HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training

Size: px
Start display at page:

Download "HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training"

Transcription

1 HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training HP and HP Enterprise Security Products are committed to your success as an HP Partner. In the Fortify Proof of Concept Boot Camp Training, our ESP partner presales and architecture team members can build the skills that will equip them to represent and position HP Fortify solutions and effectively deliver Fortify solution proof of concept engagements. Participants in the Boot Camp typically are partner resources who engineer solutions for their customers and are capable and experienced in the delivery of demonstrations and proof of concepts. HP Fortify Partner Enablement training allows HP Partners to effectively deliver compelling and effective security solutions for their customers. This two day training course covers technical presales and architecture components of the Fortify portfolio including SAST, DAST, RAST, and FOD via classroom content and real world examples. For more information about HP Fortify portfolio, visit Course Overview This training event consists of distinct sessions, each with its own registration to allow for flexibility in attendance. More information about each session can be found below: Session Day HP ExpertOne Fortify Security Solutions ATP Prep Day The first day of the Fortify Boot camp is focused on Partner s pre-sales and architect team members and provides a single day of intensive preparation for the HP ExpertOne Fortify Security Solutions HP0-A0 ExpertOne ATP examination. Through lectures and hand-on activities the student will validate they have the competencies to implement HP Fortify Static Code Analyzer, Software Security Center, WebInspect and Fortify Runtime After completing this course, the student should be able to determine if they are sufficiently skilled to sit the HP0-A0 ExpertOne Examination. Attendees of this day will receive a voucher to take the HP0-A0 Fortify Security Solutions ATP ExpertOne examination. Session Day - HP Fortify Proof of Concept Boot Camp The next three days are the Fortify Proof of Concept boot camp focused on Partner s pre-sales and architect team members. On the first day we will lay down the foundations of addressing strategic and winning proposals for HP Fortify where a Proof of Concept is requested or required. Using two PoC examples as the basis, we will exercise all necessary activities which drive a PoC that has an optimum result PoC including: Guidance to conduct PoC with HP Fortify Solution Products Give attendees a base understanding of HP Fortify product suite and the goals of a Proof of Value/Concept with HP Fortify solution products versus a demo. Outlining the PoV concept - Prerequisites and things to know before a PoV Dramatization of Value / Benefits (demonstration of common use cases / work flows tailored to Prospect circumstances) Understanding the Technical considerations - What's essential to successfully conduct a PoV HP Fortify SCA and HP WebInspect specifics

2 On the second day, of the Boot Camp we will build additional product awareness through POC practice including HP Fortify: Hands-on with configuration and use cases Ability to Troubleshoot Common Problems HP WebInspect: Hands-on with configuration and use cases Introduction to RASP - Application Defender Fortify on Demand PoC & On-boarding Presenting the results - What's good to show to customers The third day of the Boot Camp addresses advanced POC topics including: Advanced Auditing Best Practice Intro to Custom Rules - when to use and when not to Basic scan debugging and troubleshooting Basic security remediation Intro to custom rules Deep dive with various common languages FoD Deep-dive Static and Dynamic Analysis Objection handling Session Day HP Fortify Day with Product Management The last day of the Fortify boot camp is the Fortify Day with Product Management and is focused on a partner s Sales and Pre Sales team members. Attendees are presented with the Fortify Solution Products portfolio and will learn how HP Fortify fits in the bigger HP Enterprise Security Products (ESP) picture and how to deliver the right messages about Fortify to potential customers. By attending the session the attendees will learn about customers use cases and key selling points when facing customers with Application Security requirements. In addition, Fortify Product Managers will introduce new solution products as well as packaging and licensing. Pre requisites Day ATP Prep Day: months HP Fortify experience, or completion of Fortify Security Solutions - ATP course - Day - PoC Boot Camp is technical in nature, frequently addressing complex topics and materials. It is expected that attendees: Are familiar with the processes for SDLC. Are familiar with the Fortify solution set and general scope Have a good understanding of software risks, including what are XSS, SQLi, forceful browsing, invalidated inputs, Buffer Overflows/Overruns. (See OWASP site) SAST: Understanding of programming processes and toolsets including the use of IDE and Build servers. Basic working knowledge of the Fortify SAST products, particularly SCA (multiple OS) and SSC Server (multiple OS, Java app) DAST: Basic working knowledge of the Fortify DAST products, particularly WebInspect (desktop). Understanding of vulnerability scanning techniques including Crawling (Discovery) and Auditing (Attacks) as well as Manual methods. Working knowledge on networks and their general operation, including proxies, intercept proxy tools, and the uses and effects of IPS/IDS RAST: Basic working knowledge of the Fortify RAST products, particularly Runtime (RTAL/RTAP) Day Day with Product Management session requires some knowledge and some experience with Application Security technologies. Sales and Pre Sales should record skills in understanding customer requirements considering security monitoring and cyber defense. Technical Requirements What Attendees Need to Bring Most training content is delivered as slides, hand outs and white boarding. For hands on labs, please bring a lap top computer. We will have an installation of Fortify software for you to use during the session. Use of a tablet in these sessions is not recommended unless you have keyboard and mouse. Web browser requirements:

3 Chrome + Firefox + Safari HTML Important: Your HP Learner ID Along with your name and address, your HP Learning Center Learner ID will be used to register and track your attendance and recognize your partner organization for your training. If you do not have a HP Learner ID, please visit the HP Learner ID for Partners page to request your learner ID at: esstolc-upp-gpp.pdf A quick reference card with the steps to obtain the learner ID can also be found via a link at the bottom of that page. Please note that it can take up to three days for this to be processed, so start this activity early.

4 Course Modules Overview Below is a short overview of the modules covered during the different Boot Camp sessions. Breaks are organized every 90mn and lunch will be in the middle of the day. DAY---- Fortify Security Solutions ATP Prep Day Welcome Introduction Session presentation and objectives HP ESP & Fortify Overview Overview of HP ESP, the current state of Software Security, and the entire Fortify product suite static, dynamic, and run-time protection and purpose of each Common Software Development Application Security Methodologies OWASP Top 0 FSIMM OpenSAMM Microsoft SDL Implementation of Fortify Products Architecture of the Fortify Solution Software Security Center (SSC) Static Code Analyser (SCA) WebInspect Enterprise (WIE) Application Defender Software Security Threat Agents Insider threats vs. Outsider threats Day Fortify PoC Boot camp Session Introduction and goals An introduction to the team, discuss expectations and set goals HP ESP & Fortify Overview Overview of HP ESP, the current state of Software Security, and the entire Fortify product suite static, dynamic, and run-time protection and purpose of each Outlining HP Fortify Proof of Value/Concept This module will focus on the POC aspect from a business, sales, and troubleshooting perspective. PoC Best Practices & Common Mistakes & Software Security Assurance Deeper dive into the overall components of a POC and SSA process to include troubleshooting tactics, common mistakes made, and recommendations for success. Operational Proficiency: Issue Triage & Lab This is a hands-on Static Analysis module series. In this session, individuals will learn how to use Fortify SCA, Audit Workbench, Command-line Utility, and Software Security Center. During this module, the installation of the demonstration environment will take place and static analysis will be performed on sample source code to assess, triage, and promote vulnerability findings within the SDLC. SCA, SSC, AWB, IDE POC & Workflows 7 8 Operational Proficiency: Project configuration This module extends the Issue Triage & Lab session. This is a hands-on learning session on how to manage and maintain vulnerability findings through custom filters, folders, and tags. Operational Proficiency: Collaboration This module extends the Issue Triage & Lab session. This is a hands-on learning session on how to leverage SSC Governance and integrate with the IDE plugin. Day Fortify POC Boot camp Intro to Dynamic & Integrated Analysis - WebInspect Overview of HP WebInspect Standalone, Real-Time, and Enterprise versions and purpose of each Operational Proficiency: Blackbox & Ops A deep dive module on Dynamic Analysis security testing to address security concerns in web sites, web services, and mobile application components. This module is feature rich and will cover the most important aspects to help you deliver meaningful results to prospects and customers.

5 Intro to SaaS - FoD & Application Defender SaaS is a major differentiator for HP Fortify. This module series is a hands-on deep dive into Fortify on Demand and Application Defender. Operational Proficiency: RASP This module will involve the installation, verification, and configuration of Application Defender. This is a deep-dive hands-on session to introduce the newest Gartner Magic Quadrant category Real-time Application Self-Protection. Operational Proficiency: SaaS This module will go into the details of Static, Dynamic, and Mobile Application Testing methodologies in the Cloud. This module will cover the differences and similarities of an on premise vs. in-the-cloud solution. Back-office operations and complexity and scale of the overall solution will also be discussed. Intro to Advanced Auditing Best Practices Practical Custom Rules Day Fortify POC Boot camp Deep Dive with.net & Java Deep Dive with C & C++ Deep Dive with Objective-C, Ruby & Others Fortify on Demand Deep Dive Build Integration Bug-tracker Integration Integration with FoD on Premise Data export to GRC or other management information systems FoD API Playbook Overview Day Day with Product Management Fortify Security Strategy Fortify Architecture and Design How to Sell the Fortify Product suite Facing our competitors Competitive update Product Roadmap and Updates SCA/SSC/tools WI/WIE Runtime products FoD/SaaS upgrades and migrations, obsolescence 7 Marketing campaigns, SPIFFs, programs Learn more at arrowecs.de

Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company

Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company Product Roadmap Sushant Rao Principal Product Manager Fortify Software, a HP company Agenda Next Generation of Security Analysis Future Directions 2 Currently under investigation and not guaranteed to

More information

HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA lvonstockhausen@hp.com +49 1520 1898430 Enterprise Security

HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA lvonstockhausen@hp.com +49 1520 1898430 Enterprise Security HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA lvonstockhausen@hp.com +49 1520 1898430 Enterprise Security The problem Cyber attackers are targeting applications

More information

Is your software secure?

Is your software secure? Is your software secure? HP Fortify Application Security VII konferencja Secure 2013 Warsaw - October 9, 2013 Gunner Winkenwerder Sales Manager Fortify CEE, Russia & CIS HP Enterprise Security +49 (172)

More information

Fortify Training Services. Securing Your Entire Software Portfolio FRAMEWORK*SSA

Fortify Training Services. Securing Your Entire Software Portfolio FRAMEWORK*SSA Fortify Training Services Securing Your Entire Software Portfolio FRAMEWORK*SSA Fortify s holistic approach to application security truly safeguards our enterprise against today s ever-changing security

More information

Introduction. Secure Software Development 9/03/2015. Matias starts. Daan takes over. Matias takes over. Who are we? Round of introductions

Introduction. Secure Software Development 9/03/2015. Matias starts. Daan takes over. Matias takes over. Who are we? Round of introductions Matias starts Who are we? Applying Static Analysis Matias Madou and Daan Raman, Leuven, Feb 27, 2015 1 At NVISO, I m responsible for the software security practice. Next to the client work, I also leads

More information

Accelerating Software Security With HP. Rob Roy Federal CTO HP Software

Accelerating Software Security With HP. Rob Roy Federal CTO HP Software Accelerating Software Security With HP Rob Roy Federal CTO HP Software If we were in a cyberwar today, the United States would lose. Mike McConnell Former DNI, NSA. Head of Booz Allen Hamilton National

More information

HP Fortify application security

HP Fortify application security HP Fortify application security Erik Costlow Enterprise Security The problem Cyber attackers are targeting applications Networks Hardware Applications Intellectual Property Security Measures Switch/Router

More information

From the Bottom to the Top: The Evolution of Application Monitoring

From the Bottom to the Top: The Evolution of Application Monitoring From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:

More information

IoT Potential Risks and Challenges

IoT Potential Risks and Challenges IoT Potential Risks and Challenges GRIFES / GITI / EPFL Alumni Conference, Lausanne, May 7 th, 2015 Stefan Schiller, HP ESP Fortify Solution Architect D/A/CH IoT Potential Risks and Challenges Agenda IDC

More information

HP Fortify Software Security Center

HP Fortify Software Security Center HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)

More information

Application Security Testing How to find software vulnerabilities before you ship or procure code

Application Security Testing How to find software vulnerabilities before you ship or procure code Application Security Testing How to find software vulnerabilities before you ship or procure code Anita D Amico, Ph.D. Hassan Radwan 1 Overview Why Care About Application Security? Quality vs Security

More information

Who, What, Where, How: Five Big Questions in Mobile Security

Who, What, Where, How: Five Big Questions in Mobile Security Who, What, Where, How: Five Big Questions in Mobile Security Jacob West CTO, Fortify Products HP Enterprise Security Session ID: ASEC-R31 Session Classification: Intermediate Why is mobile security an

More information

Cloud & Datacenter Monitoring with System Center Operations Manager

Cloud & Datacenter Monitoring with System Center Operations Manager Page 1 of 5 Overview This course equips students with the skills they require to deploy and configure System Center 2012 R2 Operations. Using hands-on labs, students learn the following: How to architect

More information

Partner Enablement Training PRESENTED BY: TABLEAU PARTNER TEAM

Partner Enablement Training PRESENTED BY: TABLEAU PARTNER TEAM Partner Enablement Training PRESENTED BY: TABLEAU PARTNER TEAM Welcome On behalf of Tableau s Global Channel, we welcome you to Tableau s Partner Enablement Training! It is because of you that this program

More information

Architecting HP Cloud Solutions, Rev. 13.21

Architecting HP Cloud Solutions, Rev. 13.21 mm HP ExpertOne Architecting HP Cloud Solutions, Rev. 13.21 Course data sheet Certification(s) supported by this course: Exam(s): Format: Duration: Course ID: HP ASE Cloud Architect V2 HP0-D17 (Architecting

More information

Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE. Jimmie Parson Checkpoint Technologies

Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE. Jimmie Parson Checkpoint Technologies Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE Jimmie Parson Checkpoint Technologies Welcome, Introductions Agenda Checkpoint Technologies Quick Corporate Overview Why do

More information

Security Tools - Hands On

Security Tools - Hands On Security Tools - Hands On SecAppDev 2014 Ken van Wyk, @KRvW! Leuven, Belgium 10-14 February 2014 Caveats and Warnings This is not a sales pitch for any product(s) If you want to talk to a sales person,

More information

Fortify. Securing Your Entire Software Portfolio

Fortify. Securing Your Entire Software Portfolio Fortify 360 Securing Your Entire Software Portfolio Fortify Fortify s holistic approach to application security truly safeguards our enterprise against today s ever-changing security threats. Craig Schumard,

More information

IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING

IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY How runtime application security monitoring helps enterprises make smarter decisions on remediation 2 ABSTRACT Enterprises today

More information

Bringing Security Testing to Development. How to Enable Developers to Act as Security Experts

Bringing Security Testing to Development. How to Enable Developers to Act as Security Experts Bringing Security Testing to Development How to Enable Developers to Act as Security Experts Background: SAP SE SAP SE Business Software Vendor Over 68000 employees Worldwide development Myself Security

More information

Application Security Center overview

Application Security Center overview Application Security overview Magnus Hillgren Presales HP Software Sweden Fredrik Möller Nordic Manager - Fortify Software HP BTO (Business Technology Optimization) Business outcomes STRATEGY Project &

More information

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Security-as-a-Service (Sec-aaS) Framework. Service Introduction Security-as-a-Service (Sec-aaS) Framework Service Introduction Need of Information Security Program In current high-tech environment, we are getting more dependent on information systems. This dependency

More information

The Evolution of Enterprise Application Security. Why enterprises need runtime application self-protection

The Evolution of Enterprise Application Security. Why enterprises need runtime application self-protection The Evolution of Enterprise Application Security Why enterprises need runtime application self-protection 2 Abstract Enterprise information security encompasses a broad set of disciplines and technologies,

More information

What s New in HP Fortify Software Security Center 4.20

What s New in HP Fortify Software Security Center 4.20 What s New in HP Fortify Software Security Center 4.20 September 2014 This release of HP Fortify Software Security Center includes the 10.30 release of WebInspect and WebInspect Enterprise. The WebInspect

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

! Resident of Kauai, Hawaii

! Resident of Kauai, Hawaii SECURE SDLC Jim Manico @manicode! OWASP Volunteer! Global OWASP Board Member! Manager of several OWASP secure coding projects! Security Instructor, Author! 17 years of web-based, databasedriven software

More information

Information Security: Enabling the Business Developing an Effective Application Security Program

Information Security: Enabling the Business Developing an Effective Application Security Program Information Security: Enabling the Business Developing an Effective Application Security Program Bruce C Jenkins (bcj@hp.com) AppSec Program Strategist 04 April 2014 About me Commonwealth IT Security Conference

More information

What s New in HP Fortify Software Security Center 4.30 and HP WebInspect 10.40 Products

What s New in HP Fortify Software Security Center 4.30 and HP WebInspect 10.40 Products What s New in HP Fortify Software Security Center 4.30 and HP WebInspect 10.40 Products April 2015 This release of HP Fortify Software Security Center includes the 10.40 release of WebInspect and WebInspect

More information

Getting Started with Web Application Security

Getting Started with Web Application Security Written by Gregory Leonard February 2016 Sponsored by Veracode 2016 SANS Institute Since as far back as 2005, 1 web applications have been attackers predominant target for the rich data that can be pulled

More information

Starting your Software Security Assurance Program. May 21, 2015 ITARC, Stockholm, Sweden

Starting your Software Security Assurance Program. May 21, 2015 ITARC, Stockholm, Sweden Starting your Software Security Assurance Program May 21, 2015 ITARC, Stockholm, Sweden Presenter Max Poliashenko Chief Enterprise Architect Wolters Kluwer, Tax & Accounting Max leads the Enterprise Architecture

More information

THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY

THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY Why enterprises need runtime application self-protection 2 ABSTRACT Enterprise information security encompasses

More information

Решения HP по информационной безопасности

Решения HP по информационной безопасности Решения HP по информационной безопасности Евгений Нечитайло ynechyta@hp.com Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject

More information

Security Testing of Java web applications Using Static Bytecode Analysis of Deployed Applications

Security Testing of Java web applications Using Static Bytecode Analysis of Deployed Applications Security Testing of Java web applications Using Static Bytecode Analysis of Deployed Applications Streamline your web application Security testing with IBM Security AppScan Source 9.0.1 Leyla Aravopoulos

More information

HP Application Security Center

HP Application Security Center HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and

More information

HP Yazılım Zirvesi - İstanbul 20 May 2015 - Wyndham Grand Levent Burak DAYIOĞLU, Hüseyin ÖZEL Uygulamalarım Ne Kadar Güvende?

HP Yazılım Zirvesi - İstanbul 20 May 2015 - Wyndham Grand Levent Burak DAYIOĞLU, Hüseyin ÖZEL Uygulamalarım Ne Kadar Güvende? HP Yazılım Zirvesi - İstanbul 20 May 2015 - Wyndham Grand Levent Burak DAYIOĞLU, Hüseyin ÖZEL Uygulamalarım Ne Kadar Güvende? Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained

More information

Seamless integration Connect our solution to your business applications thanks to our open architecture

Seamless integration Connect our solution to your business applications thanks to our open architecture t b Product data management Manage Product Breakdown Structure and their configurations Process and change management Track and organize changes on your parts, products and documents Seamless integration

More information

elearning for Secure Application Development

elearning for Secure Application Development elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security

More information

The Evolution of Application Monitoring

The Evolution of Application Monitoring The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments

More information

Certified Selenium Professional VS-1083

Certified Selenium Professional VS-1083 Certified Selenium Professional VS-1083 Certified Selenium Professional Certified Selenium Professional Certification Code VS-1083 Vskills certification for Selenium Professional assesses the candidate

More information

Improving your Secure SDLC ( SSDLC ) with Prevoty. How adding real-time application security dramatically decreases vulnerabilities

Improving your Secure SDLC ( SSDLC ) with Prevoty. How adding real-time application security dramatically decreases vulnerabilities Improving your Secure SDLC ( SSDLC ) with Prevoty How adding real-time application security dramatically decreases vulnerabilities February 2015 Improving your Secure SDLC ( SSDLC ) with Prevoty Table

More information

Security Training-as-a-Service (STr-aaS) Service Details & Features

Security Training-as-a-Service (STr-aaS) Service Details & Features Security Training-as-a-Service (STr-aaS) Service Details & Features Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware

More information

IBM Rational AppScan: Application security and risk management

IBM Rational AppScan: Application security and risk management IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM

More information

NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES

NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES COMPREHENSIVE VISIBILITY INTO END USER EXPERIENCE MONITORING REQUIRES

More information

PARTNER TRAINING AND CERTIFICATION

PARTNER TRAINING AND CERTIFICATION PARTNER TRAINING AND CERTIFICATION Partners who place a high degree of importance on proper technical education and training significantly outperform partners who don t. OVERVIEW The Workfront Partner

More information

Automatic vs. Manual Code Analysis

Automatic vs. Manual Code Analysis Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy ari.kesaniemi@nixu.com Copyright The Foundation Permission is granted to copy, distribute and/or modify this

More information

Application Security Testing

Application Security Testing Tstsec - Version: 1 09 July 2016 Application Security Testing Application Security Testing Tstsec - Version: 1 4 days Course Description: We are living in a world of data and communication, in which the

More information

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.

More information

NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES

NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES COMPREHENSIVE VISIBILITY INTO END USER EXPERIENCE MONITORING REQUIRES

More information

Eclipse-based Applications: Java on the Desktop Revisited

Eclipse-based Applications: Java on the Desktop Revisited Eclipse-based Applications: Java on the Desktop Revisited EclipseCon - Rich Client Platform Track Tuesday, February 3 rd, 3:45pm-4:30pm Todd Williams, Genuitec LLC Paul May, AlterPoint Inc Giovanni Farris,

More information

Selling HP Fortify Solutions

Selling HP Fortify Solutions Selling HP Fortify Solutions FOR HP CHANNEL PARTNERS 2 Sales plays 6 14 15 traps Sales Playbook There has never been a better time to sell HP s security solutions. Trends in Big Data, cloud, and mobile

More information

Application Code Development Standards

Application Code Development Standards Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards

More information

TEAM Academy Catalog. 187 Ballardvale Street, Wilmington, MA 01887 +1.978.694.1008 www.securityinnovation.com

TEAM Academy Catalog. 187 Ballardvale Street, Wilmington, MA 01887 +1.978.694.1008 www.securityinnovation.com TEAM Academy Catalog 187 Ballardvale Street, Wilmington, MA 01887 +1.978.694.1008 TEAM ACADEMY OVERVIEW 2 Table of Contents TEAM Academy Overview... 4 TEAM Professor Overview... 4 Security Awareness and

More information

Building on these core skills, customers can work on advanced concepts, such as:

Building on these core skills, customers can work on advanced concepts, such as: OpenStack Training OVERVIEW OnX s OpenStack training courses provide a deep and practical understanding of all aspects of today s most popular cloud platform. Unlike other training providers, OnX offerings

More information

ServiceNow Authorized Training Partner. Program Guide

ServiceNow Authorized Training Partner. Program Guide ServiceNow Authorized Training Partner Program Guide ServiceNow Authorized Training Partner Program Guide Table of Contents Introduction... 3 Section I: ATP Program... 3 Program Overview... 3 Partner Candidate

More information

Adobe Systems Incorporated

Adobe Systems Incorporated Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...

More information

Security Operation Centre 5th generation

Security Operation Centre 5th generation Security Operation Centre 5th generation transition Cezary Prokopowicz Regional Manager SEE HP Enterprise Security Products 2 3 4 5 Challenges you are facing 1 Nature and motivation of attacks (Fame to

More information

HP Data Protector 9.x Essentials - Training Agenda

HP Data Protector 9.x Essentials - Training Agenda HP Data Protector 9.x Essentials - Training Agenda Course Outline This course is an introduction to HPDP (HP Data Protector). Attendees will learn the bene ts of leveraging HPDP and how to install, con

More information

Security Innovation Application Security Education Curriculum. Courses to Help Build and Deploy more Secure Software and Information Systems

Security Innovation Application Security Education Curriculum. Courses to Help Build and Deploy more Secure Software and Information Systems Security Innovation Application Security Education Curriculum Courses to Help Build and Deploy more Secure Software and Information Systems Table of Contents 1.0 Security Education Curriculum Map... 3

More information

Course Design Document: IS429: Cloud Computing and SaaS Solutions. Version 1.0

Course Design Document: IS429: Cloud Computing and SaaS Solutions. Version 1.0 Course Design Document: IS429: Cloud Computing and SaaS Solutions Version 1.0 08 October 2010 Table of Content Versions History... 4 Overview of the Cloud Computing and SaaS Solutions Course... 5 Synopsis...5

More information

Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. ???? 1 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Application Delivery is Accelerating Surge in # of releases per app

More information

Reinventing Virtual Learning: Delivering Hands-On Training using Cloud Computing

Reinventing Virtual Learning: Delivering Hands-On Training using Cloud Computing Reinventing Virtual Learning: Delivering Hands-On Training using Cloud Computing WHITE PAPER BROUGHT TO YOU BY SKYTAP 2 Reinventing Virtual Learning: Delivering Hands-On Training using Cloud Computing

More information

HTML5 SECURITY. Why Should I Care? Ofer Shezaf, ofr@hp.com Product Manager, Security Solutions HP ArcSight

HTML5 SECURITY. Why Should I Care? Ofer Shezaf, ofr@hp.com Product Manager, Security Solutions HP ArcSight HTML5 SECURITY Why Should I Care? Ofer Shezaf, ofr@hp.com Product Manager, Security Solutions HP ArcSight 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change

More information

DocDokuPLM Innovative PLM solution

DocDokuPLM Innovative PLM solution PLM DocDokuPLM Innovative PLM solution DocDokuPLM: a business solution Manage the entire lifecycle of your products from ideas to market and setup your information backbone. DocDokuPLM highlights Anywhere

More information

Sage CRM What s New with Sage CRM 7.2 - Standalone. Sage CRM What s New with Sage CRM 7.2 -Standalone

Sage CRM What s New with Sage CRM 7.2 - Standalone. Sage CRM What s New with Sage CRM 7.2 -Standalone Sage CRM What s New with Sage CRM 7.2 - Standalone Sage CRM What s New with Sage CRM 7.2 -Standalone Agenda 7.2 On Premise Release EndUser Features Other Features Technology Changes Integrations Roadmap

More information

Integrating Application Security into the Mobile Software Development Lifecycle. WhiteHat Security Paper

Integrating Application Security into the Mobile Software Development Lifecycle. WhiteHat Security Paper Integrating Application Security into the Mobile Software Development Lifecycle WhiteHat Security Paper Keeping pace with the growth of mobile According to the November 2015 edition of the Ericsson Mobility

More information

Building Assurance Into Software Development Life- Cycle (SDLC)

Building Assurance Into Software Development Life- Cycle (SDLC) Application Software Assurance Center of Excellence (ASACoE) Building Assurance Into Software Development Life- Cycle (SDLC) James Woody Woodworth Operations Chief, ASACoE & Sean Barnum, Principal Consultant

More information

OVERVIEW. Enterprise Security Solutions

OVERVIEW. Enterprise Security Solutions Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s

More information

CTX-4100BI Citrix Presentation Server 4.5 and XenApp 5.0 for Windows Server 2003: Skills Update

CTX-4100BI Citrix Presentation Server 4.5 and XenApp 5.0 for Windows Server 2003: Skills Update CTX-4100BI Citrix Presentation Server 4.5 and XenApp 5.0 for Windows Server 2003: Skills Update Designed for experienced XenApp users, this course provides the foundation necessary to effectively deploy

More information

Streamlining Application Vulnerability Management: Communication Between Development and Security Teams

Streamlining Application Vulnerability Management: Communication Between Development and Security Teams Streamlining Application Vulnerability Management: Communication Between Development and Security Teams October 13, 2012 OWASP Boston Application Security Conference Agenda Introduction / Background Vulnerabilities

More information

Stories From the Front Lines: Deploying an Enterprise Code Scanning Program

Stories From the Front Lines: Deploying an Enterprise Code Scanning Program Stories From the Front Lines: Deploying an Enterprise Code Scanning Program Adam Bixby Manager Gotham Digital Science 10/28/2010 YOUR LOGO HERE Introduction Adam Bixby, CISSP, MS o Manager at Gotham Digital

More information

Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance

Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute

More information

SAST, DAST and Vulnerability Assessments, 1+1+1 = 4

SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges

More information

CLOUD COMPUTING & WINDOWS AZURE

CLOUD COMPUTING & WINDOWS AZURE CLOUD COMPUTING & WINDOWS AZURE WORKSHOP Overview This workshop is an introduction to cloud computing and specifically Microsoft s public cloud offering in Windows Azure. Windows Azure has been described

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE How application threat intelligence can make existing enterprise security infrastructures smarter THE BLIND SPOT IN THREAT INTELLIGENCE

More information

1000 Projects later. Security Code Scans at SAP

1000 Projects later. Security Code Scans at SAP 1000 Projects later Security Code Scans at SAP About Us Ruediger Bachmann is a Development Architect at SAP AG working, as member of the central code analyses team, in the areas application security and

More information

Implementing and Administering an Enterprise SharePoint Environment

Implementing and Administering an Enterprise SharePoint Environment Implementing and Administering an Enterprise SharePoint Environment There are numerous planning and management issues that your team needs to address when deploying SharePoint. This process can be simplified

More information

Digital Marketplace - G-Cloud

Digital Marketplace - G-Cloud Digital Marketplace - G-Cloud CRM Services Core offer 9 services in this area: 1. Dynamics CRM Upgrade Services Utilising this service, Core will undertake an evaluation of your current CRM platform. We

More information

HP WebInspect Tutorial

HP WebInspect Tutorial HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the

More information

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced

More information

MicroStrategy Course Catalog

MicroStrategy Course Catalog MicroStrategy Course Catalog 1 microstrategy.com/education 3 MicroStrategy course matrix 4 MicroStrategy 9 8 MicroStrategy 10 table of contents MicroStrategy course matrix MICROSTRATEGY 9 MICROSTRATEGY

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

Course Prerequisites and System Requirements. ICCE - Part 1, ICCE - Part 2, and ICCS Prerequisites

Course Prerequisites and System Requirements. ICCE - Part 1, ICCE - Part 2, and ICCS Prerequisites Education Services Course Prerequisites and System Requirements ICCE - Part 1, ICCE - Part 2, and ICCS Prerequisites Interactive Intelligence, Inc. (Interactive) training is available to Resellers, Partners,

More information

MCITP: Enterprise Messaging Administrator 2010 Boot Camp

MCITP: Enterprise Messaging Administrator 2010 Boot Camp MCITP: Enterprise Messaging Administrator 2010 Boot Camp Validate your Exchange Server skills with the MCITP: Enterprise Messaging Administrator certification. In an intensive and immersive hands-on learning

More information

Developing ASP.NET MVC 4 Web Applications

Developing ASP.NET MVC 4 Web Applications Course M20486 5 Day(s) 30:00 Hours Developing ASP.NET MVC 4 Web Applications Introduction In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools

More information

LR120 LoadRunner 12.0 Essentials

LR120 LoadRunner 12.0 Essentials LR120 LoadRunner 12.0 Essentials Overview This five-day course introduces students to HP LoadRunner 12.0, including the usage of Virtual User Generator (VuGen), Controller and Analysis tools. This course

More information

Proof of Concept service. Professional and Managed Services. Installation services. First Looks

Proof of Concept service. Professional and Managed Services. Installation services. First Looks SUPPORT SERVICES Professional and Managed Services Exclusive Networks offers an extensive professional and managed services portfolio, which enables our business partners to successfully expand their product

More information

Strategic Information Security. Attacking and Defending Web Services

Strategic Information Security. Attacking and Defending Web Services Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP dgreen@securityps.com Introduction About Security PS Application Security Assessments

More information

WebGoat for testing your Application Security tools

WebGoat for testing your Application Security tools WebGoat for testing your Application Security tools NAISG-DFW February 28 th, 2012 Michael A Ortega, CISSP CEH CISM GCFA Sr Application Security Professional IBM Security Systems 312.523.1538 maortega@us.ibm.com

More information

VA SOFTWARE ASSURANCE PROGRAM OFFICE

VA SOFTWARE ASSURANCE PROGRAM OFFICE VA Code Review Process elearning Module Start >> VA Code Review Process elearning Module Getting Started About Fortify About VA This section provides an introduction to this elearning course. This section

More information

Customer Site Requirements for incontact Workforce Optimization 16.2. www.incontact.com

Customer Site Requirements for incontact Workforce Optimization 16.2. www.incontact.com Customer Site Requirements for incontact Workforce Optimization 16.2 www.incontact.com Customer Site Requirements for incontact Workforce Optimization Version 16.2 Last Revision June 2016 About incontact

More information

BRINGING CLOUD TRADITIONAL DESKTOP COMPUTING TO APPLICATIONS

BRINGING CLOUD TRADITIONAL DESKTOP COMPUTING TO APPLICATIONS BRINGING CLOUD COMPUTING TO TRADITIONAL DESKTOP APPLICATIONS Overview Our client, a fast growing startup in the Silicon Valley, has built a scalable web based collaboration platform to help businesses

More information

Core Solutions of Microsoft Exchange Server 2013

Core Solutions of Microsoft Exchange Server 2013 EXCHANGE 2013 COURSE OUTLINE Visit Our Website to Enroll Now Www.ITBigBang.Com/IT-Training Core Solutions of Microsoft Exchange Server 2013 Course Title Core Solutions of Microsoft Exchange Server 2013

More information

SAP Crystal Reports & SAP HANA: Integration & Roadmap Kenneth Li SAP SESSION CODE: 0401

SAP Crystal Reports & SAP HANA: Integration & Roadmap Kenneth Li SAP SESSION CODE: 0401 SAP Crystal Reports & SAP HANA: Integration & Roadmap Kenneth Li SAP SESSION CODE: 0401 LEARNING POINTS Learn about Crystal Reports for HANA Glance at the road map for the product Overview of deploying

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

Interconnecting Cisco Networking Devices, Part 2 **Part of CCNA Route/Switch**

Interconnecting Cisco Networking Devices, Part 2 **Part of CCNA Route/Switch** Course: Interconnecting Cisco Networking Devices, Part 2 Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,295.00 Learning Credits: 33 Certification: CCNA Route/Switch Description: The Interconnecting

More information

Passing PCI Compliance How to Address the Application Security Mandates

Passing PCI Compliance How to Address the Application Security Mandates Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These

More information

Adobe Experience Manager: Commerce

Adobe Experience Manager: Commerce Adobe Experience Manager: Commerce Datasheet Adobe Experience Manager: Commerce Benefits of e-commerce capabilities Agile merchandising and marketing Rapid and flexible customization of the shopping experience

More information

A white paper analysis from Orasi Software. Enterprise Security. Attacking the problems of application and mobile security

A white paper analysis from Orasi Software. Enterprise Security. Attacking the problems of application and mobile security A white paper analysis from Orasi Software Enterprise Security Attacking the problems of application and mobile security Introduction: Securing the Mobile Enterprise The mobile enterprise has created vast

More information