Operations | Monitoring | ITSM | DevOps | Cloud

Elastic Security - Unified Protection for Everyone - Aug 13, 2020 Elastic meetup

Learn how the latest security capabilities in the Elastic Stack enable interactive exploration, incident management and automated analysis, as well as unsupervised machine learning to reduce false positives and spot anomalies — all at the speed and scale your security practitioners need to defend your organisation.

Splunk Redefines Application Performance Monitoring with SignalFx Microservices APM

Splunk has a new Application Performance Monitoring solution purpose-built for monitoring and observability in today’s app-driven world: SignalFx Microservices APM. Learn from Rick Fitz, SVP and GM of IT Markets, and Karthik Rau, Area GM for Application Management, about the new release of SignalFx Microservices APM and how it helps DevOps teams innovate faster, elevate customer experience, and future-proof applications — all while adopting cloud-native technologies and microservices architectures.

Bringing Threat Intelligence to Security Playbooks - Recorded Future and Splunk Phantom

Recorded Future is a longtime Splunk integration partner. Recorded Future's integration with Splunk Phantom allows them to empower security operations center (SOC) analysts with automated, real-time threat intelligence to drive smarter, faster security decisions.

What Are Traceroutes? | Obkio

What are Traceroutes and how exactly do they help you troubleshoot network problems? Traceroute is the most popular tool that network engineers use to troubleshoot network problems. It was invented in 1987 and is still highly relevant today. As its name suggests, the main purpose of a traceroute is to trace the IP route from a source to a destination inside an IP network. It shows users the round-trip latency from the source to each of the routers. Traceroute commands are available on almost any host.

Nationwide Building Society: Ensuring Continuous Quality for DevOps Success

DevOps promised that we could deliver more, faster, and with confidence. But blockers to adoption and transformation can make those goals hard to achieve. From disjointed toolchains to a lack of predictability and visibility - persistent challenges can make DevOps success elusive and frustrating. Join us for a discussion with Rich Jordan, Test Engineering Manager at Nationwide Building Society, the world’s largest building society.

How to Secure the network of your GKE Cluster

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.

How to Secure the network of your GKE Cluster

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.