On-Demand Webinars
Welcome to DevOps.com Webinars On-Demand! The On-Demand Library hosts recordings of all live webinars and are always available for viewing at your convenience.Registration is free. Enjoy!
Event-Based Network Monitoring with Datadog and Red Hat Ansible Automation Platform
Event-driven automation is becoming increasingly important for organizations. Systems administrators, SREs and network engineers are moving beyond configuration management into more operational tasks. In particular, network errors can be difficult to troubleshoot and can have an outsized impact, so the ability to respond quickly to these errors is paramount ... Read More
September 21, 2021
Red Hat Marketplace
How to Unlock DevOps Tool Autonomy with VSM
Building your DevOps toolchain is like creating a manufacturing line: You need the right tools in place for each product to be able to create value for your customers efficiently and effectively. However, having different tools for different teams means they will no longer have visibility into what any other ... Read More
September 21, 2021
Plutora
Observability, Monitoring and Analytics: The New Necessary
Interest in observability is rising as organizations recognize the need to provide their IT teams with more context in troubleshooting issues. Increased adoption of microservices-based applications is, in many cases, forcing the observability issue, as the dependencies that exist within such applications are too complex to manage without some level ... Read More
September 20, 2021
DevOps.com
Kubernetes Guardrails and Governance
Join a panel of Kubernetes experts as they discuss Kubernetes challenges including how to put controls around an ever-changing, chaotic environment, when security alerting is needed, and how ops teams can enable developers to use self-service ... Read More
September 16, 2021
Fairwinds
Shifting Left: The Benefits of Implementing Security throughout the Mobile App Development Process
By 2025, smartphones will be the main devices used to access the Internet. But bad actors are already attacking mobile apps, exploiting security issues to steal intellectual property, damage brand reputation or harvest user credentials for further attacks. While most organizations are aware of the risks and consequences of not ... Read More
September 16, 2021
Guardsquare
Taming Infrastructure Access: Getting Hands-On with Role and Access Discovery
You receive a request for access to a backend system. You already know the questions you’re going to ask: “Who is this person? What’s their role? Do they actually need access to this system?” Developing a clear understanding of who has access to which systems is critical to your organization’s ... Read More
September 15, 2021
strongDM
Turbocharge Your Software Delivery With the Intelligence CD Platform
As enterprises adopt microservices architecture and public clouds, software delivery is still a bottleneck to delivering innovations to the market faster. The challenge of software delivery at speed and scale is twofold: First, the ability to release software at velocity through orchestration from code to product across multiple clouds; second is ... Read More
September 15, 2021
Red Hat Marketplace
We’ve Solved for Availability; Now to Solve for Hybrid Cross-Cloud Latency
As our data service architectures have evolved, we've worked very hard to get to five nines and solve for high availability. The price we pay to get to this level of availability is data copying, system complexity and latency. Now we're being asked to deliver in-line fraud detection and real-time ... Read More
September 14, 2021
Red Hat Marketplace
Automating Security Policy to Accelerate CI/CD
Agility and speed are key drivers behind most DevOps, sometimes at the expense of secure development or timely security reviews. CI/CD often creates a challenge for organizations to maintain compliance as security policies are typically introduced much later in the development cycle, potentially increasing risks. The manual processes of checking ... Read More
September 14, 2021
Tufin
Scaling Governance, Compliance and Security Through Pipeline Automation
Security has long been used to minimize and manage risk - and is often driven by governance and compliance. As the software industry rapidly evolves, it is seeing the benefits of incorporating security as an innovation and productivity tool for software delivery. But how do you start and scale aspects ... Read More
September 9, 2021
Contrast Security