Identity management and authentication are core elements of the security fabric that connects all layers of the modern enterprise.
With the advent of a true in-memory database SAP HANA, disruptive transformations are taking place in enterprise application space. In this session, you'll gain a comprehensive overview of SAP HANA and its features.
Security and compliance requirements have only become more intense over the past few years.
Compliance hasn't been something that can be easily automated, since most of the regulations are wordy documents that require an administrator to inspect the system. Lack of automation means that compliance becomes a hurdle to a secure system, rather than a validation.
SELinux is one of the key security features within Linux. It is a foundational part of many modern technologies like containers. With a history of more than 15 years, SELinux is well known among system administrators—yet too often not activated on outside facing, production systems.
Red Hat® Satellite was introduced in 2002 as a means to patch and provision systems and to build standard operating environments. While this is still a primary focus, the requirements for systems management are evolving and growing increasingly complex.
There’s a lot going on in the cloud, and a lot of that is open source. Microsoft and Red Hat are bringing a wave of modern open source portfolios to the cloud. Fueled by the cloud, DevOps is becoming commonplace across organizations of all sizes.
In this session, we'll will cover the state of the art of docker container security. We'll also take a look at the future of container security. You'll learn:
-When you should use containers versus virtual machines
-What platform you should run your containers on
Docker made it simple to run a single process in a Linux container. We often have quick success getting something like Apache or MySQL running in a docker container, especially if it's part of an application being built from scratch.