In this session, David Ting, VP of Engineering at DataVisor, explores the latency challenges associated with a global client base and what can be learned when implementing a performance-improving solution.
D3SF17- Boost Your Website Performance with Application Delivery RulesImperva Incapsula
Incapsula introduced Application Delivery Rules (ADR) in October of 2016, but many clients have not tapped into their powerful abilities. In this session, Jeff Serota, Technical Account manager, provides an overview of ADR, discusses how they differ from IncapRules, and teaches you how to leverage them in your own Incapsula deployment.
D3SF17- Using Incap Rules to Customize Your Security and Access ControlImperva Incapsula
IncapRules are an integral method to customize Incapsula for your specific applications and environment. However, we find that our enterprise clients may have questions on building advanced rules or need help understanding how to write them for complex scenarios. In this session, Peter Klimek, Principal Security Engineer, discusses the interface, some of the most common filters and actions, and how a large client collaborated with our security team to thwart credential stuffing on their client self-service portal.
IncapRules are an integral method to customize Incapsula for your specific applications and environment. However, we find that our enterprise clients may have questions on building advanced rules or need help understanding how to write them for complex scenarios. In this session, Jeff Serota, Technical Account Manager, discusses the interface, some of the most common filters and actions, and how a large client collaborated with our security team to thwart credential stuffing on their client self-service portal.
Incapsula D3 - A Single Source of Truth for Security Issues - Pushing Siem L...Tirza DiOro
It can be challenging for security teams to cut through the clutter of SIEM logs in order to analyze security information and alerts. In this session, Bryan Jones, Senior Security Engineer, walks you through the 5 major configuration steps needed to help you better manage security issues across your entire tech stack.
A secure web server isn’t really secure if the infrastructure supporting it remains vulnerable. Unless you implement infrastructure protection, your non-HTTP assets are vulnerable and you may not be as protected as you think you are.
You may be like others who need to get better DDoS protection but haven’t been able to or had to settle for an imperfect solution because of deployment limitations such as protocol dependencies and BGP restrictions. Incapsula IP Protection has now overcome these barriers — and we are the only service that can do it.
At this webinar our product experts will discuss how Incapsula customers are adopting IP Protection and bringing their DDoS protection to the next level. We’ll also have a discussion with Imperva CISO Shahar Ben-Hador who will share insights on how we use IP Protection and real-world lessons learned.
You need to protect more than just your web servers from DDoS attacks. We’ll address these questions:
Why do you need to protect more than just your web servers?
What were the limitations others ran into when they tried to do it?
How did Incapsula help them overcome the limitations?
...and much more!
You’ve seen the headlines—"[Well-Known Company] Falls Victim To Hackers".
These data breaches result in the theft of millions of names, passwords, credit card numbers, and other personal data. Imagine if such a breach lead to the theft of your application's data. . .
If multi-national companies with dedicated security teams and expansive budgets aren’t immune to the impact of hackers, how can you adequately prepare yourself to defeat this threat?
This presentation will explore the web application threat landscape. It will zero in on some of the most common attacks wreaking havoc on the internet, teaching you how to defend your online assets from them.
This presentation will discuss:
• The major security breaches of 2014
• Web application threats and common attack types
• How to defend against today’s common attacks
• Automated tools to help simplify website security
ThousandEyes Alerting Essentials for Your NetworkThousandEyes
ThousandEyes provides network monitoring and alerting capabilities. Alerts are triggered based on conditions defined in alert rules, which specify tests, thresholds, and notification policies. Alerts can be configured for various network and application scenarios based on factors like loss, latency, routing changes, DNS issues, page load times, and more. Notifications can be sent by email, PagerDuty integration, or custom webhooks. The system aims to reduce false positives through configurable filtering and requiring multiple failed tests. Historical alert data is also available.
D3SF17- Boost Your Website Performance with Application Delivery RulesImperva Incapsula
Incapsula introduced Application Delivery Rules (ADR) in October of 2016, but many clients have not tapped into their powerful abilities. In this session, Jeff Serota, Technical Account manager, provides an overview of ADR, discusses how they differ from IncapRules, and teaches you how to leverage them in your own Incapsula deployment.
D3SF17- Using Incap Rules to Customize Your Security and Access ControlImperva Incapsula
IncapRules are an integral method to customize Incapsula for your specific applications and environment. However, we find that our enterprise clients may have questions on building advanced rules or need help understanding how to write them for complex scenarios. In this session, Peter Klimek, Principal Security Engineer, discusses the interface, some of the most common filters and actions, and how a large client collaborated with our security team to thwart credential stuffing on their client self-service portal.
IncapRules are an integral method to customize Incapsula for your specific applications and environment. However, we find that our enterprise clients may have questions on building advanced rules or need help understanding how to write them for complex scenarios. In this session, Jeff Serota, Technical Account Manager, discusses the interface, some of the most common filters and actions, and how a large client collaborated with our security team to thwart credential stuffing on their client self-service portal.
Incapsula D3 - A Single Source of Truth for Security Issues - Pushing Siem L...Tirza DiOro
It can be challenging for security teams to cut through the clutter of SIEM logs in order to analyze security information and alerts. In this session, Bryan Jones, Senior Security Engineer, walks you through the 5 major configuration steps needed to help you better manage security issues across your entire tech stack.
A secure web server isn’t really secure if the infrastructure supporting it remains vulnerable. Unless you implement infrastructure protection, your non-HTTP assets are vulnerable and you may not be as protected as you think you are.
You may be like others who need to get better DDoS protection but haven’t been able to or had to settle for an imperfect solution because of deployment limitations such as protocol dependencies and BGP restrictions. Incapsula IP Protection has now overcome these barriers — and we are the only service that can do it.
At this webinar our product experts will discuss how Incapsula customers are adopting IP Protection and bringing their DDoS protection to the next level. We’ll also have a discussion with Imperva CISO Shahar Ben-Hador who will share insights on how we use IP Protection and real-world lessons learned.
You need to protect more than just your web servers from DDoS attacks. We’ll address these questions:
Why do you need to protect more than just your web servers?
What were the limitations others ran into when they tried to do it?
How did Incapsula help them overcome the limitations?
...and much more!
You’ve seen the headlines—"[Well-Known Company] Falls Victim To Hackers".
These data breaches result in the theft of millions of names, passwords, credit card numbers, and other personal data. Imagine if such a breach lead to the theft of your application's data. . .
If multi-national companies with dedicated security teams and expansive budgets aren’t immune to the impact of hackers, how can you adequately prepare yourself to defeat this threat?
This presentation will explore the web application threat landscape. It will zero in on some of the most common attacks wreaking havoc on the internet, teaching you how to defend your online assets from them.
This presentation will discuss:
• The major security breaches of 2014
• Web application threats and common attack types
• How to defend against today’s common attacks
• Automated tools to help simplify website security
ThousandEyes Alerting Essentials for Your NetworkThousandEyes
ThousandEyes provides network monitoring and alerting capabilities. Alerts are triggered based on conditions defined in alert rules, which specify tests, thresholds, and notification policies. Alerts can be configured for various network and application scenarios based on factors like loss, latency, routing changes, DNS issues, page load times, and more. Notifications can be sent by email, PagerDuty integration, or custom webhooks. The system aims to reduce false positives through configurable filtering and requiring multiple failed tests. Historical alert data is also available.
Securing Your AWS Global Transit Network: Are You Asking the Right Questions?Khash Nakhostin
Now that you’ve designed and implemented your Global Transit Network, it’s time to revisit one of those seven considerations: security. What are the right questions to start asking to verify that your security posture is adequate for your AWS cloud environment?
Your first question might be: Why do I even need additional security? Isn’t what Amazon provides “out of the box” adequate? Unfortunately, even this is not the right starting question. It’s important to appreciate that, while Amazon says it has a shared security model, your Amazon EC2 instance may not meet your security requirements “by default.” Though Amazon makes specific security features available to you, it’s still up to you to choose judiciously among the many native and third-party options.
Incapsula offers instant DDoS protection for new websites by providing a 6-step process: 1) create an Incapsula account, 2) provide billing information, 3) provide your domain name, 4) allow Incapsula to auto-detect your website details, 5) follow instructions to make necessary DNS changes, 6) protection from DDoS attacks is enabled once DNS changes take place. Customization options and contacting support are also provided.
New Relic Infrastructure - New Integrations For Smarter and Faster Cloud Adop...New Relic
This document discusses a webinar presented by New Relic on new integrations for monitoring applications in the cloud. It begins with basic housekeeping items about the webinar. It then discusses challenges companies face with cloud adoption and maintaining visibility as applications and services move across platforms. The presentation introduces New Relic's infrastructure monitoring and over 40 cloud integrations that provide visibility into services from AWS, Azure, Google Cloud and beyond. It highlights key integrations from the winter 2018 release and how New Relic allows configuring monitoring at different account and tag levels for customized visibility into multi-cloud environments.
Design Continuous Authorization for Rapid Delivery of Mission-Critical Servic...Amazon Web Services
The document proposes a reference solution architecture for designing continuous authorization to rapidly deliver mission-critical services. It includes infrastructure layers for on-premise, cloud, and hybrid environments. It describes data repository services including operational data stores, data lakes, and repositories. It also describes application, security, data management, and system administration services to support agile development, DevOps, and continuous integration/deployment. The architecture supports containerization, identity and access management, security monitoring, and compliance.
Securely Connecting Your Customers to Their Cloud-Hosted App – In MinutesKhash Nakhostin
This document summarizes a presentation about securely connecting customers' sites to cloud-hosted applications. It discusses the challenges of connectivity, operational readiness, and security/compliance when onboarding customers. Specifically, it outlines limitations of native AWS/Azure VPN solutions and the lack of visibility, automation, and security controls. The presentation promotes using a communication module that can automate provisioning IPsec or SSL tunnels without requiring changes to customer edge devices or opening firewall ports. This provides centralized management of connectivity and compliance reporting across customer environments.
Security Requirements and Tradeoffs for Controlling VPC-to-Internet Egress Tr...Khash Nakhostin
Limitations of Existing Firewalls and AWS NAT Gateways
There are legitimate reasons why AWS VPCs or Azure VNets need Internet access; for example, to receive software updates from vendors or integrate with native AWS services or third-party SaaS services. But this is substantially different from an on-premises use case, where traditional, full-featured firewalls are needed to filter co-mingled end-user traffic and application traffic. And while AWS provides a NAT gateway, it can be configured only on a per-VPC basis against a limited number of IP addresses.
Let's spend some time prepping for the GuardDuty lab and set everyone up with Amazon account credits. Then we will do a short warm up lab that builds out a real-time serverless dashboard for monitoring account activity using a number of different services. Level 200
Managing Security of Large IoT Fleets (IOT321-R1) - AWS re:Invent 2018Amazon Web Services
AWS IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. In this session, we dive into Device Defender Detect, the feature that monitors metrics collected on device and cloud-side to identify anomalous behaviors. We get into the details of how Device Defender Detect works and metrics that it supports. The session includes a demo of how best to leverage Device Defender Detect for keeping your devices secure.
Is the Cloud Going to Kill Traditional Application Delivery?Imperva Incapsula
Application delivery controllers provide load balancing, acceleration, traffic shaping and other services that improve the performance, availability and security of web applications. But with more and more web application developers hosting their applications in the cloud, using application delivery hardware is often a non-starter.
This presentation discusses the architecture of a new type of service called the Application Delivery Cloud. This new cloud service not only offers critical performance, availability and security capabilities to web application vendors, it goes beyond its hardware analog to deliver new capabilities that today’s applications require, including regional content policies and up-to-the-minute security intelligence.
Lightning talk by Santhosh Marimuthu, Advanced Engineer at Altran on the topic "AWS serverless infrastructure - Integration testing" at AWS Community Day Bengaluru 2018
Three Innovations that Define a “Next-Generation Global Transit Hub”Khash Nakhostin
Learn how a software-defined approach can transform your AWS transit hub design from a legacy architecture exercise into a strategic infrastructure initiative that doesn’t require you to descend into the command-line interface and BGP of the IT networking world.
We’ll share the requirements that our most successful customers have insisted upon for their Global Transit Networks, and demonstrate the key features that meet those requirements:
Software-defined and centrally managed – so anyone can run it.
Built-in security with fully encrypted tunnels, egress filtering, and VPC segmentation.
Operational readiness with integrated monitoring, alerting and troubleshooting that’s easy to hand off to an operations team.
In this talk, we will introduce several methods of threat detection and remediation on AWS, including GuardDuty, Macie, WAF, Shield, Lambda, AWS Config, Systems Manager and Inspector. We will do a brief overview of each of these services, and then talk about how to put them all together, to have a comprehensive thread detection and remediation solution. We will also discuss how to use these services across multiple AWS accounts and regions, to cover the governance needs of enterprise AWS deployments. Level 200
Network Troubleshooting in the Cloud: Tools, Techniques and GotchasKhash Nakhostin
When someone reports an EC2 connectivity failure, what do you do? Open your Amazon VPC Console, launch an SSH session, and start typing CLI commands in search of clues.
Common root causes include problems related to:
Route table updates
Phantom network ACLs
Security policies
Missing BGP routes
Overfilling route tables or summarization mistakes
Moreover, in many cases, networking is not an issue, but valuable time is lost eliminating the network as a cause before you can progress. Unfortunately, AWS does not natively provide the visibility and troubleshooting features needed by CloudOps and DevOps teams to identify and resolve problems quickly.
Getting the Most Value from Your Aviatrix Controller & GatewaysKhash Nakhostin
The Aviatrix AVX Software-Defined Cloud Router establishes an abstraction layer between the public cloud provider’s networking primitives and the application to simplify the creation of logical cloud networks and services for hybrid connectivity, data security, multicloud connectivity, monitoring and troubleshooting. The solution consists of two components: Aviatrix Controller; and the Aviatrix Gateways, all of which are deployed in your VPCs or the on-premises environment.
Five Connectivity and Security Use Cases for Azure VNetsKhash Nakhostin
As you complete your plans for moving IT infrastructure and application workloads to Azure, it’s important to understand what connectivity and security services Microsoft includes by default – and what’s missing. Though Azure comes with baseline capabilities, it’s still up to you to choose judiciously among many Azure-native and third-party options to address unique requirements. This session explores use cases, such as encrypting traffic between VNets holding sensitive data, remote user access to VNets, multi-cloud connectivity, and filtering egress traffic to the Internet.
We cover the questions you should be asking: what are the key issues that matter, what does Microsoft provide, and what’s missing? We address these questions for each of the five most common use cases:
On-prem to VNet
VNet to VNet
VNet to Internet (Egress)
User to VNet
VNet to AWS VPC
We then demonstrate how a software-defined approach can deliver simplified and unified control over cloud routing, embracing both Azure-native and third-party services.
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations, particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations.
Application Load Balancer and Network Load Balancer end-to-end IPv6 supportDhaval Soni
Application Load Balancers and Network Load Balancers now support end-to-end connectivity with Internet Protocol version 6 (IPv6). Clients can now connect to the application and network load balancers and access backend applications over IPv6.
AWS IoT Analytics collects, processes, and analyzes IoT data quickly and easily so you can gain operational insights. To collect data and prepare it for analysis, you use Channels. Channels listen to devices and pull device messages into AWS IoT Analytics. Once messages are flowing, pipelines process messages and turn them into useful data using techniques like transforms and filters. Pipelines also enrich your IoT data with data from other AWS service and external data sources. After it's processed, data is stored in an IoT-optimized data store. Once data is ready to be analyzed, datasets are created by querying the data or by using built-in Jupyter notebook templates for sophisticated analytics, such as machine learning. AWS IoT Analytics integrates with Amazon SageMaker so you can build machine learning models, such as predictive analytics. Join us for a deep dive on these components.
Automating Compliance on AWS (HLC302-S-i) - AWS re:Invent 2018Amazon Web Services
Maintaining a compliant environment is critical for regulated industries such as healthcare, but with the advent of GDPR and other regional data privacy frameworks, compliance is becoming just another cost of doing business. In this session, we dive deep into how Cloudticity built the Cloudticity Oxygen managed services framework as an example of what a compliance framework looks like and how maintaining a compliant posture—and being able to prove that to auditors and regulators—can and should be a native part of your infrastructure. Compliance doesn't need to be something you add on. It should be deeply ingrained in your environment. Learn specific AWS services and techniques to track and maintain compliance in a fully automated manner directly from Cloudticity's founder. This session is brought to you by AWS partner, Cloudticity.
Automated Intrusion Detection and Response on AWSTeri Radichel
This document discusses using AWS services to automate intrusion detection and response. It provides examples of using AWS services like EC2, CloudFormation, and VPC to deploy resources and configure them with security features. Code examples are given to start EC2 instances, deploy templates to AWS, and monitor VPC flow logs to detect threats and take actions like snapshotting or terminating instances in response. The document argues that AWS services can improve security operations when best practices are followed, as AWS provides capabilities like built-in logging, inventory, and tools that facilitate automated detection and response.
Accelerating Cloud Services and How to Match your Workload to the Right Intel...Amazon Web Services
This presentation will take you through the underlying Intel technologies available in AWS EC2 Instances, what benefits these technologies can provide and how to use these technologies to maximise your use case workloads AWS EC2 Instances provide a wide selection of instance types, optimised to fit a broad and diverse set of use cases, all supported by the latest Intel Xeon processors and technologies providing you with confidence to choose an AWS EC2 instance type that best meet your performance needs for compute intensive, memory intensive, or IOPS intensive applications.
So, if you are interested in how to maximise your existing code optimisations and investments or thinking about migrating workloads to AWS come to this session.
Speaker: Peter Kerney, Lead Enterprise Architect, Cloud, SDI and NFV, Intel
This document discusses F5 Networks and SecureData's partnership. It notes that SecureData is an F5 Gold Partner and that F5 provides multi-cloud security solutions. It also discusses challenges of multi-cloud environments like operational complexity and security issues. F5 solutions aim to provide consistent security visibility, reduce cloud costs, and offer a unified security dashboard across environments.
Securing Your AWS Global Transit Network: Are You Asking the Right Questions?Khash Nakhostin
Now that you’ve designed and implemented your Global Transit Network, it’s time to revisit one of those seven considerations: security. What are the right questions to start asking to verify that your security posture is adequate for your AWS cloud environment?
Your first question might be: Why do I even need additional security? Isn’t what Amazon provides “out of the box” adequate? Unfortunately, even this is not the right starting question. It’s important to appreciate that, while Amazon says it has a shared security model, your Amazon EC2 instance may not meet your security requirements “by default.” Though Amazon makes specific security features available to you, it’s still up to you to choose judiciously among the many native and third-party options.
Incapsula offers instant DDoS protection for new websites by providing a 6-step process: 1) create an Incapsula account, 2) provide billing information, 3) provide your domain name, 4) allow Incapsula to auto-detect your website details, 5) follow instructions to make necessary DNS changes, 6) protection from DDoS attacks is enabled once DNS changes take place. Customization options and contacting support are also provided.
New Relic Infrastructure - New Integrations For Smarter and Faster Cloud Adop...New Relic
This document discusses a webinar presented by New Relic on new integrations for monitoring applications in the cloud. It begins with basic housekeeping items about the webinar. It then discusses challenges companies face with cloud adoption and maintaining visibility as applications and services move across platforms. The presentation introduces New Relic's infrastructure monitoring and over 40 cloud integrations that provide visibility into services from AWS, Azure, Google Cloud and beyond. It highlights key integrations from the winter 2018 release and how New Relic allows configuring monitoring at different account and tag levels for customized visibility into multi-cloud environments.
Design Continuous Authorization for Rapid Delivery of Mission-Critical Servic...Amazon Web Services
The document proposes a reference solution architecture for designing continuous authorization to rapidly deliver mission-critical services. It includes infrastructure layers for on-premise, cloud, and hybrid environments. It describes data repository services including operational data stores, data lakes, and repositories. It also describes application, security, data management, and system administration services to support agile development, DevOps, and continuous integration/deployment. The architecture supports containerization, identity and access management, security monitoring, and compliance.
Securely Connecting Your Customers to Their Cloud-Hosted App – In MinutesKhash Nakhostin
This document summarizes a presentation about securely connecting customers' sites to cloud-hosted applications. It discusses the challenges of connectivity, operational readiness, and security/compliance when onboarding customers. Specifically, it outlines limitations of native AWS/Azure VPN solutions and the lack of visibility, automation, and security controls. The presentation promotes using a communication module that can automate provisioning IPsec or SSL tunnels without requiring changes to customer edge devices or opening firewall ports. This provides centralized management of connectivity and compliance reporting across customer environments.
Security Requirements and Tradeoffs for Controlling VPC-to-Internet Egress Tr...Khash Nakhostin
Limitations of Existing Firewalls and AWS NAT Gateways
There are legitimate reasons why AWS VPCs or Azure VNets need Internet access; for example, to receive software updates from vendors or integrate with native AWS services or third-party SaaS services. But this is substantially different from an on-premises use case, where traditional, full-featured firewalls are needed to filter co-mingled end-user traffic and application traffic. And while AWS provides a NAT gateway, it can be configured only on a per-VPC basis against a limited number of IP addresses.
Let's spend some time prepping for the GuardDuty lab and set everyone up with Amazon account credits. Then we will do a short warm up lab that builds out a real-time serverless dashboard for monitoring account activity using a number of different services. Level 200
Managing Security of Large IoT Fleets (IOT321-R1) - AWS re:Invent 2018Amazon Web Services
AWS IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. In this session, we dive into Device Defender Detect, the feature that monitors metrics collected on device and cloud-side to identify anomalous behaviors. We get into the details of how Device Defender Detect works and metrics that it supports. The session includes a demo of how best to leverage Device Defender Detect for keeping your devices secure.
Is the Cloud Going to Kill Traditional Application Delivery?Imperva Incapsula
Application delivery controllers provide load balancing, acceleration, traffic shaping and other services that improve the performance, availability and security of web applications. But with more and more web application developers hosting their applications in the cloud, using application delivery hardware is often a non-starter.
This presentation discusses the architecture of a new type of service called the Application Delivery Cloud. This new cloud service not only offers critical performance, availability and security capabilities to web application vendors, it goes beyond its hardware analog to deliver new capabilities that today’s applications require, including regional content policies and up-to-the-minute security intelligence.
Lightning talk by Santhosh Marimuthu, Advanced Engineer at Altran on the topic "AWS serverless infrastructure - Integration testing" at AWS Community Day Bengaluru 2018
Three Innovations that Define a “Next-Generation Global Transit Hub”Khash Nakhostin
Learn how a software-defined approach can transform your AWS transit hub design from a legacy architecture exercise into a strategic infrastructure initiative that doesn’t require you to descend into the command-line interface and BGP of the IT networking world.
We’ll share the requirements that our most successful customers have insisted upon for their Global Transit Networks, and demonstrate the key features that meet those requirements:
Software-defined and centrally managed – so anyone can run it.
Built-in security with fully encrypted tunnels, egress filtering, and VPC segmentation.
Operational readiness with integrated monitoring, alerting and troubleshooting that’s easy to hand off to an operations team.
In this talk, we will introduce several methods of threat detection and remediation on AWS, including GuardDuty, Macie, WAF, Shield, Lambda, AWS Config, Systems Manager and Inspector. We will do a brief overview of each of these services, and then talk about how to put them all together, to have a comprehensive thread detection and remediation solution. We will also discuss how to use these services across multiple AWS accounts and regions, to cover the governance needs of enterprise AWS deployments. Level 200
Network Troubleshooting in the Cloud: Tools, Techniques and GotchasKhash Nakhostin
When someone reports an EC2 connectivity failure, what do you do? Open your Amazon VPC Console, launch an SSH session, and start typing CLI commands in search of clues.
Common root causes include problems related to:
Route table updates
Phantom network ACLs
Security policies
Missing BGP routes
Overfilling route tables or summarization mistakes
Moreover, in many cases, networking is not an issue, but valuable time is lost eliminating the network as a cause before you can progress. Unfortunately, AWS does not natively provide the visibility and troubleshooting features needed by CloudOps and DevOps teams to identify and resolve problems quickly.
Getting the Most Value from Your Aviatrix Controller & GatewaysKhash Nakhostin
The Aviatrix AVX Software-Defined Cloud Router establishes an abstraction layer between the public cloud provider’s networking primitives and the application to simplify the creation of logical cloud networks and services for hybrid connectivity, data security, multicloud connectivity, monitoring and troubleshooting. The solution consists of two components: Aviatrix Controller; and the Aviatrix Gateways, all of which are deployed in your VPCs or the on-premises environment.
Five Connectivity and Security Use Cases for Azure VNetsKhash Nakhostin
As you complete your plans for moving IT infrastructure and application workloads to Azure, it’s important to understand what connectivity and security services Microsoft includes by default – and what’s missing. Though Azure comes with baseline capabilities, it’s still up to you to choose judiciously among many Azure-native and third-party options to address unique requirements. This session explores use cases, such as encrypting traffic between VNets holding sensitive data, remote user access to VNets, multi-cloud connectivity, and filtering egress traffic to the Internet.
We cover the questions you should be asking: what are the key issues that matter, what does Microsoft provide, and what’s missing? We address these questions for each of the five most common use cases:
On-prem to VNet
VNet to VNet
VNet to Internet (Egress)
User to VNet
VNet to AWS VPC
We then demonstrate how a software-defined approach can deliver simplified and unified control over cloud routing, embracing both Azure-native and third-party services.
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations, particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations.
Application Load Balancer and Network Load Balancer end-to-end IPv6 supportDhaval Soni
Application Load Balancers and Network Load Balancers now support end-to-end connectivity with Internet Protocol version 6 (IPv6). Clients can now connect to the application and network load balancers and access backend applications over IPv6.
AWS IoT Analytics collects, processes, and analyzes IoT data quickly and easily so you can gain operational insights. To collect data and prepare it for analysis, you use Channels. Channels listen to devices and pull device messages into AWS IoT Analytics. Once messages are flowing, pipelines process messages and turn them into useful data using techniques like transforms and filters. Pipelines also enrich your IoT data with data from other AWS service and external data sources. After it's processed, data is stored in an IoT-optimized data store. Once data is ready to be analyzed, datasets are created by querying the data or by using built-in Jupyter notebook templates for sophisticated analytics, such as machine learning. AWS IoT Analytics integrates with Amazon SageMaker so you can build machine learning models, such as predictive analytics. Join us for a deep dive on these components.
Automating Compliance on AWS (HLC302-S-i) - AWS re:Invent 2018Amazon Web Services
Maintaining a compliant environment is critical for regulated industries such as healthcare, but with the advent of GDPR and other regional data privacy frameworks, compliance is becoming just another cost of doing business. In this session, we dive deep into how Cloudticity built the Cloudticity Oxygen managed services framework as an example of what a compliance framework looks like and how maintaining a compliant posture—and being able to prove that to auditors and regulators—can and should be a native part of your infrastructure. Compliance doesn't need to be something you add on. It should be deeply ingrained in your environment. Learn specific AWS services and techniques to track and maintain compliance in a fully automated manner directly from Cloudticity's founder. This session is brought to you by AWS partner, Cloudticity.
Automated Intrusion Detection and Response on AWSTeri Radichel
This document discusses using AWS services to automate intrusion detection and response. It provides examples of using AWS services like EC2, CloudFormation, and VPC to deploy resources and configure them with security features. Code examples are given to start EC2 instances, deploy templates to AWS, and monitor VPC flow logs to detect threats and take actions like snapshotting or terminating instances in response. The document argues that AWS services can improve security operations when best practices are followed, as AWS provides capabilities like built-in logging, inventory, and tools that facilitate automated detection and response.
Accelerating Cloud Services and How to Match your Workload to the Right Intel...Amazon Web Services
This presentation will take you through the underlying Intel technologies available in AWS EC2 Instances, what benefits these technologies can provide and how to use these technologies to maximise your use case workloads AWS EC2 Instances provide a wide selection of instance types, optimised to fit a broad and diverse set of use cases, all supported by the latest Intel Xeon processors and technologies providing you with confidence to choose an AWS EC2 instance type that best meet your performance needs for compute intensive, memory intensive, or IOPS intensive applications.
So, if you are interested in how to maximise your existing code optimisations and investments or thinking about migrating workloads to AWS come to this session.
Speaker: Peter Kerney, Lead Enterprise Architect, Cloud, SDI and NFV, Intel
This document discusses F5 Networks and SecureData's partnership. It notes that SecureData is an F5 Gold Partner and that F5 provides multi-cloud security solutions. It also discusses challenges of multi-cloud environments like operational complexity and security issues. F5 solutions aim to provide consistent security visibility, reduce cloud costs, and offer a unified security dashboard across environments.
This document discusses how to implement real-time analytics on big data using Microsoft Azure services. It begins with an introduction and overview of real-time analytics. It then discusses how real-time fraud detection in the telecom industry can help reduce losses. The presentation demonstrates using Azure Event Hubs to capture streaming call record data, Spark Streaming to process it, Hive for storage, and Power BI for visualization and real-time alerts. It provides an architecture diagram and steps for setting up such a real-time fraud detection system.
This document discusses how to implement real-time analytics on big data using Microsoft Azure services. It begins with an introduction and overview of real-time analytics. It then discusses how real-time fraud detection in the telecom industry can help reduce losses. The presentation demonstrates using Azure Event Hubs to capture streaming call record data, Spark Streaming to process it, storing the results in Hive, and using Power BI for visualization and real-time alerts. It provides an architecture diagram and steps for setting up such a real-time fraud detection system.
Excellent slides on the new z13s announced on 16th Feb 2016Luigi Tommaseo
The document discusses new features and capabilities of the IBM z13s mainframe system. Key points include:
- The z13s provides greater scale for Linux and z/OS workloads compared to previous models, with up to 2x increase in memory and I/O bandwidth.
- It features capabilities like simultaneous multi-threading, vector processing, faster encryption, and improved compression to accelerate analytics and security workloads.
- The system is designed to support hybrid cloud, blockchain, APIs, analytics, and security initiatives through integration with Linux on zSystems, IBM Cloud, and other platforms and services.
CE Cybersecurity Trends and Strategies for Hosting in the CloudCase IQ
Why does security feel like the most frustrating challenge in government IT? In part, because security in a cloud-first, mobile-first world calls for new approaches. Data is accessed, used and shared on-premises and in the cloud–erasing traditional security boundaries.
In this webinar, we’ll examine current trends in cybersecurity and some resulting strategy shifts that have the potential to greatly enhance public sector organizations’ ability to balance risk and access, better detect and respond to attacks and just make faster and more coordinated cybersecurity decisions overall. Finally, we’ll look at a common set of attacks occurring specifically in state and local government and steps you can take right now to help mitigate these.
Join Dean Iacovelli, Director for Secure Enterprise at Microsoft, as he discusses current trends and strategies to mitigate your cybersecurity risk.
The document summarizes Splunk Enterprise 6.3, highlighting key new features and capabilities. It discusses breakthrough performance and scale improvements including doubled search and indexing speed and 20-50% increased capacity. It also covers advanced analysis and visualization features like anomaly detection, geospatial mapping, and single-value display. New capabilities for high-volume event collection and an enterprise-scale platform with expanded management, custom alert actions, and data integrity control are also summarized.
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Keith Kraus
Traditional security tools like security information and event managers (SIEMs) are struggling to keep up with the terabytes of event data (250M to 2B events) being generated each day from an ever-growing number of devices. Cybersecurity has become a data problem, and enterprises need to reply with scalable solutions to enable effective hunting and combat evolving attacks. Rethinking the cybersecurity problem as a data-centric problem led Accenture Labs’s Cybersecurity team to use emerging big data tools along with new approaches such as graph databases and analysis to exploit the connected nature of the data to its advantage. Joshua Patterson, Michael Wendt, and Keith Kraus explain how Accenture Labs’s Cybersecurity team is using Apache Kafka, Spark, and Flink to stream data into Blazegraph and Datastax Graph to accelerate cyber defense.
Leveraging Datastax Graph and Blazegraph allows Accenture Labs to greatly accelerate query and analysis performance compared to traditional security tools like SIEM. Josh, Michael, and Keith share the challenges of fitting cybersecurity data into each of the graph structures, as well as the ways they exploited the connectedness of events to discover new threats that would have been missed in traditional SIEM tools. In addition, they explain how they use GPUs to accelerate graph analysis by using Blazegraph DASL. Josh, Michael, and Keith end by demonstrating how to efficiently and effectively stream data into these graph databases using best-in-breed technologies such as Apache Kafka, Spark, and Flink and touch on why Kudu is becoming an integral part of Accenture’s technology stack. Utilizing these technologies, clients have supercharged their security analysts’ cyber-hunting abilities and are uncovering threats faster.
Troubleshooting Webex and Microsoft Teams with ThousandEyesThousandEyes
This document provides an overview of a ThousandEyes presentation on troubleshooting WebEx and Microsoft Teams. It discusses how work has changed with increased cloud, collaboration and remote work. This creates challenges for supporting user experience across best effort networks outside of an organization's control. ThousandEyes helps address this by providing end-to-end visibility through agents globally and on endpoints to understand application and network performance together. The presentation includes a demo of ThousandEyes insights for WebEx and a Q&A section.
Windows Azure PaaS - Webinar Common SenseCommon Sense
Common Sense Webinar: Cloud Technology Trends, highlighting the Microsoft Azure Platform As A Service offering. Presented by Solution Specialist with Microsoft. Nate Shae-Han.
Learn how to Increase time to market, Drive down IT costs and Enable new markets.
Cloudflare hosted a webinar on cyber security fundamentals in Cantonese. It discussed the current threat landscape, challenges to effective security strategies, and how Cloudflare protects web content from threats. Cloudflare's vision is to provide security controls so customers of any size can keep their internet properties safe without sacrificing performance. It protects over 20 million internet properties from over 72 billion cyber threats daily using a global network across 90+ countries. Cloudflare discussed how it protects customers from DDoS attacks, bots, vulnerabilities, and more through integrated solutions that improve performance, acceleration, and security.
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Okta-Inc
Since its introduction with Windows Server 2008, AD FS 2.0 has been Microsoft’s answer to extending enterprise identity beyond the firewall. However, building an identity management solution with the AD FS toolkit has many hidden costs. While AD FS solves some identity challenges for Microsoft’s product family, as is typical from Microsoft, many more gaps exist when attempting to integrate with cloud or mobile applications from other vendors.
Built as a single sign-on toolkit, AD FS requires a significant investment to deploy into production and still doesn’t deliver a full identity management solution. This webinar will discuss the following AD FS hidden costs as well as free alternatives that help avoid them:
-Building-out missing features
-Setup & configuration
-Hardware & software
-Availability & reliability
-On-going maintenance
Splunk provides a fully integrated platform for collecting, analyzing, and visualizing machine data from any source. The Splunk App for AWS integrates with AWS services like CloudTrail, Config, and VPC Flow Logs to provide visibility into AWS environments. It collects data from AWS SQS queues and S3 buckets using the AWS SDK. Setting up the Splunk App for AWS requires installing the Splunk Add-on for AWS and configuring permissions for AWS services. Users add their AWS account, and then must wait 5-10 minutes for dashboards and reports to populate with AWS log data.
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
Scalable enterprise mobility solutions: How to give your employees tools they need without sacrificing user experience and security.
Consumerization of IT and BYOD are here – and it’s a GOOD thing. Today's dynamic workplaces and hyper-competitive markets drive demand for more mobile productivity solutions. Nearly 70% of enterprise employees report making better decisions, being more productive and happier if they are allowed to use mobile devices and cloud-based tools. Yet, IT organizations often resist these trends because of cost and risk associated with multi-platform, multi-device ecosystem having access to corporate data and resources.
In this webinar, product experts from Sencha and Centrify will help your organization embrace BYOD and SaaS in a cost-effective, scalable way. Sencha Space is an advanced platform for securely deploying mobile apps and delivering a consistent, elegant, mobile user experience to end-users. Users can launch any mobile web app, or HTML5 app in a secure, managed environment. Combining Space with secure, Active Directory- or Cloud-Based Identity and Access Management (IAM) from Centrify gives IT visibility and control over mobile platforms and SaaS / in-house apps while improving user experience and reducing security risk.
A Key to Real-time Insights in a Post-COVID World (ASEAN)Denodo
Watch full webinar here: https://bit.ly/2EpHGyd
Presented at Data Champions, Online Asia 2020
Businesses and individuals around the world are experiencing the impact of a global pandemic. With many workers and potential shoppers still sequestered, COVID-19 is proving to have a momentous impact on the global economy. Regardless of the current situation and post-pandemic era, real-time data becomes even more critical to healthcare practitioners, business owners, government officials, and the public at large where holistic and timely information are important to make quick decisions. It enables doctors to make quick decisions about where to focus the care, business owners to alter production schedules to meet the demand, government agencies to contain the epidemic, and the public to be informed about prevention.
In this on-demand session, you will learn about the capabilities of data virtualization as a modern data integration technique and how can organisations:
- Rapidly unify information from disparate data sources to make accurate decisions and analyse data in real-time
- Build a single engine for security that provides audit and control by geographies
- Accelerate delivery of insights from your advanced analytics project
DevOps and data privacy do not need to oppose each other. Rather, they can complement one another.
The automation and audit trails that DevOps processes introduce to database development can ease compliance with data protection regulations and enable organizations to balance the need to deliver software faster with the requirement to protect and preserve personal data.
So how can the promise of releasing changes to the database faster and easier be balanced with the need to keep data safe and remain compliant with legislation?
Redgate’s Data Privacy and Protection Specialist Chris Unwin, shows how the answer lies in in going one step further than database DevOps and thinking about Compliant Database DevOps:
• Introduce standardized team-based development
• Automate deployments
• Monitor performance and availability
• Protect and preserve data
Kieran McDonnell from Vuzion Ireland gave a presentation on digital transformation and how Vuzion can help businesses future proof themselves. Vuzion is a cloud aggregator that has been delivering and selling cloud services for 20 years. They have a rich portfolio of cloud services and work with a smart ecosystem of partners. Vuzion's GTM model involves pre-sales engagement, operational delivery, capability development, and bespoke solutions. Julian Dyer from Vuzion then provided direction on Microsoft including updates on products like Skype for Business and Security as a Service. Elaine Pakes from DocuSign discussed how DocuSign can be used to sign documents anytime, anywhere on any device to ensure secure and compliant
The Cost of Doing Nothing: A Ransomware Backup StoryQuest
This on-demand webcast shows you how you shield your organization from such attacks – as well as how to respond if ransomware does penetrate your organization. Baseline Technologies’ Mike Crowley gives you the inside track on how ransomware works and how to lower your risk of ransomware attacks.
Watch the video: https://content.pivotal.io/webinars/using-data-science-for-cybersecurity
Enterprise networks are under constant threat. While perimeter security can help keep some bad actors out, we know from experience that there is no 100%, foolproof way to prevent unwanted intrusions. In many cases, bad actors come from within the enterprise, meaning perimeter security methods are ineffective.
Enterprises, therefore, must enhance their cybersecurity efforts to include data science-driven methods for identifying anomalous and potentially nefarious user behavior taking place inside their networks and IT infrastructure.
Join Pivotal’s Anirudh Kondaveeti and Jeff Kelly in this live webinar on data science for cybersecurity. You’ll learn how to perform data-science driven anomalous user behavior using a two-stage framework, including using principal components analysis to develop user specific behavioral models. Anirudh and Jeff will also share examples of successful real-world cybersecurity efforts and tips for getting started.
About the Speakers:
Anirudh Kondaveeti is a Principal Data Scientist at Pivotal with a focus on Cybersecurity and spatio-temporal data mining. He has developed statistical models and machine learning algorithms to detect insider and external threats and "needle-in-the-hay-stack" anomalies in machine generated network data for leading industries.
Jeff Kelly is a Principal Product Marketing Manager at Pivotal.
Ähnlich wie D3SF17- Improving Our China Clients Performance (20)
The document discusses how the Incapsula support team can help customers who have purchased Incapsula services. It outlines several ways the support team can be contacted, including via a support website, email, or phone. It also describes resources available to customers like knowledge base articles, training courses, and status pages. The document notes there are standard and premium support options with different response times and update intervals. It highlights that emergency escalation is available by phone and identifies enhanced support programs like managed services and technical account managers.
Get an inside look at Incapsula Security, straight from the Security Research Team. Plus, get your vulnerability management strategy on track by assessing the automated threats you face and learn about the new security features we’re working on to keep you protected.
D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...Imperva Incapsula
Learn about the most important aspects of a Web Application Firewall your organization needs to have in place to protect against the most critical web application security risks. Plus, see how we’re evolving to ensure you’re protected against new attack campaigns.
In this presentation, we cover advanced mitigation techniques used by Behemoth 2 – our latest mitigation platform – as well as real-life examples of different DDoS attack vectors and traffic samples. Plus, learn how we utilize a network of 4.7 Tbps to handle complex high throughput attacks and get a heads up on the latest trends we’re seeing in DDoS attacks.
This document discusses content security policies (CSP) and how they have evolved to improve browser security. It provides an overview of CSP directives that define valid sources of content for different types of resources, such as scripts, styles, and images. It also describes how to implement a basic CSP that limits resources to the current domain and test domains, as well as how to fine tune the policy for specific external scripts and styles. Finally, it briefly mentions other related security headers that can be used to further harden a site.
Phil Williams, Principal Cloud Solutions Architect, explains how to evaluate your exposure to DDoS attack and how to best shape your defenses to budget requirements.
D3NY17- Customizing Incapsula to Accommodate Single Sign-OnImperva Incapsula
In this session, learn how the Greek Orthodox Archdiocese of America was able to customize their Incapsula service to accommodate a single sign-on solution.
In this session, learn how The Economist approached migrating to the cloud and moving economist.com from legacy datacenters to Amazon Web Services (AWS).
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...Imperva Incapsula
It can be challenging for security teams to cut through the clutter of SIEM logs in order to analyze security information and alerts. In this session, Bryan Jones, Senior Security Engineer, walks you through the 5 major configuration steps needed to help you better manage security issues across your entire tech stack.
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons LearnedImperva Incapsula
The document discusses migrating a CMS from an on-premises environment to the cloud. It outlines some common arguments for and against on-premises systems. When migrating to the cloud, the key steps are to create a detailed migration plan with rollback procedures, thoroughly test all content types, figure out DNS changes, handle outlier content, communicate freeze periods, and have someone review the plan. Post-migration, old servers should be decommissioned and any remaining issues addressed. Careful planning is essential for a successful migration.
Keynote presentation by Dvir Shapira, Director of Product Management. Opening remarks include a look at where we’ve been in terms of the Internet as a whole and Internet security and performance, as well as where we’re going.
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...Imperva Incapsula
As more people shop online, it’s critical that your website meets—and even exceeds—their expectations. Online shoppers want sites that are easy to use and don’t waste their time.
According to a recent Imperva Incapsula survey, more than 60% of users said they wouldn’t wait more than five seconds for a site to load. And almost 70% said that poor website performance would cause them to leave a site and never return.
If you’re serious about reaping the benefits of the significant growth in online shopping, it’s time to get your web “house” in order. And a new free webinar from Imperva can help.
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...Imperva Incapsula
This document describes a simulated DDoS attack scenario. It introduces Widgets LLC, the victim company, which relies on its website for business. It also introduces Thomas Scriptkid, the attacker, who has a small botnet capable of DDoS attacks. After port scanning reveals open services, various attack vectors are identified, including SYN floods, reflection floods, and application layer attacks. A SYN flood is launched, severely degrading the website's performance. Finally, various mitigation options are discussed, each with deficiencies for fully addressing DDoS attacks.
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
By Nabeel Saeed
This presentation explores the current DDoS attack landscape, it covers the basics of DDoS attacks, current trends including the most recent results from the newly published 2015 Imperva Incapsula DDoS Report. It also discusses a detailed analysis of one of today’s modern, multi-vector DDoS attacks. While dissecting this DDoS attack, this presentation explores the anatomy and timeline of the attack, as well as the steps used to mitigate each phase of the assault. This session will close with a review of the aspects of effective DDoS protection solutions used to combat these sophisticated denial of service attacks.
Migrating from Akamai to Incapsula: What You Need to KnowImperva Incapsula
The webinar gives an overview of and compares the two platforms: Incapsula and Akamai. In addition to the benefits of migrating to Incapsula, it covers planning, transitioning, configuring Incapsula and lessons learned from the field.
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceImperva Incapsula
All too often, online threats such as DDoS attacks, scrapers, or traffic that consumes too much bandwidth are disrupting or slowing down SaaS websites. It is now more important than ever to keep website traffic flowing quickly without service interruptions.
Tempus Technologies’ president, Jason Sweitzer, talks about the technological challenges his company faced and the solutions his team adopted to increase website acceleration and uptime.
Join us for Incapsula’s free 30-minute webinar to learn how you can increase your website’s uptime and enhance its performance. We’ll be discussing opportunities SaaS companies can explore through WAF protection, frontend SSL, failover ISPs, and against DDoS attacks and using Incapsula solutions.
Joomla Security Simplified — Seven Easy Steps For a More Secure WebsiteImperva Incapsula
This document outlines seven steps website owners can take to improve the security of their Joomla websites. It begins by discussing recent major security breaches in 2014 like Heartbleed and botnets. It then details the seven steps which are: 1) regularly updating software, 2) implementing strong passwords, 3) multi-factor authentication, 4) using a web application firewall, 5) identifying and blocking bad bots, 6) implementing DDoS mitigation, and 7) using a secure hosting environment. It emphasizes the importance of these steps given the prevalence of vulnerabilities and how automated tools can exploit known issues.
Understanding Web Bots and How They Hurt Your BusinessImperva Incapsula
Orion Cassetto presented on understanding web bots and how they can hurt businesses. Bots make up over 60% of web traffic and can be used for hacking through denial of service attacks, content scraping, spam, and fraud. While some bots like search engines are legitimate, others are malicious. Cassetto suggested using bot detection and mitigation solutions to identify and block bad bots while maintaining access for good bots in order to protect websites from these threats.
From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...Imperva Incapsula
The document describes the evolution of Incapsula's big data system over four generations from 2010 to 2015. Each generation improved on processing throughput, read performance, and scalability by simplifying the data model and moving to distributed processing across multiple points of presence. Key changes included moving from a centralized SQL database to NoSQL storage, implementing multi-threaded processing, and distributing workloads across data centers.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
D3SF17- Improving Our China Clients Performance
1. Improving Our China Clients’
Performance
David Ting, VP of Engineering
DataVisor
2. Company Overview
Company
– Company founded in 2013, backed by NEA, GSR Ventures, and
Genesis Capital
– Discover new types of attacks before any damage is conducted
Elite Technical Team:
– Founders are top researchers in Internet security from Microsoft
Research
– Team consists of mainly PhDs from top universities
DataVisor 20172
Protecting 2B users
globally
Marquee Customers:
BANKS
Processing 600B+
events to date
Detected 130M+ bad
accounts to date
Fortune
3. Core Technology – Unsupervised Machine Learning
DataVisor 2017
Early Detection
Catch sleep cells
High Coverage and Precision
Security domain expertise with rich
pre-existing datasets
No Label Required
Leverage clustering to identify
suspicious groups
Ultra Scalable System
Process 100s of million of events
each day
3
4. Principles of Unsupervised Machine Learning
DataVisor 2017
User Info
Device fingerprint
Application Events
User actions
…
…
Data Cleanup
and
Feature
Extraction
application_freq
application_time
…
…
Client Data
Contains several thousands
features: 𝒇 𝒙
Event
Model
User
Model
Device
Model
work_year_distrib
marriage_distrib
promoter_info
…
deviceid_distrib
ip_usage
devicetype_var
…
…..
…
…
…
𝑝(𝑥, 𝑦) =
𝑖
𝑤𝑖 ∗ 𝐹𝑖(𝑓𝑥 , 𝑓𝑦) 𝑝(𝑥, 𝑦) = 0
• Self-learning system
• Bad users are clustered together based
on similar behavior
A 𝐶𝑗 =
𝑗
𝑝𝑗(𝑥, 𝑦)
4
5. Detailed Analysis of Behavior
DataVisor 2017
• Visual analysis
• Case review
• Customizable reports and dashboards
User Groups
User Disposition
Clusters of Bad behavior
5
6. Successful Use Cases
Stop Fake Account Creation
• Prevent mass registration of
fake account armies
Prevent Transaction Fraud
• Reduce e-commerce and
financial fraud 30%-50% more
than traditional solutions
Identify Account Takeovers
• Detect compromised users
before damage to your
customers or brand
Block Fake Reviews & Likes
• Maintain trust in your platform
by reducing fake comments &
voting
Filter Spam
• Prevent spammers from
posting illicit or annoying
content
Discover Fake App Installs
• Save millions of dollars per
year by flagging fake mobile
app installs
Early detection view shows how
DataVisor catches crime rings
before damage is done.
DataVisor 20176
7. DataVisor Global Intelligence Network
DataVisor 2017
• Global Signals that Make Machine Learning
More Powerful
• Aggregated telemetry signals updated
dynamically
• Observations from
– 2B users & >600B events
– 410 million+ IP addresses
– 5.3 million+ user agent strings
– 3.6 million+ email domains
– 700,000+ phone prefixes
– 300,000+ OS versions
– 160,000+ mobile device types
– … …
• Support investigations in UI
IP addresses User agent strings
Email domains Device types
OS versions Cloud hosting providers
Phone prefixes and more….
7
9. Global Cloud Footprint
DataVisor 20179
Rest of the World China
Great Firewall of
China
• Multi-Region
• 80+% of instances are spot
• Thousands of instances
• International instance
• More cost effective than AWS
• Beijing only
• Separate from rest of world
• No spot instances $$$
• Best cloud option in China
Future
10. Distributed Pipelined Computation
DataVisor 201710
Pipline Module 1
• Process several GB/day/client
• 5000+ QPS peak for each
average client
• Batch process runs multiple
times per day
• Real-time disposition done
separately, but is based on
batched analysis
• Results are precomputed and
written to each data store
Original Data
Pipline Module 2
Pipline Module N+1
Pipline Module N
Pipline Module N+1 Pipline Module N+1
11. Challenge of a Global Customer Base
DataVisor 201711
Admin
Console
• AWS West is primary location
serving worldwide traffic
• Close to 1 Petabyte of data stored in
distributed manner across the
various clouds, regions and data
stores!!!!
ISSUE: Slowness reported
Over 30 seconds load time
in China!
12. Already Using Incapsula for WAF
API Gateway
Untrusted
API Caller
Trusted API
Caller
API Server
OAuth2
Customer
Portal
S3/OSS
IP
Whitelist
Customer
Access
Incapsula Web
Application Firewall
Admin
Console
Global
Protect VPN
IP Whitelist
HTTPS Transfer
Client Data Upload
DataVisor S3/OSS
Ferry Script
DataVisor 201712
Data In Transit Security
13. Solution: Incapsula CDN
DataVisor 201713
Admin Console
Incapsula
CDN
Result:
• Approximately 40% improvement in load-time globally
• China is still an issue with over 15 second page load
time
14. Solution: Incapsula CDN + PCN
DataVisor 201714
Admin Console
Incapsula
CDN + PCN
Result:
• China load-time improved by more than 5 times
• Now under 6 seconds load time average
15. Incapsula PCN – Premium China Network
• Performance solution for China
• Reduces latency for browsers in China
– For applications where websites are hosted outside of China
– Predictable performance – faster route
– Significant performance improvement by eliminating hops
• Bandwidth from premium providers
– Agreements with China Telecom and China Unicom
– Configured on a per-site basis
– Provisioned by Incapsula support
DataVisor 201715