundation
• Low-latency, on-net, fully
redundant
• Any-to-any, instant-on
connectivity
• Eliminate data center hairpin
PERFORMANCE
• Private IP address space avoids
Internet/DDoS threats
SECURITY
• API controlled for on-demand
adds and bandwidth changes
AGILITY
• Scales dynamically with cloud
usage; elasticity creates added
pricing value
ELASTICITY
• Save as much as 60% on
networking
• Cost model aligns with cloud
usage
COST-EFFECTIVENESS
A network-enabled cloud solution with performance and security
10. Big Data Platform as a Service
APP 3
Flexible Deployment
OptionsPublic
Cloud
Virtual
Private Cloud
Dedicated
Cluster
Enterprise
Private Cloud
CSC Big Data Platform as a Service
APP 1
APP 2
REAL
TIMEBATCH
AD HOC
Fully Managed as a Service
Comprehensive, proactive infrastructure, and software
management eliminates the most frustrating reason open source
big data solutions fail: operational complexity.
Big Data Expertise and Experience
We have been working with Hadoop, Cassandra, and Mongo since
2011 and have implemented and managed more than 150 big data
clusters.
The Only PCI & HIPAA Compliance Certified SI Solution
CSC is the first and only solutions integrator to meet stringent PCI
and HIPAA certification standards with an open big data solution.
Integrated Audit Monitoring and Comprehensive Security
Every solution has comprehensive security activity and audit
capabilities out of the box, and can be fully configured with the
latest security features, from infrastructure to application.
Real-Time, Streaming, and In-Memory Capabilities
We have the broadest set of capabilities in the market, including
deep expertise in installing, managing, and developing big and fast
data analytics.
13. Top Challenges Facing Cloud Customers:
Why Should CSC’s Customers Care?
• Increased scrutiny and responsibility following
high-profile cloud breaches
• New regulatory demands to better protect
cloud-hosted data
• Existing regulations increasingly applied to cloud
environments
• Require consistent security across workloads in
an agile environment
• Increased criminal attention on cloud assets due
to their increased adoption
• Greater threat to intellectual property as
enterprises host off-premises
• “Need to protect my cloud workloads at same
level as my traditional systems”
• Costs growing as internal IT security
infrastructure expands
• Expanding skilled resources required to manage
security of cloud assets
OPERATIONS
ADVANCED
THREATS
RISK AND COMPLIANCE
NEXT-GEN TECHNOLOGIES
• Require visibility of all assets, regardless of
location or cloud provider
• Cloud expected to be cheaper than traditional —
in reality, security bogs down cost, eliminates
savings
• Growing risk exposure as virtual workloads
increase
14. SUN MON TUE WED THU FRI SAT
Hosted Intrusion Detection
(HID) Costs (7 days)
PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Vulnerability Mgmt. Costs
(7 days)
PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Tech. Compliance
(7 days)
PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Client Cost Implications in As-Is Model
Cost of traditional cybersecurity solution relative to overall workload cost
COST OF SECURITY
IS OVERWHELMING
PAY 100%
REGARDLESS OF USAGE
PAY FOR MULTIPLE
SECURITY CONTROLS
15. Self-Managed Cloud Workload Security
Company A
Public
Private
HR Payroll
HIPAA
Big Data Germany
Production
Dev/Test
Production PCI
Amazon Web Services
Traditional IT
Endpoint
Security
SIEM
Vuln.
Scanning
Payroll
HR
HIPAASales
Dev/Test
Managed
Workloads
Rogue
Systems
Security
Policies
16. CSC Cloud Security Services
On-Demand Workload Protection—Powered by CloudPassage
Security Information and Event Management (SIEM)
Pulse Advanced Reporting
Policy Creation, Configuration, and Management
Email-Based Alerting
Account Setup and Management
Complete Management of Cloud Workload Security
Monitored
(Optional)
Consulting
(Optional)
Managed
CSC CLOUD SECURITY SERVICES
Configuration
Security Monitoring
Software
Vulnerability
Assessment
Log-Based Intrusion
Detection
Workload Firewall
Management
System Account
Management
File Integrity
Monitoring
17. Meet All Critical Control Objectives
Gain visibility into enterprise and individual asset security posture
Uncover and manage vulnerabilities and configuration issues
Get immediate reports showing open issues against CIS benchmarks
Do this across an entire account or department, or by type of system
Data Protection
Compromise
Management
Operational
Automation
Visibility
Strong Access
Control
Vulnerability
Management
Ultra-
lightweight
SaaS Based
Workload-Level
Security
Micro-
segmentation
Instant On
BENEFITS
FEATURES
18. Consumption-Based Pricing Lowers Operating Costs
Cost of traditional cybersecurity solution relative to overall workload cost
SUN MON TUE WED THU FRI SAT
Hosted Intrusion Detection
(HID) Costs (7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Vulnerability Mgmt. Costs
(7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Tech. Compliance
(7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Customer Workload Costs
(3 days)
OFF OFF OFF WED THU FRI OFF
SUN MON TUE WED THU FRI SAT
On-Demand Workload
Protection (3 days)
OFF OFF OFF
PROTECT PROTECT PROTECT
OFF
Customer Workload Costs
(3 days)
OFF OFF OFF WED THU FRI OFF
Cost of On-Demand Workload Protection (OWP)
ConsolidationbyOWP
19. CSC-Managed Cloud Workload Security with OWP
CSC Proprietary Pulse
Portal
Company A
CSC Risk Management Center (RMC)
Managed
Workloads
Rogue
Systems
Security
Policies
Public
Private
PayrollHR
Dev / Test
Germany
PCI
HIPAA
Production
Big Data Nodes
20. Digital Trust: Your Future State
CSC ON-DEMAND WORKLOAD
PROTECTION
Reduce cost and complexity
Enable secure adoption of
virtual technologies
Evaluate compliance with
regulatory requirements
Provide full visibility across
cloud workloads
Securely harness cloud’s flexibility
and consumption-based model
Monitor and respond to threats
24x7x365
21. Why CSC for On-Demand Workload Protection
Global scale
Threat intelligence
24x7 Global SOCs
1,000s of experts
CSC named a Leader in IDC MarketScape
Asia/Pacific Managed Security Services 2015
Vendor Assessment
Consumption-based pricing —
not just in technology, but for services
Enterprise-grade management
and scalability
Customer/App/Regulation-specific
policies
24x7x365 SIEM — monitoring
and investigation
Pulse Customer Portal
22. We Understand Cybersecurity
GLOBAL CYBERSECURITY
PROFESSIONALS
2,000+
INTEGRATED
GLOBAL RISK
MANAGEMENT
CENTERS
5+
YEARS PROVIDING
CYBERSECURITY
SERVICES
35+
GLOBAL ALLIANCE
PARTNERS PROVIDING
SECURITY EXPERTISE
15+
PUBLIC &
PRIVATE
SECTOR
EXPERTISE
Nearly 40 years of experience in delivering
secure, managed enterprise services
Successfully supporting the world’s most security-
conscious clients, including aerospace and
defense, and banking and financial institutions
worldwide
Helping 250+ clients manage risk and overcome
the most extreme threats
Integrated global Risk Management Centers
IT security experts with in-depth experience
End-to-end visibility of customer’s enterprise
governance and compliance posture
UK
Noida
Kuala
Lumpur
Sydney
Newark
23. CSC Proprietary Pulse Portal
24x7x365 visibility
Immediate access to detailed logs and
incident data
Executive-oriented dashboard
Performance metrics
Simple user-querying methods
Correlation of incident and vulnerability
data to provide enterprise-wide
“Situational Awareness”
EXAMPLE VIEWSPORTAL FEATURES