Sign up for a live Kubernetes or DevSecOps demo

Click here

Resource Center

Browse our library of ebooks, solutions briefs, research reports, case studies, webinars and more.

Webinar resources

18 of 42 results

Webinar

The 2019 Accelerate State of DevOps Report Webinar

Webinar

Rethink Your Analytics: Don't be fooled by cloud washing [FREE On-Demand Webinar]

Webinar

Extend Your Operational Analytics Beyond IT and Improve Your Business Outcomes

Webinar

DevSecOps Challenges in a Cloud Native World

Webinar

The Kubernetes Phenomenon: More Than Just A Technology

Webinar

You Build It, You Secure It: Introduction to DevSecOps

Early on in the "cloud," Werner Vogels made his famous quote "You Build It, You Run It". With DevOps we learned that this became a mantra for shared responsibility between developers and operations. Operations learned how to process infrastructure as code and participate early in the supply chain of a service's life cycle. Developers learned that they had responsibilities to enable and in some cases operationalize their service. Now there is a new movement to include and collaborate in a similar way with Security. This is all part of an "everything" shift left ideal. Developers and operations are taught the importance of including security in the stories and all parts of the delivery pipeline including security gates as well as code test gates. Listen in on this session featuring DevSecOps expert, John Willis, as he goes through an introduction to DevSecOps. We discuss: Why traditional DevOps has shifted and what this shift means How DevSecOps can change the game for your team Tips and tricks for getting DevSecOps started within your organization About the Speaker: John Willis is VP of DevOps and Digital Practices at SJ Technologies. Prior to SJ Technologies he was the Director of Ecosystem Development for Docker, which he joined after the company he co-founded (SocketPlane, which focused on SDN for containers) was acquired by Docker in March 2015. Previous to founding SocketPlane in Fall 2014, John was the Chief DevOps Evangelist at Dell, which he joined following the Enstratius acquisition in May 2013. He has also held past executive roles at Opscode/Chef and Canonical/Ubuntu. John is the author of 7 IBM Redbooks and is co-author of the “DevOps Handbook” and the upcoming Beyond the Phoenix Project.

Webinar

Making the Shift from DevOps to Practical DevSecOps

Webinar

Analytics & Machine Learning Drive ITOA 2.0 for Better App Performance - Webinar

Webinar

We can’t “hold on a sec” - Webinar

Webinar

How to Avoid the Pitfalls of Microservices

Webinar

Trouble in the Land of Open Source

Webinar

Using the Search Job API

Webinar

Correlate Your Logs and Metrics to Improve Application Experience

Webinar

Bring your Graphite-compatible Metrics into Sumo Logic

Webinar

Implementing and Maintaining a DevSecOps Approach in the Cloud

It's no secret that continuous innovation and speed to market are mandating dynamic paradigm shifts in how companies conceive, develop and implement IT operations and security strategies. While this is all fine and well for the DevOps teams, for the folks managing security, these innovations bring up new challenges. Modern applications must be architected and managed with security in mind from the get-go, and building a SaaS offering that has security baked in is a whole new game. DevSecOps is the name of the game, but there isn't always a clear path to implementation and adoption. Between protecting against major attacks that arrive on a daily basis to maintaining compliance with strict regulations, leaving the boundaries of traditional IT can leave some security professionals quaking in their boots. Fear not, friends! There is a way to be secure and compliant in the cloud with the right approach. In this webinar, George Gerchow, VP of Security and Compliance at Sumo Logic, will do a deep dive into the steps it takes to successfully implement and maintain DevSecOps in your organization at scale. He will be discussing: What it took to build a world-class data analytics service on AWS from the ground up Technologies used to gain necessary operational and security visibility Tips and tricks to maintain optimal levels of performance, integrity and availability of the data How to best approach regulatory compliance in the cloud in pursuing certifications like PCI DSS, ISO 27001, CSA STAR, TRUSTe, SOC 2, Type 2, etc. Challenges encountered in the journey and how they were addressed

Webinar

Best Practices for Using and Managing AWS Lambda Services

Webinar

Protecting Your Applications and Data in AWS with Trend Micro and Sumo Logic

Webinar

Real-time AWS Visibility at Scale