You've requested...

All Systems Go: Novell & Microsoft Interoperability Web Seminar

If a new window did not open, click here to view this asset.

Download this next:

Analysis of the Linux Audit System

Audit mechanisms on an operating system (OS) record relevant system events to provide information for analysing the trustworthiness of the system. This is especially important for detecting or investigating potential compromises of a system.

In Linux-based operating systems, the standard framework for auditing is the Linux Audit Subsystem. It generates, processes and records relevant audit events either from within the kernel or from user-space programs. In this article, we identify serious flaws due to architectural limitations of the Linux kernel, which cast doubts on its ability to provide forensically sound audit records. We also examine these limitations and discuss possible mitigation methods.

These are also closely related to: "All Systems Go: Novell & Microsoft Interoperability Web Seminar"

  • How open source is spurring digital transformation

    From Linux to Kubernetes, open source software has been instrumental in supporting efforts by organisations across the Asia-Pacific region to transform digitally. In this e-guide, read more about open source developments across the region, including how Malaysia's AmBank has been using open source tools to engineer its software from the ground-up to suit its needs, rather than customise off-the-shelf products and ANZ Bank's move to Red Hat OpenShift, and what technology suppliers are doing to support deployments of containerised applications on open source platforms.

  • A Computer Weekly Buyer's Guide to Server Operating Systems

    The role of a server operating system is shifting. It has

    been influenced by cloud computing – whether it be

    public or private – as well as virtualisation.

     

    In this 12-page buyer’s guide, Computer Weekly explores:

    -          What’s new in Windows Server 2016; an OS designed with cloud in mind

    -          What has changed between Linux & Unix and the current state of play between the two competing OS

    -          The evolution of the server operating

    system, and sees the next generation moving into the cloud

Find more content like what you just read:

  • How to migrate Linux Servers from VMware ESX to Proxmox using Carbonite Migrate

    This video will show you how easy it is to migrate live running Linux or Windows servers from VMware ESX to Proxmox.

    Download

  • Migrating Windows servers from VMware ESX to Proxmox using Carbonite Migrate

    This video will show you how easy it is to migrate live running Linux or Windows servers from VMware ESX to Proxmox.

    Download

  • Menacing Malware: Exposing Linux Threats Lurking in Your Multi-Cloud

    90% of cloud runs on Linux, but current countermeasures are focused on addressing Windows-based threats, leaving multi-cloud deployments vulnerable to attacks. So, is it any wonder that Linux-based malware is propagating in multi-cloud environments under the radar?

    Download

  • A Holistic Approach To Security: Endpoint Protection

    Comprehensive endpoint protection safeguards Apple, Windows, and Android devices against new and evolving threats. Learn how Jamf's defense-in-depth strategy and purpose-built solutions can secure your modern device fleet and mitigate security risks. Read the blog to discover more.

    Download

  • Prolonging Windows 10 device lifespan - a sustainable choice

    As Windows 10 reaches end of life, 200M devices face obsolescence. Leverage the Linux-based eLux OS to revitalize these devices and integrate them into your VDI or DaaS backend, offering enhanced scalability, security, and user experience. Learn more in the white paper.

    Download

  • Automate your Dell Infrastructure with Red Hat Ansible

    Join this Dell and Red Hat webinar where you will see how Ansible Automation Platform works seamlessly with Windows and Linux all while integrating with Dell Technologies hardware platforms.

    Download

  • Ubuntu on WSL | An FAQ for Data Scientists and Developers

    Leverage the power of an Ubuntu development environment on Windows using Windows Subsystem for Linux (WSL). Ubuntu on WSL is particularly empowering for AI and ML data scientists. It combines the convenience of native Windows IDE and driver integration with the NVIDIA GPU accelerated AI/ML development environment Ubuntu is famous for. IT managers also benefit from a consistent fleet management experience whilst enabling their data scientists to continue using their preferred Ubuntu environment. Join us on a tour of Ubuntu on WSL that will cover: - The underlying technology behind WSL - How it differs from a traditional VM environment - Setting up Ubuntu on WSL for the first time - Using WSLg to run graphical Linux applications

    Download

  • Ubuntu on WSL | An FAQ for Data Scientists and Developers

    Leverage the power of an Ubuntu development environment on Windows using Windows Subsystem for Linux (WSL). Ubuntu on WSL is particularly empowering for AI and ML data scientists. It combines the convenience of native Windows IDE and driver integration with the NVIDIA GPU accelerated AI/ML development environment Ubuntu is famous for. IT managers also benefit from a consistent fleet management experience whilst enabling their data scientists to continue using their preferred Ubuntu environment. Join us on a tour of Ubuntu on WSL that will cover: - The underlying technology behind WSL - How it differs from a traditional VM environment - Setting up Ubuntu on WSL for the first time - Using WSLg to run graphical Linux applications

    Download

  • A Computer Weekly Buyer's Guide to Application Development and DevOps

    Harnessing the right developer tools offers new advantages for businesses. In this 14-page buyer's guide, Computer Weekly looks at the benefits and limitations of the DevOps approach, what Microsoft is doing with its developer platform and the rise of the holistic application.

    Download

  • Zarządzanie politykami konfiguracji w środowiskach Linux, Windows i Mac

    Zapraszamy na webinar w jęz. polskim na temat centralnego, zunifikowanego zarządzania politykami konfiguracji w środowiskach Linux, Windows, Mac zarówno on-premise jak i w chmurze. Orkiestracja polityk, ich konsolidacja i normalizacja to wymóg bezpieczeństwa w przypadku środowisk heterogenicznych obsługiwanych lokalnie oraz w chmurze. Na spotkaniu powiemy, jak zapewnić zautomatyzowane, scentralizowane i spójne zarządzanie i egzekwowanie polityk dla szerokiej gamy komputerów z systemami Linux, Windows i Mac. Na naszym webinarze zobaczysz, jak za pomocą Micro Focus Universal Policy Administrator wykorzystać posiadaną już infrastrukturę z Microsoft Active Directory oraz Group Policy dla Windows i rozszerzyć ją na systemy Linux do uwierzytelniania użytkowników w Microsoft Active Directory, a także jak zabezpieczać konfigurację serwerów Linux poprzez łatwe zdefiniowane zasad za pomocą graficznych narzędzi. Micro Focus Universal Policy Administrator służy do tworzenia i kontrolowania z jednej konsoli polityk (Group Policy) w przypadku korzystania z wielu środowisk jak Active Directory, Azure, Linux czy Mac. Umożliwia wersjonowanie, śledzenie zmian i wprowadzeniu procesów akceptacji. W pokazach na żywo będą wykorzystywane systemy Linux firmy SUSE, która jest partnerem wydarzenia.

    Download

  • Royal Holloway: Testing antivirus efficacy in Linux

    Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.

    Download

  • EDUNation 2023 Forsyth Tech (2 of 3)

    Benefits of flexible teaching methods when teaching a diverse student body We all know the importance of meeting our students where they are when they enter our classroom, but how exactly do you do that? How do you operationalize teaching best practices? Is there a better way? I'll be suggesting that there is not. But learning what my students enjoy and how they think helps me adapt to techniques I use to better engage and motivate them to learn the material. In many ways, it is a quintessentially Linux approach. Build tools that do one thing really well and combine them in novel ways to reach the desired goal. I'll be sharing what I do with a few stories of what it looks like in my classroom.

    Download

  • EDUNation 2023 Forsyth Tech (2 of 3)

    "Benefits of flexible teaching methods when teaching a diverse student body We all know the importance of meeting our students where they are when they enter our classroom, but how exactly do you do that? How do you operationalize teaching best practices? Is there a better way? I'll be suggesting that there is not. But learning what my students enjoy and how they think helps me adapt to techniques I use to better engage and motivate them to learn the material. In many ways, it is a quintessentially Linux approach. Build tools that do one thing really well and combine them in novel ways to reach the desired goal. I'll be sharing what I do with a few stories of what it looks like in my classroom."

    Download

  • Installing and Configuring Carbonite Migrate on Ubuntu and Exoscale

    Carbonite Migrate can be used to migrate live physical, virtual or cloud servers to the same or different platforms. In order to migrate live open files, a small agent needs to be installed and configured on the source (current production server) and the target (new destination server). This video shows how to install and configure the Carbonite replication agent on Ubuntu Linux. The same steps can be used on any physical or ubuntu server, however the process to install on Red Hat, Oracle Enterprise Linux, SUSE, CentOS and Rocky would be very similar. We'll show how easy it is to provision a suitable target server in Exoscale Cloud, as we will be creating a follow on video showing how to migrate Linux servers from VMware ESX to Exoscale. The process for Windows servers would be very similar, and I have already posted a video showing Full Server migration of a Windows 2019 server from Microsoft Azure to Exoscale Cloud.

    Download

  • Windows 10: How the client operating system is evolving

    A discussion about strategies for Windows 10 really boils down to the organisation's desktop IT strategy. Windows PCs account for the bulk of the personal computing market and the Windows client remains the dominant target platform for developers of client-side applications. In this e-guide, we look at the evolution of desktop IT.

    Download

  • Using Behavior to Detect Intrusions Involving Edge Devices

    Any Internet-facing device, appliance, server, or VM is fair game as an initial attack vector to a cyber attacker. They are readily accessible remotely and offer security teams little visibility into whether they are secure, under attack, or compromised. Additionally, those devices running on a Linux kernel can prove to be valuable assets to an attacker: A Linux device can be made a stealthy persistent foothold from which to pivot and begin attacks on your Windows infrastructure, it can be used to assist in exfiltration, and just because it’s been patched doesn’t mean it hasn’t already been exploited and continues to provide access via web shell. All this while your security team may be unaware these devices are still compromised. Attackers choosing to pivot and focus on gaining access to your Windows environment, historically expose themselves to detection through indicators of compromise (IoC) on the network, as well as within the Windows OS, applications, and Active Directory. But with many attackers working to hide their tracks, how can organizations detect attacks and trace them back to edge devices?

    Download

  • Using Behavior to Detect Intrusions Involving Edge Devices

    Any Internet-facing device, appliance, server, or VM is fair game as an initial attack vector to a cyber attacker. They are readily accessible remotely and offer security teams little visibility into whether they are secure, under attack, or compromised. Additionally, those devices running on a Linux kernel can prove to be valuable assets to an attacker: A Linux device can be made a stealthy persistent foothold from which to pivot and begin attacks on your Windows infrastructure, it can be used to assist in exfiltration, and just because it’s been patched doesn’t mean it hasn’t already been exploited and continues to provide access via web shell. All this while your security team may be unaware these devices are still compromised. Attackers choosing to pivot and focus on gaining access to your Windows environment, historically expose themselves to detection through indicators of compromise (IoC) on the network, as well as within the Windows OS, applications, and Active Directory. But with many attackers working to hide their tracks, how can organizations detect attacks and trace them back to edge devices?

    Download

  • Интеграция MFA в облачные наземные и локальные сервисы

    Обзор методов аутентификации пользователей Web Authentication Method Windows Hello Примеры интеграции : - с облачными сервисами - наземными сервисами и приложениями - локальные компьютера Интеграция с сервисами с использованием OAuth 2.0 RADIUS Server SAML 2.0 REST API Реализация многофакторной аутентификации в VPN Защита рабочей станции Windows с помощью многофакторной аутентификации - Desktop OTP Tool - Device Service - Linux PAM Client - Mac OS X Client - Windows Client - Windows Authentication Agent - Virtual Desktop Authentication Интеграция с PAM системами.

    Download

  • How to Secure Your Software Supply Chain on Windows Server

    Enterprises depend on a secure software development pipeline—from the first stage of development to production. Secure cloud native application delivery demands a secure, enterprise-ready container runtime, but building and running Windows containers on Windows Server poses unique challenges. How can teams using Windows Server ensure that their software supply chain is built on a steady foundation? In this webinar, we’ll explore the challenges and how to overcome them using Mirantis Container Runtime, the only enterprise container engine that runs natively on Windows and Linux, delivering FIPS 140-2 validated security. We’ll discuss: - The challenges of securing the software supply chain on Windows Server - The role of the container runtime in a secure software supply chain - Tools to help secure container workflows on Windows Server - How Mirantis Container Runtime provides a secure runtime for Kubernetes nodes running on Windows Server

    Download

  • VMware ESX to Exoscale Windows Migration Demo

    This video will show you how easy it is to migrate live running Windows server from VMware ESX to Exoscale Cloud. We're using Carbonite Migrate to make a real time copy of a live Windows 2019 virtual machine currently running on a VMware ESX and replicating it to a virtual machine we have previously provisioned in Exoscale Cloud. Downtime is kept to the absolute minimum. Installation, configuration and the mirroring (synchronisation) of the server, it's configuration, applications and data, all take place while the source ESX virtual machine remains live, and it's only for the last couple of minutes at the end, when the ESX source server is shutdown and the new Exoscale server is started up, which typically takes 10 to 15 minutes. The same type of migration could be performed for other Windows versions (2003, 2008, 2008R2, 2012, 2012R2, 2016, 2019, 2022) and there is a very similar workflow available for Linux Environments (Red Hat, CentOS, SUSE, Oracle Enterprise Linux, Rocky). These servers could be physical, virtual or cloud, and they could be running pretty much any application.

    Download

  • Migrating Windows VMware ESX to IONOS Cloud

    This video will show you how easy it is to migrate live running Windows server from VMware ESX to IONOS Cloud. We're using Carbonite Migrate to make a real time copy of a live Windows 2019 virtual machine currently running on a VMware ESX and replicating it to a virtual machine we have previously provisioned in IONOS Cloud. Downtime is kept to the absolute minimum. Installation, configuration and the mirroring (synchronisation) of the server, it's configuration, applications and data, all take place while the source ESX virtual machine remains live, and it's only for the last couple of minutes at the end, when the ESX source server is shutdown and the new IONOS server is started up, which typically takes 10 to 15 minutes. The same type of migration could be performed for other Windows versions (2003, 2008, 2008R2, 2012, 2012R2, 2016, 2019, 2022) and there is a very similar workflow available for Linux Environments (Red Hat, CentOS, SUSE, Oracle Enterprise Linux, Rocky). These servers could be physical, virtual or cloud, and they could be running pretty much any application.

    Download

  • Discover the latest cyber threat trends

    What does your cybersecurity posture look like in 2023? Tune into this webinar from Towerwall Founder and CEO Michelle Drolet as she discusses the latest cyberthreat trends and provides the necessary insights to defend against evolving attacks. Based on the research and real-world experiences, we will discuss: • The lasting cyber impact of the war in Ukraine. • The maturity of the “as-a-service” industry and how it has put advanced threat tactics into the hands of nearly any criminal. • How ransomware operators have evolved their activities and mechanisms, both to evade detection and to incorporate novel techniques. • A deep dive into the abuse of legitimate security tools by criminals to execute attacks. • An analysis of the threats facing Linux, Mac, and mobile systems.

    Download

  • QTS - Patch Management Made Easy With Qualys

    Join Qualys for the latest in our Qualys Technical Series, on Thursday 9th March, for a deep dive into Qualys Patch Management. Qualys Patch Management enables organizations to centrally manage and automate the patching process across their entire IT infrastructure, including Windows, Linux, and Mac operating systems, mobile devices, and 3rd-party applications from various vendors. With a unified dashboard, multiple teams can collaborate on prioritising and deploying the right patches to reduce risk. If you're seeking a solution to streamline patch management across your organization, join us for an in-depth demonstration of how Qualys Patch Management can help. During this webinar, you will discover how to: Prioritise your critical patches using Qualys TruRisk Automate routine and risk-based remediation for Windows, Linux and Mac assets Install / Uninstall software and run scripts as part of your remediation jobs, as some remediation require more than just patching

    Download

  • Tips, Tools & Techniques Every CISSP Needs in Their Security Toolkit

    Every cybersecurity professional needs to keep a toolkit of programs, apps and resources for troubleshooting and securing systems. In this session (updated from 2017), you will see and learn about common tools used in cybersecurity assessments, investigations and administration. The presenter will demonstrate ways to use these tools in both home and work. Tools to be demonstrated include virtual environments, Kali Linux, OWASP ZAP, Bash scripting, Windows PowerShell, Windows SysInternals Suite, Wireshark, nmap and many more. This was one of the most popular sessions of the 2017 Security Congress. In the discussion of these tools, you will understand techniques to optimize their use based on the need and circumstance.

    Download

  • Carbonite® Availability Demo video

    Carbonite® Availability software enables IT organizations to maintain the highest availability of their Windows and Linux servers by preventing downtime and data loss. With support for physical, virtual or cloud source systems or target environments, the Carbonite Availability solution is a comprehensive high availability option for organizations with mixed IT environments. Watch our short (7 mins) video to learn more.

    Download

  • Databridge Customer Briefing

    Micro Focus Databridge enables organizations to leverage and integrate the value of their DMSII data with other information systems for business analytics and operational purposes. Databridge is an out of-the-box extract, transform, load (ETL) solution that securely mirrors DMSII and non-DMSII data with secondary working databases while keeping data updated in real time. Databridge fits seamlessly into your existing infrastructure with support for Oracle, Microsoft SQL Server, and flat file target clients, running on a range of operating environments including Windows Server, UNIX, AIX, SUSE Linux, and Red Hat Linux.

    Download

  • Navigating Investing during Novel Coronavirus

    Navigating Investing during Novel Coronavirus

    Download

  • Citrix for Specialized Workers

    Contact center agents, retail employees, and other specialized workers - they’re all essential to your business. But when change and expansion can come in an instant, you need to train new workers just as fast - without sacrificing cybersecurity. Citrix and Chrome OS provide secure, easy access to specialized applications, including full-feature Windows and Linux apps, from any Chrome OS device.

    Download

  • Benefits of migrating from CentOSLinux to Red Hat Enterprise Linux

    CentOs Linux will be discontinued between 2021 and 2024, meaning migration to a new operating system is inevitable if you want to receive fresh updates, patches and features. Download this short brief to explore the benefits of migrating to Red Hat Enterprise Linux.

    Download

  • Dell & Red Hat Present Microsoft SQL on Red Hat Enterprise Linux

    Unlocking the full potential of data is critical to success of any organization, and Microsoft SQL Server running on top of Red Hat Enterprise Linux helps your organization do just that. Red Hat Enterprise Linux is core to the foundation of building a unified data platform on Microsoft SQL Server. Join Dell and Red Hat for this informative webinar to learn how Dell Technologies combined with Red Hat and Microsoft deliver a fully supported stack on a platform of choice, giving your organization intelligence over all of the data. Topics include: o Considerations for running SQL Server 2019 on Red Hat Enterprise Linux o Considerations for running SQL Server 2019 BDC on Red Hat OpenShift Platform o Performance gains when running SQL Server 2019 on Red Hat Enterprise Linux o Considerations for moving from existing versions of SQL Server running on the Windows platform to SQL Server 2019 running on Red Hat Enterprise Linux Presented by: Trey Mears, Red Hat Alliance Manager Rob Sonders, Principal Engineer, SQL Expert Stephen McMaster, Technology Strategist, Microsoft

    Download

  • CentOS Linux vs. Red Hat Linux

    This white paper details the benefits of migrating from CentOS Linux to Red Hat Enterprise Linux. According to IDC, compared to unpaid alternatives like CentOS Linux, Red Hat Enterprise Linux enables:32% more efficient IT infrastructure teams72% less unplanned downtime Learn more in this white paper.

    Download

  • How to optimize your mixed IT strategy

    As enterprises embrace mixed IT environments, maintaining flexibility and control is crucial. Learn how SUSE can simplify management, minimize risks, and liberate your Linux ecosystem in this white paper.

    Download

  • Red Hat Ansible with Dell Technologies

    Times like these have required many organizations to scale up capacity and make changes to accommodate remote workers and other surges in demand that are almost unprecedented. Join us for a webinar where we will show you how Ansible Automation Platform works seamlessly with Windows and Linux all while integrating with your Dell Technologies hardware platforms. You’ll also learn about how to use Ansible to manage, integrate, and support your growing environment – all while using tools you are familiar with to keep up with capacity demands of the shifting world.

    Download

  • Explore the benefits of Linux for medical device development

    Open source Linux is cost-effective and customizable for medical device development but presents security and compliance issues. Wind River Linux offers an advanced embedded platform with robust security, compliance support, and lifecycle management, aiding innovation and risk reduction in medical devices. Learn more in the full overview.

    Download

  • PPMO™: Disrupting Biomarker & Target Discovery using AI computational modeling

    Learn more about these topics by registering for this webinar: • PPMO™: a novel Pharmaco-Pheno-Multiomic platform which combines AI-powered discovery tools with rapid and efficient experimental validation workflows • Learn how to significantly accelerate and confidently identify a high value-novel pipeline of targets and biomarkers through AI-powered modeling • Learn how Champions leverages PPMO™ to support biomarker and target discovery efforts

    Download

  • Migrate to an OS that supports your business now and in the future

    Want to ease your migration from CentOS Linux 7 to a supported platform? Red Hat Enterprise Linux for Third Party Linux Migration with Extended Life Cycle Support on AWS offers a low-cost, high-value solution to maintain operational continuity. Read on now to learn more about this offering.

    Download

  • InfoConnect Desktop Customer Briefing

    Micro Focus is pleased to announce the general availability of InfoConnect Desktop 16.2 products, the latest releases of the leading enterprise-grade solutions for desktop access to Unisys, IBM, UNIX, Linux, OpenVMS, HP 3000, and X Window (X11) host applications and data. Attend this webinar to learn about this latest release, including updates to platforms, central management, security, automation, productivity, and end user experience.

    Download

  • Managing Third Party Vendor Access? See What’s New with CyberArk Alero

    In today’s landscape with vendors requiring access to a variety of internal systems, including cloud applications, Windows and Linux systems, OT environments, and more, having a robust solution to secure access without straining resources has never been more important. Chris Maroun, Global Director of Solutions Engineering will walk through an in-depth service demo and explain how organizations can leverage Alero to more securely and more efficiently manage remote vendors who require access to critical internal systems.

    Download

  • The evolution of smart buildings with fault managed power

    Tune in to this deep-diving webinar as power experts discuss the effects in the wake of fault managed power system development, and the corresponding evolution of today’s smart buildings.

    Download

  • The business value of Red Hat Enterprise Linux

    Choose an OS & cloud provider to back your business. Red Hat Enterprise Linux on Azure offers a smart, robust hybrid cloud base. Standardize on one OS for easier management, enhanced security & support. Learn how switching your OS/cloud provider can yield 32% more efficient IT & 24% cost savings in this white paper.

    Download

  • Top 6 factors to weigh when choosing your next enterprise OS

    With CentOS Linux support ending in 2024, organizations must choose a new OS, considering security, compliance, applications, costs, and support. Red Hat Enterprise Linux offers a smart foundation and skill continuity. For an easy migration, check out the white paper.

    Download

  • Converting CentOS Linux to Red Hat Enterprise Linux

    Learn how to convert your CentOS Linux systems to Red Hat Enterprise Linux (RHEL) with the Convert2RHEL tool. This overview covers conversion methods, the benefits of RHEL, and how Red Hat Consulting can help with complex migrations. Read the full product overview to get started.

    Download

  • Developing the Intelligent Core with Windows Server 2019

    65% of European CEOs are under significant pressure to deliver on their digital transformation (DX) strategies. Creating a digital platform with an intelligent core is key to success. Learn more about digital platforms inside this resource.

    Download

  • The benefits of a consistent Linux platform

    As cloud adoption accelerates, managing the complexity of cloud infrastructure is a significant challenge. Learn how a consistent Linux platform like Red Hat Enterprise Linux can help you handle this complexity and realize the full benefits of cloud computing. Read the e-book now.

    Download

  • 4 considerations for standardizing on a Linux platform

    To manage increasingly complex IT challenges and stay competitive, it is critical organizations choose a Linux platform that can support innovation, streamline operations and drive long-term business value. Open this white paper to explore 4 considerations that will help determine the right Linux operating system for your company.

    Download

  • Public sector 2024: EOLs, FedRamp, and more

    2024 is a time of big changes for the Enterprise Linux world. In fact, it may prove to be a pivotal moment for government agencies and institutions. Tune in to this deep-diving webinar to learn the essential Strategic considerations for the public sector due to CentOS Linux 7 end of life.

    Download

  • Public Sector Leaders Discuss IT Infrastructure

    In this e-book, join PeerSpot members who work in government and the public sector as they discuss why they selected Red Hat Enterprise Linux (RHEL) as their Linux distribution of choice.

    Download