How To Use The Cloud For Dev Ops
|
|
|
- Brice McKenzie
- 5 years ago
- Views:
Transcription
1 Secure Cloud Development Resources with DevOps SESSION ID: CSV-F01 Andrew Storms & Eric Hoffmann Andrew Storms - Director of DevOps Eric Hoffmann Director of QA CloudPassage
2 Teach Old Dogs New Tricks Applying old thinking to using the cloud for DevOps means: You are non-compliant and will never be compliant. Devs are smart and will find ways to work around security roadblocks. You simply cannot bolt on old security tactics and hope
3 Shared Responsibility Model Merge DevOps + Shared Responsibility Models Requires coordination, inter-company & cross functional groups Requires leadership, training & champions Requires shared vision & objectives
4 Delivering The Shared Responsibility Model 1. Policies 2. Handling exceptions 3. Service catalogs 4. Orchestration 5. Reign in shadow IT 6. Tools
5 Policies Define Your Policies What policies are needed? SANS templates Specific Cloud Vendor Tools & Interfaces AWS mgmt console roles, groups, etc AWS firewall groups Require MFA
6 Policy Management Get Buy-In and Agreement No vacuums allowed in policy definition Security, ops, dev, audit, management teams Bake-in your policies with orchestration Policy Violators Define up front what happens when someone deviates from policy Intentional or Approved Violator? What if someone NEEDS to go out of policy?
7 The Dreaded, But Common Exception Cases How To Address Exceptions Use cross functional teams, champions, visions & leaders Pre define the ideal case of what should happen Be Agile, Use Existing Toolsets Leverage existing security approved tools Keep it public, let ops, dev & security review
8 The Service Catalog Create A Service Catalog Predefined sets of system images Meets security controls Adheres to the company policies The One Stop Shop Used by all departments Used within all practices (Dev, Test, Modeling, Etc)
9 Orchestration The Automated Service Catalog Can be predetermined image Can be predetermined recipes Always use APIs Single toolset. Single Interface Make available to everyone Teach everyone to use
10 Orchestration - Shared Tools Make It Available To Everyone Encourage everyone to develop & improve Check into your source code system Security Can Audit & Approve & Improve Peer review Internal audit
11 Reign in Shadow IT Dev, QA & Others Are Playing IT & Ops Ops isn t delivering the goods in time Choke Points Are Bad. Enablers Are Good Need to understand user s needs and deliver them Allow everyone do what they do best Understand That Dev and Ops Have Similar Skills This is DevOps after all
12 What the Cloud Promises Economies of scale Self-provisioning agility... Servers compromised in 4 hours Priceless Live Server Exploitation Exercise Zero to little server security configuration applied Server fully compromised by a single individual in four hours
13 What We Learned From The Gauntlet Report Require Basic Security Tools & Policies For Cloud Servers Access controls Monitoring Alerting
14 Access Control Tools Require Stronger Passwords Linux PAM system-auth settings Windows policy settings L0phtCrack Multi Factor Duo security Google authenticator
15 Access Controls With Orchestration Making Use Of Multi Factor Authentication REQUIRE IT! Policy creation Duo security Chef, Puppet AWS MFA
16 Monitoring & Alerting Monitoring Is A Big Space To Cover Server uptime, performance etc. Inventory, usage, costs Server, Application Watch Services Cloud vendor specific offerings De Facto: Nagios, Munin, Cacti
17 Monitoring & Alerting - The CIA Triad Availability Continuous Monitoring Change Alerting
18 Monitoring & Alerting Log Review & Alerting
19 Monitoring & Alerting Stats & App Performance
20 Monitoring & Alerting Overall Usage & Costs
21 Sum This Up 1. Adoption of cloud resources by development teams has created a security problem. 2. The self-service and on-demand nature of the cloud increases the company attack surface 3. Traditional castles and walls were outdated long ago. 4. Get your head out of sand and do something now. Its not too late, but never is not an option.
22 Sum This Up 1. Extend the shared responsibility model internally 2. 5 Steps to delivering secure development in the cloud 3. Tool talk
23 Take Action Only You Can Prevent Bad Things Where do you sit in the development and/or security processes? Create real and useful security policies. Use orchestration in delivery of a secure eco system. Use service catalogs to pre build approved systems. Make use of the various available existing services.
24 Questions? Andrew Eric Hoffmann,
Virtualization and Cloud: Orchestration, Automation, and Security Gaps
Virtualization and Cloud: Orchestration, Automation, and Security Gaps SESSION ID: CSV-R02 Dave Shackleford Founder & Principal Consultant Voodoo Security @daveshackleford Introduction Private cloud implementations
Journey to the Cloud and Application Release Automation Shane Pearson VP, Portfolio & Product Management
Journey to the Cloud and Application Release Automation Shane Pearson VP, Portfolio & Product Management Hybrid Delivery: The right IT strategy Creating the optimal mix of traditional IT and cloud services
DevOps Course Content
DevOps Course Content INTRODUCTION TO DEVOPS What is DevOps? History of DevOps Dev and Ops DevOps definitions DevOps and Software Development Life Cycle DevOps main objectives Infrastructure As A Code
SESSION 703 Wednesday, November 4, 9:00am - 10:00am Track: Advancing ITSM
SESSION 703 Wednesday, November 4, 9:00am - 10:00am Track: Advancing ITSM Optimizing ITSM for Cloud Computing Reginald Lo Director, Accelerate Management, VMware [email protected] Session Description Organizations
Cloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing
Java PaaS Enabling CI, CD, and DevOps
Java PaaS Enabling CI, CD, and DevOps AuthX Overview Who We Are? Digital Engagement Company offering Technical and Marketing Services with proven success supporting Fortune 1000 companies. We partner with
Cloud Services Catalog with Epsilon
Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these
Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration
Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Part I of an ebook series of cloud infrastructure and platform fundamentals not to be avoided when preparing
Information & Asset Protection with SIEM and DLP
Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the
How To Manage A Cloud System
Understanding Enterprise Cloud Management What You Need to Know About Managing Your Cloud Applications Enterprise Cloud Management New applications, driven largely by the economics of cloud computing,
Enterprise Cloud Security via DevSecOps
SESSION ID: ASD-T08 Enterprise Cloud via DevSecOps Shannon Leitz Sr Mgr, Cloud & DevSecOps Leader Intuit Information @devsecops Scott C Kennedy Scientist Intuit Information @scknogas Agenda Who we are
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
CLOUDFORMS Open Hybrid Cloud
Open Hybrid Cloud Cloud Evolution statt Cloud Revolution Lutz Lange, RHCA, Solution Architect, Red Hat Frank Rosendahl, RHCA, Solution Architect, DASEQ GmbH Cloud Operations Management Delivers an Open
The Tools For Continuous Delivery
The Tools For Continuous Delivery Table of Contents Introduction...3 Benefits of Continuous Delivery...4 Launching Continuous Delivery in Your Organization...6 The Tools for Continuous Delivery...8 Easier
Moving beyond Virtualization as you make your Cloud journey. David Angradi
Moving beyond Virtualization as you make your Cloud journey David Angradi Today, there is a six (6) week SLA for VM provisioning it s easy to provision a VM, the other elements change storage, network
Logging and Alerting for the Cloud
Logging and Alerting for the Cloud What you need to know about monitoring and tracking across your enterprise The need for tracking and monitoring is pervasive throughout many aspects of an organization:
A Sumo Logic White Paper. Harnessing Continuous Intelligence to Enable the Modern DevOps Team
A Sumo Logic White Paper Harnessing Continuous Intelligence to Enable the Modern DevOps Team As organizations embrace the DevOps approach to application development they face new challenges that can t
Agile Delivery Framework Automation & Deployment With Puppet
2015 2015 Agile Delivery Framework Automation & Deployment With Puppet Karthiga Sadasivan https://www.linkedin.com/in/karthisadasivan Email ID: [email protected] Blog : www.happiestminds.com/blogs/category/devops
Identity & Access Management in the Cloud: Fewer passwords, more productivity
WHITE PAPER Strategic Marketing Services Identity & Access Management in the Cloud: Fewer passwords, more productivity Cloud services are a natural for small and midsize businesses, with their ability
Virtualization and IaaS management
CLOUDFORMS Virtualization and IaaS management Calvin Smith, Senior Solutions Architect [email protected] VIRTUALIZATION TO CLOUD CONTINUUM Virtual Infrastructure Management Drivers Server Virtualization
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
Management for the Mobile-Cloud Era
Management for the Mobile-Cloud Era Sajai Krishnan VP Product Marketing Cloud Management Business Unit September 10, 2014 2014 VMware Inc. All rights reserved. Mobile-cloud Era - The CIO paradox New expectations
Trend Micro. Advanced Security Built for the Cloud
datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers
The Virtualization Practice
The Virtualization Practice White Paper: Managing Applications in Docker Containers Bernd Harzog Analyst Virtualization and Cloud Performance Management October 2014 Abstract Docker has captured the attention
Business Values of Network and Security Virtualization
Business Values of Network and Security Virtualization VMware NSX in the context of the Software Defined Data Center Klaus Jansen Virtual Networks Sales Specialist VMware NSBU 2014 VMware Inc. All rights
Threat Center. Real-time multi-level threat detection, analysis, and automated remediation
Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities
CREATING AN INTERNAL CLOUD: EPAM DEVELOPS A CUSTOM SOLUTION. Time-consuming infrastructure configuration and maintenance
Creating An Internal Cloud: EPAM Develops A Custom Solution 1 CASE STUDY CREATING AN INTERNAL CLOUD: EPAM DEVELOPS A CUSTOM SOLUTION Many enterprise businesses face the same problem: Rapid expansion that
From Rivals to BFF: WAF & VA Unite OWASP 07.23.2009. The OWASP Foundation http://www.owasp.org
From Rivals to BFF: WAF & VA Unite 07.23.2009 Brian Contos, Chief Security Strategist Imperva Inc. [email protected] +1 (650) 832.6054 Copyright The Foundation Permission is granted to copy, distribute
NEXT-GENERATION, CLOUD-BASED SERVER MONITORING AND SYSTEMS MANAGEMENT
NEXT-GENERATION, CLOUD-BASED SERVER MONITORING AND SYSTEMS MANAGEMENT COVERS INTRODUCTION A NEW APPROACH CUSTOMER USE CASES FEATURES ARCHITECTURE V 1.0 INTRODUCTION & OVERVIEW Businesses use computers
Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013
Intel IT Cloud 2013 and Beyond Name Title Month, Day 2013 Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel and the
Ayla Networks, Inc. SOC 3 SysTrust 2015
Ayla Networks, Inc. SOC 3 SysTrust 2015 SOC 3 SYSTRUST FOR SERVICE ORGANIZATIONS REPORT July 1, 2015 To December 31, 2015 Table of Contents SECTION 1 INDEPENDENT SERVICE AUDITOR S REPORT... 2 SECTION 2
Research Perspectives
Research Perspectives Paper Network Security Operations and Cloud Computing By Jon Oltsik, Senior Principal Analyst April 2015 This ESG Research Perspectives Paper was commissioned by Tufin and is distributed
Accelerate Software Development with DevOps and Hybrid Cloud
Accelerate Software Development with DevOps and Hybrid Cloud WHITE PAPER BROUGHT TO YOU BY SKYTAP 2 Accelerate Software Development with DevOps and Hybrid Cloud Contents Executive Summary..................................................................................................
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
SOLUTION BRIEF PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP The benefits of cloud computing are clear and compelling: no upfront investment, low ongoing costs, flexible capacity and fast application
Getting Started with DevOps Automation
Getting Started with DevOps Automation Cisco ebook by Scott Sanchez, Director of Strategy Table of Contents 1. 2. 3. 4. 5. 6. 7. Introduction... 3 Background... 4 Getting Started... 5 Selecting a Platform...
WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT
WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT Executive Overview SAML (Security Assertion Markup Language) is a standard that facilitates the exchange of security information. Developed by
Web Application Platform for Sandia
Web Application Platform for Sandia Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for
Cloud Computing Thunder and Lightning on Your Horizon?
Cloud Computing Thunder and Lightning on Your Horizon? Overview As organizations automate more and more of their manual processes, the Internet is increasingly becoming an important tool in the delivery
The Defense RESTs: Automation and APIs for Improving Security
The Defense RESTs: Automation and APIs for Improving Security Want to get better at security? Improve your operations and your development practices. The key is to centralize management, automate and test.
DivvyCloud spreads its bets from cloud management platform to DevOps Analyst: Jay Lyman 2 Apr, 2015 DivvyCloud, a cloud management and DevOps startup based in McLean, Virginia, supports on-premises multi-
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Automate Key Network Compliance Tasks
NETBRAIN SOLUTIONS Network Compliance Network Document Automation Automate Key Network Compliance Tasks CHALLENGE: Generating audit documents to demonstrate compliance is extrememly time consuming. Proactive
An Application-Centric Infrastructure Will Enable Business Agility
An Application-Centric Infrastructure Will Enable Business Agility March 2014 Prepared by: Zeus Kerravala An Application-Centric Infrastructure Will Enable Business Agility by Zeus Kerravala March 2014
Copyright 2015 EMC Corporation. All rights reserved. 1
Copyright 2015 EMC Corporation. All rights reserved. 1 CLOUD READY DATA PROTECTION BUILT FOR SOFTWARE DEFINED DATACENTER YATIN PATIL Copyright 2015 EMC Corporation. All rights reserved. 2 TWEET US! Are
This policy shall be reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment.
- 1. Policy Statement All card processing activities and related technologies must comply with the Payment Card Industry Data Security Standard (PCI-DSS) in its entirety. Card processing activities must
Service Orchestration
June 2015 Service Orchestration Infos and Use Cases Falko Dautel Robert Thullner Agenda + Overview + Use Cases & Demos VM Provisioning with ServiceNow Employee Onboarding + Summary + Questions & Answers
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Getting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
Dell Active System, Enabling service-centric IT, the path to the Cloud. Pavlos Kitsanelis Enterprise Solutions Lead Greece, Cyprus, Malta
Dell Active System, Enabling service-centric IT, the path to the Cloud Pavlos Kitsanelis Enterprise Solutions Lead Greece, Cyprus, Malta Delivery Deployment Cloud models & approaches Private Operated and
Building an Enterprise Hybrid Cloud with the VMware vcloud Solution
Building an Enterprise Hybrid Cloud with the VMware vcloud Solution Eduardo Penedos Customer Presentation 2009 VMware Inc. All rights reserved Agenda VMware vcloud Initiative IT Needs Cloud To Enable Efficiency
Close-Up on Cloud Security Audit
Close-Up on Cloud Security Audit Douglas W. Barbin 2014 BrightLine CPAs & Associates, Inc. All Rights Reserved 1 About Me Partner at BrightLine 17 years experience in security, assessments, forensics,
Identity and Access Management for the Cloud What You Need to Know About Managing Access to Your Clouds
Identity and Access Management for the Cloud What You Need to Know About Managing Access to Your Clouds Identity & Access Management One of the biggest challenges in information security is Identity and
Application Security Best Practices. Matt Tavis Principal Solutions Architect
Application Security Best Practices Matt Tavis Principal Solutions Architect Application Security Best Practices is a Complex topic! Design scalable and fault tolerant applications See Architecting for
David Corriveau, CEO Radix Technologies. Copyright 2011 Radix Technologies
Infrastructure Management and Cloud David Corriveau, CEO Radix Technologies Infrastructure Management and Cloud IaaS Cloud Infrastructure Services Private Cloud Reduce Cost of Infrastructure How does IaaSReduce
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1 Introduction What s in a name? SIEM? SEM? SIM? Technology Drivers Challenges & Technology Overview Deciding what s right for you Worst
Designing Virtual Network Security Architectures Dave Shackleford
SESSION ID: CSV R03 Designing Virtual Network Security Architectures Dave Shackleford Sr. Faculty and Analyst SANS @daveshackleford Introduction Much has been said about virtual networking and softwaredefined
Intelligent End User Compute Strategy. Ted Smith Nigel Brown
Intelligent End User Compute Strategy Ted Smith Nigel Brown Introduction Microserve Technical Service Managed Services Professional Services BCNet provider of Desktops, notebooks, tablets, displays, print
Managed Cloud Services
Managed Services From Data Centre to Managed Public Traditional data centre Virtual Data Centre In-house Dedicated External Multi-tenant External Managed Public Consulting approach: Breakdown of Business
Cloud Platform: the Intelligent Infrastructure Approach
Technology Cloud Platform: the Intelligent Infrastructure Approach Valerio Romano Communications, Media, High Tech Cloud Global Lead Cloud Confex at Gitex Technology Week Dubai, 21 October 2013 It s time
DevOps Best Practices for Mobile Apps. Sanjeev Sharma IBM Software Group
DevOps Best Practices for Mobile Apps Sanjeev Sharma IBM Software Group Me 18 year in the software industry 15+ years he has been a solution architect with IBM Areas of work: o DevOps o Enterprise Architecture
WHITE PAPER: Egenera Cloud Suite
WHITE PAPER: Egenera Cloud Suite ... Introduction Driven by ever-increasing business demand, cloud computing has become part of many organizations IT strategy today. Driving this transition is the need
Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management
Introductions KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Agenda 1. Introduction 2. What is Cloud Computing? 3. The Identity Management
How to Grow and Transform your Security Program into the Cloud
How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management
Cloud Computing with Amazon Web Services and the DevOps Methodology. www.cloudreach.com
Cloud Computing with Amazon Web Services and the DevOps Methodology Who am I? Max Manders @maxmanders Systems Developer at Cloudreach @cloudreach Director / Co-Founder of Whisky Web @whiskyweb Who are
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The image part with relationship ID rid2 was not found in the file. Insight
How to Achieve Operational Assurance in Your Private Cloud
How to Achieve Operational Assurance in Your Private Cloud As enterprises implement private cloud and next-generation data centers to achieve cost efficiencies and support business agility, operational
DevOps Best Practices: Combine Coding with Collaboration
Cognizant 20-20 Insights DevOps Best Practices: Combine Coding with Collaboration (Part Two of a Two-Part Series) Effectively merging application development and operations requires organizations to assess
Service Desks of the Future
Service Desks of the Future Contact Elimination, Self-Service and a Changing Workforce By: Louis Marchesani CAI Service Desk Product Owner 03/15/2013 Today s Topic This presentation explores how traditional
AWS Account Management Guidance
AWS Account Management Guidance Introduction Security is a top priority at AWS. Every service that is offered is tightly controlled and adheres to a strict security standard. This is evident in the security
Easily Managing User Accounts on Your Cloud Servers. How modern IT and ops teams leverage their existing LDAP/Active Directory for their IaaS
Easily Managing User Accounts on Your Cloud Servers How modern IT and ops teams leverage their existing LDAP/Active Directory for their IaaS How Did We Get Here? How the move to IaaS has created problems
A Look at the New Converged Data Center
Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable
Software Defined Everything
Software Defined Everything, s, Containers, and Storage Pete Chadwick Senior Product Manager [email protected] Joachim Werner Senior Product Manager [email protected] Data Center History - 1970s One (big)
Why continuous delivery needs devops, and why devops needs infrastructure-as-code. Sriram Narayan @sriramnarayan 25-Oct-2012
Why continuous delivery needs devops, and why devops needs infrastructure-as-code Sriram Narayan @sriramnarayan 25-Oct-2012 about me Part of ThoughtWorks Studios Go team Have consulted as Tech Principal,
How to Consolidate your App Monitoring Strategy: End-to-End User Experience Monitoring for Your BSM October 20, 2015
How to Consolidate your App Monitoring Strategy: End-to-End User Experience Monitoring for Your BSM October 20, 2015 Copyright 2015 Vivit Worldwide Copyright 2015 Vivit Worldwide Hosted by Rocky Pisto
DevOps. Josh Preston Solutions Architect Stardate 69094.1
DevOps Josh Preston Solutions Architect Stardate 69094.1 I keep hearing about DevOps What is it? FOR MANY ORGANIZATIONS, WHAT IS I.T. LIKE TODAY? WATERFALL AND SILOS Application Version X DEVELOPMENT OPERATIONS
How Cisco IT Automated End-to-End Infrastructure Provisioning In an Internal Private Cloud
Cisco IT Case Study June 2012 Cisco IT Elastic Infrastructure (CITEIS) Gen2 How Cisco IT Automated End-to-End Infrastructure Provisioning In an Internal Private Cloud Offering Infrastructure as a Service
ITIL Asset and Configuration. Management in the Cloud
ITIL Asset and Configuration Management in the Cloud An AWS Cloud Adoption Framework Addendum September 2015 A Joint Whitepaper with Minjar Cloud Solutions 2015, Amazon Web Services, Inc. or its affiliates.
Be Fast, but be Secure a New Approach to Application Security July 23, 2015
Be Fast, but be Secure a New Approach to Application Security July 23, 2015 Copyright 2015 Vivit Worldwide Copyright 2015 Vivit Worldwide Brought to you by Copyright 2015 Vivit Worldwide Hosted by Paul
SAP Business One mobile app for Android Version 1.0.x November 2013
SAP Business One mobile app for Android Version 1.0.x November 2013 Legal disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission
