Get the premiere industry report that quantitatively defines the state of the modern application stack and the shift in technology used by enterprises adopting Cloud and DevSecOps. Cloud Architects, Operations/DevOps teams as well as Security Operations teams and practitioners can leverage this report as they look to effectively and securely build, run and secure modern applications and cloud infrastructures.
Modern financial services company Snoop uses open banking and artificial intelligence (AI) to analyze customers’ transactions and spending. But as the volume, variety, and sensitivity of data it manages increases, so does the complexity. Watch this “fireside chat” style webinar to learn how to gain unified visibility across your Amazon Web Services (AWS) infrastructure. Listen as experts from Snoop, Sumo Logic, and AWS share tips and tools to help you glean game-changing insights in real time, economically, and at scale.
Join YourStory’s Shradha Sharma in conversation with Abhinav Gupta, Senior Director of Engineering, Razorpay, Rahul Goyal, Senior Vice President of Engineering, Goibibo, Abhishek Mahanty, Senior Solutions Architect at Amazon and Sumo Logic’s Co-founder and CTO Christian Beedgen. They will uncover how Continuous Intelligence helps to find and solve information gaps, and how a single platform approach allows them to combine devs, operations and security in ways that ease the burden for all teams across the organisation during this intense time of transition and transformation.
Now, more than ever, organizations around the world see the clear need for scalable, cloud-native apps and services to support business productivity during rapidly changing times. As a result, security teams are on the hook to adjust their security posture as the attack surface grows and their organization’s systems are increasingly migrated to the cloud. Join Sumo Logic Director of Product Marketing Dana Torgersen as he demonstrates the many features of Sumo Logic's cloud-native Security Intelligence, including the ability to analyze AWS logs for threats and monitor data access by users, devices & locations.
Operational analytics is of vital importance to IT organizations today. With complex hybrid infrastructures and dynamic workloads commonplace in many businesses, the ability to monitor important metrics like application performance requires a level of automation and analysis that can quickly turn data into useful information for your IT team.
Early on in the "cloud," Werner Vogels made his famous quote "You Build It, You Run It". With DevOps we learned that this became a mantra for shared responsibility between developers and operations. Operations learned how to process infrastructure as code and participate early in the supply chain of a service's life cycle. Developers learned that they had responsibilities to enable and in some cases operationalize their service. Now there is a new movement to include and collaborate in a similar way with Security. This is all part of an "everything" shift left ideal. Developers and operations are taught the importance of including security in the stories and all parts of the delivery pipeline including security gates as well as code test gates. Listen in on this session featuring DevSecOps expert, John Willis, as he goes through an introduction to DevSecOps. We discuss: Why traditional DevOps has shifted and what this shift means How DevSecOps can change the game for your team Tips and tricks for getting DevSecOps started within your organization About the Speaker: John Willis is VP of DevOps and Digital Practices at SJ Technologies. Prior to SJ Technologies he was the Director of Ecosystem Development for Docker, which he joined after the company he co-founded (SocketPlane, which focused on SDN for containers) was acquired by Docker in March 2015. Previous to founding SocketPlane in Fall 2014, John was the Chief DevOps Evangelist at Dell, which he joined following the Enstratius acquisition in May 2013. He has also held past executive roles at Opscode/Chef and Canonical/Ubuntu. John is the author of 7 IBM Redbooks and is co-author of the “DevOps Handbook” and the upcoming Beyond the Phoenix Project.
Agility is the cornerstone of the DevOps movement. Developers are working to continuously integrate and deploy (CI/CD) code to the cloud to ensure applications are seamlessly updated and current. But what about ensuring they are secure? Security best practices and compliance are now the responsibility of everyone in the development lifecycle, and continuous security is a critical component of the ongoing deployment process. The challenge is that not everyone knows how to integrate these two camps in a seamless and successful manner. Listen in on this session for an interactive webinar featuring George Gerchow, VP of Security and Compliance at Sumo Logic and DevSecOps evangelist, to discover how to: Incorporate fundamental and high impact security best practices into your current DevOps operations Gain visibility into your compliance posture Identify potential risks and threats in your environments
Today’s leading enterprises are striving to deliver high performance, highly scalable and always-on digital services. Built using a host of modern tools including microservices, multiple cloud platforms, containers and DevOps practices, these apps present new challenges for operations teams when it comes to understanding and driving performance. Although IT operations analytics (ITOA) tools bring visibility to IT teams, they don’t operate well in today’s complex and heterogeneous environments. A new breed of ITOA solutions (ITOA 2.0), driven by advancements in machine learning and big-data technologies are poised to better respond to the needs of IT pros responsible for the modern complex applications. In this webinar, we will discuss: •The driving factors behind the evolution of ITOA to ITOA 2.0 •How machine learning and analytics play a central role •Why correlation of logs and metrics is becoming critical for monitoring tools •How organizations can leverage ITOA 2.0 technologies to reduce mean time to identify the source of problems and repair them
DevSecOps means everyone is responsible for security and compliance from Day 1. A DevSecOps culture is a must to maintain speed, agility and innovation while simultaneously meeting regulations and staying ahead of attacks. Learn how to bake it into your technology’s DNA from Day 1. Ultimately, the challenge is to deal with imminent cloud-based attacks, whilst having visibility into processes in order to safeguard user and corporate information. This is easiest, and most scalable, under the mantra of DevSecOps. Do it from Day 1, and you won’t regret it on Day 1,000. In this session, George will share best practice of how companies have achieved this, as well as the benefits they have realised -- and potential catastrophes they have avoided. Some of the key takeaways will include: How DevSecOps is changing how organisations approach security and compliance A practitioners' guide to Securing the Cloud and Demystifying GDPR How to successfully implement and maintain a DevSecOps culture
Microservices are front and center on every company’s IT operations radar. It’s an approach very different from its monolithic predator, and much of it goes against the grain of traditional thinking. It has modular, independent components and teams, yet it requires complete company involvement and end-to-end management. To some, its “iterative development” approach (multiple cycles of redevelopment for the same service) resembles repetitive failure rather than ongoing learning. Yet industry giants like Amazon and Netflix have made great strides with it. So, is microservices the answer? What are the pitfalls? Is this the path you really want to lead your company down? Is it worth the transition from monolithic, and if so, what should you look out for? For the answers to all these questions and more, listen in to this engaging webinar featuring JP Morgenthal, Managing Editor of Microservices Journal, and a specialist in the integration of people and technology in the business sphere, as they discuss the ins and outs of microservices, including: Common pitfalls of microservices Management, sprawl, and decomposition How to avoid microservices pitfalls