ProductsServer Desktop & Workstation Developer Subscriptions Satellite OpenStack Platform For IBM POWER For SAP Business Applications Management For Scientific ComputingExtended Update Support High Availability High Performance Network Load Balancer Resilient Storage Scalable File System Smart Management Extended Lifecycle SupportA-MQ Accelerate Automate Integrate Application Platform BPM Suite BRMS JBoss community or Red Hat JBoss Middleware Data Grid Data Virtualization Developer Studio Portfolio Edition Fuse Fuse Service Works Operations Network Portal Web Framework Kit Web Server
SolutionsWhy Red Hat Why open hybrid cloud? The new IT Public cloud Cloud resource library Private cloud Infrastructure-as-a-Service (IaaS) Platform-as-a-Service (PaaS) Cloud applications and workloadsSolaris to Red Hat Enterprise Linux Migration overview Migrate from your UNIX platform How to migrate to Red Hat Enterprise Linux Upgrade to the latest Red Hat Enterprise Linux release Red Hat JBoss Middleware Benefits of migrating to Red Hat Enterprise Linux Migration services Start a conversation with Red Hat
TrainingPopular and new courses Red Hat JBoss Administration curriculum Core System Administration curriculum Red Hat JBoss Middleware development curriculum Advanced System Administration curriculum Linux Development curriculum Cloud Computing, Virtualization, and Storage curriculum
ConsultingSOA and integration Business process management Custom Software Development Enterprise Data and Storage Systems management Migrations
Improve your security in the cloud with technology you already have
Cloud computing can speed your development and increase deployment flexibility while reducing your IT costs using assets you already have.More
Taking the initial steps to understand how you adopt cloud technologies should involve interpreting security and governance as part of your core design philosophy. And understanding how risk management and security controls should evolve as part of your internal processes is critical.
What you’ll learn in this webinar
Join Red Hat’s Ellen Newlands and Richard Morrell in discovering how security works in the cloud and to learn how to:
- Enhance your security in the cloud by leveraging your existing infrastructure.
- Strenghten security in public, private, and hybrid cloud environments.
- Build and manage your open cloud more securely with technology that’s built in to Red Hat® products and services.
Registrants will receive a link to the on-demand recording after the live webinar.Less
Date: August 1, 2012 - August 2, 2012
- Wednesday, August 1, 2012 | 13:00 UTC / 9 a.m. (New York) / 3 p.m. (Paris) / 6:30 p.m. (Mumbai)
- Wednesday, August 1, 2012 | 18:00 UTC / 2 p.m. (New York) / 8 p.m. (Paris) / 11:30 p.m. (Mumbai)
- Thursday, August 2, 2012 | 01:00 UTC / 6:30 a.m. (Mumbai) / 9 a.m. (Singapore) / 11 a.m. (Sydney)