How to configure and track deployments, identify issues, and measure performance optimizations

Learn how with the right tools and workflow in place, you can deploy code at speed, while ensuring your customers are having a lightning-fast experience. Go beyond error monitoring and see first-hand how the experts from Octopus and Raygun seamlessly configure deployments, identify and resolve issues, and measure performance optimizations in real-time.

Monitoring virtualization platforms and networks

Small and large businesses alike, opt for virtualization to optimize resource management. While you have a whole list options such as VMware, Hyper-V and Nutanix, monitoring them for their availability is just as important. Watch this webinar and learn how monitoring virtualization platforms and the underlying network infrastructure works to your benefit.

Seamlessly Immunize Binaries Flowing through Artifactory with RunSafe Alkemist

In this webinar, RunSafe and JFrog will introduce cutting-edge security techniques, allowing users to protect both source and binary code flowing through their pipelines from memory based attacks. Includes a walkthrough of a real world exploit where Alkemist was successful at mitigating the attack in Apache/PHP.

SOC Quarantine Diaries: Keven Knight of Sy4 on Opening a SOC in 2020

In Ep. 5 of SOC Quarantine Diaries, Knight joins us to discuss the benefit for an MSSP to retain a physical SOC presence (7:10), the nefarious opportunities that the rise in remote workers and devices on the network have given cybercriminals (10:05), and how collaboration among personnel of varying security operations disciplines can continue effectively in the era of coronavirus (22:30), plus much more.

Are we all on the same page? Let's fix that. | Luis Mineiro on 99 Percent Visible

The industry has defined it as good practice to have as few alerts as possible, by alerting on symptoms that are associated with end-user pain rather than trying to catch every possible way that pain could be caused. Organizations with complex distributed systems that span dozens of teams can have a hard time following such practice without burning out the teams owning the client-facing services. A typical solution is to have alerts on all the layers of their distributed systems. This approach almost always leads to an excessive number of alerts and results in alert fatigue.

Tanzu Tuesdays - Production-Ready Kubernetes Clusters with VMware Tanzu - Tiffany Jernigan

An expanded version of her Spring One talk: Make Your Kubernetes Clusters Production-Ready with VMware Tanzu When you first started experimenting with Kubernetes, you may have started locally or on a set of servers. With simple applications, you may only have used a container registry and Kubernetes itself. When looking to move your clusters to a production setting, there are many more considerations, such as: How will I manage my clusters? How do I handle monitoring and logging? How do I safely back up my cluster resources? How do I ensure that my container images are safe and secure?

Network Policy with GKE

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.