Red Hat and Anchore Discuss DevSecOps i...
The United States Department of Defense (DoD) is taking a new approach to building, deploying and operating software. To maintain their competitive edge, they are integrating DevSecOps practices into each stage of the software development process. Join Anchore, Red Hat and Carahsoft to hear from Anchore's Craig Bowman and Red Hat's Michael Epley, to discuss their contributions to the DoD DevSecOps Platform (DSOP) including: Understand the impo...
Automate Your Dell Infrastructure with...
Enterprise-wide automation is crucial for IT organizations to meet deadlines, overcome budgetary constraints, scale infrastructure and innovate across hybrid and MultiCloud environments.With an integrated solution from Red Hat and Dell Technologies, you can automate all aspects of your IT infrastructure. Red Hat Ansible is a simple, agentless technology that makes automation easy and accessible for everyone. Dell EMC Networking simplifies data...
DevSecOps for Public Sector: A Roadmap...
Join Red Hat and Carahsoft during the DevSecOps for Public Sector event to learn how combining integration technologies, agile delivery techniques and cloud-native platforms improves the speed and security of software delivery for agile integration. Red Hat is the leader in enterprise open source innovation and one of the largest contributors to the DevSecOps community. With DevSecOps, public sector IT teams can deliver more value with a small...
Securing Software Factories for the Dep...
Security remains a major concern for government agencies as they adopt cloud technologies and develop applications. The Department of Homeland Security (DHS) needs a simple approach to solution delivery that incorporates security into the DevOps lifecycle.Join Brandon Cox, Staff Solutions Architect at Red Hat, and learn how security tools can be integrated to release software safely and repeatedly across all phases of the application lifecycle...
Managing Data Access Policies for Zero Trust
Zero Trust is built around the idea of moving away from a single network perimeter to a layered defense with carefully controlled gateways. This model assumes everything is running independently and is always exposed to potential threats. It is imperative for the U.S. Department of Defense to set up authentication and authorization to protect their systems and data. Users and systems will need to re-authenticate and re-authorize frequently acr...
Advanced Ansible Security and Compliance
Security attacks can be disarming, and manual responses to threats can prove inefficient and ineffective. Organizations that automate extensively are better prepared to prevent security incidents and business disruptions. Join our live virtual session on June 15th to explore innovative ways to automate while leveraging advanced features of Ansible to perform more complex tasks.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.