Watch out San Francisco, and get ready to make your datacenter more secure with Red Hat!
Love (for IT security) will definitely be in the air this Valentine’s week at RSA, where Red Hat will be presenting not only breakout sessions, but also a Birds-of-a-Feather and Peer2Peer Session. To learn more about Red Hat’s sessions at RSA, have a look at the details below.
Title | Speaker | Session ID | Date & Time |
Managing your Open Source | Josh Bressers | P2P3-T11 | February 14 3:45 PM - 4:30 PM Room: Marriott Marquis – Nob Hill C |
Justifying what you pay for security (BOF) | Josh Bressers | BOF1-W01B | February 15 7:00 am - 7:45 am Moscone West – 2009 Table B |
Saving CVE with OpenSource | Kurt Seifried, Red Hat & Kent Landfield, Intel | ASD-T10F | February 14 2:30 PM - 3:15 PM Moscone West – 2005 |
Saving CVE with OpenSource (Focus On) | Kurt Seifried, Red Hat & Kent Landfield, Intel | FON1-T11 | February 14 3:45 PM - 4:30 PM Moscone West – 2009 |
Integrated Solutions for Trusted Clouds and SDI | Shawn Wells, Red Hat & Steve Orrin, Intel | TECH-F02 | February 17 10:15 AM - 11:00 AM Moscone South – 302 |
Be sure to also visit us at the Expo at Booth N3231! We will be showcasing several demos, including:
Automating Security Compliance for your Physical, Virtual, Cloud, and Container Environments
In this demo, attendees will learn how to automate security compliance for your hybrid IT infrastructure, from learning how to provision a security compliant host at the push of a button to detecting and fixing security and compliance issues via automation.
Identity and Key Management
This demo will highlight smart card based authentication with Identity Management and SSSD, network bound disk encryption, SSSD container for Atomic Host, and using authentication indicators with Kerberos tickets.
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux Distribution
In this talk, attendees will learn what sets Red Hat Enterprise Linux apart from other Linux distributions, including the inherent software security technologies in the world’s leading enterprise Linux platform, Red Hat’s more secure supply chain, how the Red Hat Product Security/Security Response team operates and more.
Proactive Security with Red Hat CloudForms, Insights, and Ansible Tower
In this demo, learn how you can be proactive in securing your infrastructure using a combination of Red Hat’s management tools including Red Hat CloudForms, Red Hat Insights, and Ansible Tower by Red Hat.
Building secure IoT solutions with Red Hat JBoss AMQ, Fuse, BRMS and Red Hat Enterprise Linux
In this demo, you will learn how you can build more secure IoT solutions using a combination of Red Hat technologies. Specifically, you will learn how to build a secure intelligent IoT gateway with Red Hat JBoss A-MQ, Red Hat Fuse, Red Hat JBoss BRMS and Red Hat Enterprise Linux.
Securing Applications with Red Hat Single Sign-On
In this demo, learn how Red Hat Single Sign-On enables you to secure your web applications by providing Web SSO capabilities based on popular standards such as SAML 2.0, OpenID Connect, and OAuth 2.0.
Creating a Cloud Stronghold
In this demo, learn how you can provide better secure your cloud environment by using a combination of Red Hat’s cloud products: Red Hat CloudForms, Red Hat Openstack, and Ansible Tower by Red Hat.
Red Hat Openstack Platform Encryption Volumes
In this demo, learn how Red Hat Openstack Platform’s barbican key management service can be used to allow for encrypted Cinder volumes. The keys are securely stored within the Key Recovery Authority subsystem of Red Hat Identity Management.
Container Security
We will showcase several demos on container security, including deep container introspection and control, layered container security and much more.
For more information , please visit our RSA Conference 2017 page. We look forward to seeing all of you at RSA!
Sull'autore
Altri risultati simili a questo
Ricerca per canale
Automazione
Novità sull'automazione IT di tecnologie, team e ambienti
Intelligenza artificiale
Aggiornamenti sulle piattaforme che consentono alle aziende di eseguire carichi di lavoro IA ovunque
Hybrid cloud open source
Scopri come affrontare il futuro in modo più agile grazie al cloud ibrido
Sicurezza
Le ultime novità sulle nostre soluzioni per ridurre i rischi nelle tecnologie e negli ambienti
Edge computing
Aggiornamenti sulle piattaforme che semplificano l'operatività edge
Infrastruttura
Le ultime novità sulla piattaforma Linux aziendale leader a livello mondiale
Applicazioni
Approfondimenti sulle nostre soluzioni alle sfide applicative più difficili
Serie originali
Raccontiamo le interessanti storie di leader e creatori di tecnologie pensate per le aziende
Prodotti
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Servizi cloud
- Scopri tutti i prodotti
Strumenti
- Formazione e certificazioni
- Il mio account
- Supporto clienti
- Risorse per sviluppatori
- Trova un partner
- Red Hat Ecosystem Catalog
- Calcola il valore delle soluzioni Red Hat
- Documentazione
Prova, acquista, vendi
Comunica
- Contatta l'ufficio vendite
- Contatta l'assistenza clienti
- Contatta un esperto della formazione
- Social media
Informazioni su Red Hat
Red Hat è leader mondiale nella fornitura di soluzioni open source per le aziende, tra cui Linux, Kubernetes, container e soluzioni cloud. Le nostre soluzioni open source, rese sicure per un uso aziendale, consentono di operare su più piattaforme e ambienti, dal datacenter centrale all'edge della rete.
Seleziona la tua lingua
Red Hat legal and privacy links
- Informazioni su Red Hat
- Opportunità di lavoro
- Eventi
- Sedi
- Contattaci
- Blog di Red Hat
- Diversità, equità e inclusione
- Cool Stuff Store
- Red Hat Summit