New Red Hat Services Sessions at Red Hat Summit Virtual Experience

Coinciding with Red Hat® Summit Virtual Experience: Open House, an experience that provides you access to all-new sessions and live opportunities to ask Red Hat technology experts questions on key topics, our Red Hat Global Services team is releasing new sessions! Continue learning from our Services experts as they share their knowledge, customer insights, and best practices with a focus on: client success, deep expertise, and emerging technology adoption. 

 

Our newly released Red Hat Services sessions include:

Continue reading “New Red Hat Services Sessions at Red Hat Summit Virtual Experience”

User Federation with Red Hat Single Sign On

Many organizations often have existing user data-stores that hold information about users and their credentials. Typically, enterprise applications would have different user bases and the underlying user account management systems might be different for each of the applications.
To handle the complexity associated with multiple user data-stores, each application layer will have to have a suitable authentication module that handles authentication & authorization with the underlying user account management systems. This results in the proliferation of authentication modules for each application and it gets closely tied with application life-cycle.
In this session, you’ll learn how Keycloak/RHSSO provides a unified way to federate different user account systems. More specifically, you’ll see how effectively the user accounts from an external LDAP server and a MySQL database (that holds user accounts) could be federated with the help of Keycloak/RHSSO.

Continue reading “User Federation with Red Hat Single Sign On”

Is Edge Security a weak point

Security is a worry because Edge is perceived as a weak point that will provide hackers and malware with millions of new openings into the digital infrastructure that supports tomorrow’s global economy. Yet, although Edge security poses risks, and there are plenty of holes to fill, there are also many leading ICT companies that focus on the big picture and can provide end-to-end security both for individual devices and for the network as a whole.  

 

There are two types of security with which we must concern ourselves. The first is the security of the actual Edge devices; the second is the security of the data those devices collect and send to other points in the network. 

Continue reading “Is Edge Security a weak point”

Securing Website: TLS/SSL, Certificate Authority, Self-Signed Certificate, and Open source tools

Securing Your Virtual Environment

Catching up with New Horizons Computer Learning Centers of Southern California

Based in Southern California, with five offices in Los Angeles, Orange, San Diego and San Bernardino counties, New Horizons Computer Learning Centers of Southern California was recently named Red Hat Training’s Ready Partner of the Year at the annual Red Hat Training Partner Conference in Las Vegas, NV. As part of the world’s largest independent IT training company, New Horizons Computer Learning Centers of Southern California is a learning solutions provider for the industry’s top vendors, and has been a Red Hat Training Partner since 2010. We recently caught up with New Horizons Computer learning Centers of Southern California’s CEO, Kevin Landry, for his thoughts regarding the state of the training industry today and how it will change tomorrow.

Who are you training these days?
The market we’re in is a little bit unique. 70% of our business is considered B2B or enterprise business, companies like Disney, Southern California Edison, and Ingram Micro. Working with Red Hat over the past several years, we’ve continually seen this business double year after year. Developers in training is the largest growth area, but the greatest area of interest we’ve seen increase has been in the consumer market, where individuals fund their own training. I’d say 30% of the individuals that we train fall into this latter group, and are funding training on their own or have alternative government funding, such as VA benefits or unemployment benefits.

What are the most common reasons people are getting trained right now?
Skill shortage is the main reason that individuals are seeking training, and being that it’s more likely these days to see Linux or Red Hat in a job description, we’ve seen a lot of growth in consumers seeking Red Hat Certifications.

Continue reading “Catching up with New Horizons Computer Learning Centers of Southern California”

Behind Red Hat Server Hardening (RH413)

by Scott McBrien (Red Hat)

My name is Scott McBrien. I work for the Red Hat Training Curriculum Development Team and was the project leader for the development of the Red Hat Server Hardening (RH413) course. Before joining the Red Hat Training Curriculum Development Team, I worked as both a Red Hat training instructor and consultant. I hope that my field experiences show through in our new class.

When I first started thinking of writing a security focused class, I tried to think about what story would make a compelling course that I, and other systems administrators, would like to attend. One of the topics that I have seen grow to be pervasive in the systems administration community is Security Policy Compliance. Many of us have had the lovely experience of having someone from another team, or an outside consultant, come in to run some type of scanning software against our machine, and say “You’re not in compliance with SECURITY-STANDARD”. In my experience, the systems administrator is told to fix the deficiency without a lot of direction from the person telling them that there’s a problem, or worse, they are given instructions by someone who is not an expert on the technology, which fixes the audit deficiency, but down the line causes problems. A situation that I see over and over again is systems administrators being told to install non-supported software on their Red Hat Enterprise Linux machines because the version they have is “old” or “vulnerable”. In reality, Red Hat does a lot of work to publish updates to Red Hat Enterprise Linux (and other products) so that an administrator can use supported, packaged software from Red Hat and not have software open to known vulnerabilities. Red Hat’s update management and application of updates is the first topic in “Red Hat Server Hardening”.

Continue reading “Behind Red Hat Server Hardening (RH413)”

  • Page 1 of 2
  • 1
  • 2
  • >