With the advent of a true in-memory database SAP HANA, disruptive transformations are taking place in enterprise application space. In this session, you'll gain a comprehensive overview of SAP HANA and its features.
Security and compliance requirements have only become more intense over the past few years.
Compliance hasn't been something that can be easily automated, since most of the regulations are wordy documents that require an administrator to inspect the system. Lack of automation means that compliance becomes a hurdle to a secure system, rather than a validation.
SELinux is one of the key security features within Linux. It is a foundational part of many modern technologies like containers. With a history of more than 15 years, SELinux is well known among system administrators—yet too often not activated on outside facing, production systems.
Are you interested in integrating on-premise Red Hat® Enterprise Linux clients and applications with Microsoft Azure Active Directory? Do you have on-premise clients or applications to move to Azure that require active directory for identity management?
Rarely does middleware security enter the conversation, but it should.