Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Kubernetes Access Controls with Calico Enterprise - How to apply egress access controls

No matter where you are in your Kubernetes journey, eventually you’ll have to connect your k8s cluster to external resources like databases, cloud services, and third-party APIs. A majority of existing workloads are non-Kubernetes, and at some point, your Kubernetes applications will need to communicate with them.

DevSecOps Best Practices with JFrog Xray

JFrog builds security products that enable organizations to trust their pipeline from development to deployment and production. In this webinar, you will learn how to leverage JFrog Xray to achieve radical transparency of the binary components in your data center. Understand the impact of these components on production system quality, performance, and architectural changes. We will also cover security topics such as circle of trust, security between locations, security replication, access tokens, and auditing.

How to Stop the Use of Anonymizer Websites on Your Network With SolarWinds Security Event Manager

Your organization has internet use policies in place for multiple reasons: protecting your network against security breaches, keeping organizational costs down, and protecting your employees, end users, or customers. Anonymizer websites provide a workaround to these policies that can put your organization at risk. In this video we'll show you how to identify and stop the use of anonymizer websites on your network with SolarWinds Security Event Manager.