TTP/Americas Webinars
7 June - 15 July 2022


   Presentations: slides & videos     File archive on Micro Focus

Agenda
Technical Insights Series Prelude
Tuesday 7 June
Introduction to ZENworks Reporting Server
by Ron van Herk
Abstract:
     ZENworks Reporting Server is one of the forgotten secrets of the ZENworks family, it ships with any of the ZENworks products but unfortunately people do not take the time to learn how to use this magical reporting engine. In this session Ron van Herk will demonstrate how easy it is to create custom reports using ZENworks data. But the session will also show how you can get other information from your managed devices, get a report with the Bitlocker status or get a report with the health of the laptop batteries.
slides
video
Introduction to Change Guardian
by Anmol Rastogi
Abstract:
     Early ransomware detection- Use of file integrity and system configuration drift monitoring. Compliance drift - Identify the baseline and watch for changes. Proactively assess the AD environment for any potential misuse by privileged users.
slides
video
Introduction to eDirectory
by Johnnie Odom
Abstract:
     The identities and relationships in your organization are one of its core advantages. Take full advantage of them by using a robust directory service like eDirectory. In this session we will go over the basics of how to use eDirectory, how to think about eDirectory, and how to learn more about it. There will be extensive demonstrations. We will focus on the use of an already-running system so that Junior sysadmins can make use of what already exists.
slides
video
Data Access Governance
by Doug Ouzts
Abstract:
     Products: Data Access Governance (File Reporter, File Dynamics), Identity Manager, and Identity Governance Abstract: Identity Management and Identity Governance are expanding from their roots of provisioning and application access management. This evolution now includes Data Access Governance to control access entitlements to high-value unstructured data as well. Data Access Governance consists of both File Dynamics and File Reporter and the targeted use of policy and reporting respectively; specifically focused on the access controls of prioritized data locations. Gain insight into who has access, remediate to make corrections, put automation policy in place to ensure continual compliance, and perform periodic access reviews in Identity Governance right alongside applications.
slides
video
How to protect local accounts without any communication to the server
by Václav Šamša, TDP
Abstract:
     Local account protection by regular password changes is widely accepted as a must. But any solution which needs to communicate with the server to accomplish the task is limited. A good solution needs to be platform-independent and connectivity independent but still manageable in an enterprise style. This session is an introductory how-to focused on local accounts.
slides
video
Wednesday 8 June
Introduction to Data Protector
by Marc Fisseler
Abstract:
     Get to know Micro Focus backup solution Data Protector with all its features and latest innovations. Data Protector provides backup and disaster recovery for diverse, dynamic and distributed organizations. Our Micro Focus solution delivers secure, compliant backups of all enterprise data from a single point of management. Instant enterprise-scale data recovery and security for modern hybrid environments. Ensuring businesses quickly return to normal, minimize impact and revenue loss, and avoid reputational damage.
slides
video
How to ensure to always know the status of accounts, objects and/or users in eDir
by Roger Zimmermann, Konstantin Andriyuk
Abstract:
     Learn how to initiate actions based on any kind of events happening to eDir objects. With the Audit Proxy of SKyPRO's Audit & Compliance Dashboard you can automatically initiate alerts based on events that you define.
slides
video
eDirectory as a Core Service
by Johnnie Odom, School District of Escambia County
Abstract:
     Cloud services are too cool for X.500 and even workstations don't require a direct login to a directory service. Plus, those Cloud services have their own directories. Does that mean on-Prem solutions like eDirectory are dead? No, they are just controlling things from the shadows. Find out how eDirectory remains a core service when paired with the two Managers (Identity and Access) and a rogue's gallery of internal and third-party apps.
slides
video
How to secure large files in any storage cloud/onprem - store/transfer/share
by Václav Šamša, TDP
Abstract:
     Sharing files between users is so easy and so insecure. Large means - no encrypted email. The file needs to be encrypted and shared. The tricky part is not encryption - AES is built-in many standard tools, including office tools. The tricky part is how to share the key (password) between users. This session is about files, but in fact, it is about keys and how users can share them securely.
slides
video
Micro Focus Vibe - Irreplaceable
by Johnnie Odom, School District of Escambia County
Abstract:
     In a world where every application adds collaboration features, why can't I find as comprehensive a solution as Vibe? And why are Google Docs and Markdown afraid of true structure? In this session we will demonstrate what Vibe does out-of-the-box and why it does it better than anything else. The focus will be on scenarios where collaborative knowledge needs to be captured and maintained in many different forms.
slides
video
Useful Tools for IDM Admins
by Alex Belousov, IDM Consultant
Abstract:
     A review of the different tools that can help IDM developers and admins.
slides
video
Tuesday 14 June
Open Enterprise Server in the Enterprise Environments
by Mike Hunsche
Abstract:
     Open Enterprise Server (OES) delivers the reliable and flexible file, print, and networking services to your users across multiple platforms, including mobile. In this session you willtake a sneak peek at some useful solution from Enterprise Environments as well as basic functionalities out of OES. Commonly used features are automated Installation, Configuration and Patch mANagement, Distributed Files Services and Cluster Services.
slides
video
Desktop Containers, the tool to support hybrid learning
by Ron van Herk
Abstract:
     Students might be back at school, the world however has changed. More than ever students will be working in a more hybrid world where they combine education centrally with working remote. You might know the Desktop Management capabilities to create containerized applications but Desktop Containers is so much more. It allows Education environments to provide a hybrid working environment integrated with your Learning Management system where you can offer applications to students independent from where they work, not only to students with a Windows laptop but also to students running a Mac or Chromebook. In this session we will show you how to provide such a hybrid workspace for your students.
slides
video
Using SUSE Harvester for your home lab
by Simon Flood
Abstract:
     With Harvester you have the ability to host both virtual machines and containers on the same hardware which makes it ideal for running your home lab. Based on my own experiences both testing and running Harvester, in this session we will look at using Harvester for your home lab, identify some things to think about, highlight possible issues, and provide some tips and tricks for getting the most out of using Harvester.
slides
video
An Introduction to ZENworks Service Desk – Extending the typical Help Desk System
by Paul Pedron
Abstract:
     ZENworks Service Desk is a complete service management solution that allows you to easily monitor and solve services and issues so that there is minimal disruption to your organization, which allows users to focus on the core business. ZENworks Service Desk extends beyond the online help desk support system to meet all your service requirements and promotes self-service for your customers, administrators, supervisors, technicians, clerks maintenance and facility staff.
slides
video
Lifecycle management of Unstructured Data
by David Condrey
Abstract:
     Take advantage of policy-driven automation in File Dynamics to control the provisioning, disposition and management of your data to ensure that organizational goals are achieved and compliance and governance requirements are met. Policy can be applied through Identity and Role constructs, optionally in conjunction with Identity Management, or directly against High-Value-Target data locations. Construct and refine policies by using File Reporter to gain views on your data from a variety of perspectives including where it is located, who can access it, how it’s growing, and how it is aging. Engage Line-of-Business Data Owners outside of IT to make decisions and take action on their data.
slides
video
Doing Data Science As Work Hobby
by Johnnie Odom
Abstract:
     Do you have a bunch of data flying around your infrastructure just to get the systems populated every day? Stop throwing it away and put it to work. We demonstrate some very basic techniques you can use to understand your processes and institution. Topics covered include simple regression, time series, and cluster plots.
slides
video
Wednesday 15 June
Update your testing and development environment in no time
by Antoine Schellhorn, Konstantin Andriyuk
Abstract:
     In this session you see how easy cloning entire directories can be. Wether you want to update your test environment or if you need valuable data for your development environment, copying the right amount of data can be done over and over again with just a few clicks using Modules of SKyPRO's Toolbox.
slides video
Introduction to Filr, Enterprise File Synchronisation and Sharing
by Robin Redgrave
Abstract:
     This session will cover how you can rapidly implement recure remote access to, and sharing of, your existing file storage. We will explain the benefits of giving users the productivity gains and time savings that mobile file access and collaborative sharing offer, while utilising the existing access controls you have in place to enable you to securely access your existing files remotely and share them with both internal and external colleagues. We will demonstrate remote access to files from your mobile or desktop, MFA access, ransomware protection, DLP options, secure online editing and much more.
slides
video
Open Enterprise Server as a Linux Add-on
by Johnnie Odom, School District of Escambia County
Abstract:
     If you run a Linux distribution that requires support, running OES will give you supported features that other distros cannot match. If you don't care about support, then why aren't you running Tumbleweed already? In this session we address the former, including users, file access, administrative tooling, and DNS.
slides
video
Advanced Authentication Limited - The Most Important Product You Didn't Order
by Johnnie Odom, School District of Escambia County
Abstract:
     Advanced Authentication Limited (AAL) has been added as an entitlement to several Micro Focus products over the last few years. This session will provide an overview and demonstration of AAL and where it fits in a world where multi-factor authentication is now required.
slides
video
Content Manager 10.1 – What’s New?
by Don Prekop
Abstract:
     Please join us as we overview and demonstrate the new features of Content Manager 10.1 including:
• The new integration to MS Teams with Content Manager as part of our “Privacy Companion for M365” campaign
• New capabilities in the Content Manager Web Client
• Expanded Manage in Place capabilities to extend Content Manager lifecycle management capabilities.
slides
video
Tuesday 21 June
Introduction to ZENworks
by Johan dela Ferte
Abstract:
     This session is targeting people who have never seen or touched ZENworks but also people who perhaps recently started to gain experience with ZENworks, for example new joiners. We will discuss the ZENworks portfolio and their components providing a broad overview of what ZENworks can do.
slides
video
Introduction to Rumba
by Shelli Peshkur
Abstract:
     Rumba+ provides connectivity solutions to mainframes, mid-range, UNIX, Linux, and HP servers. Rumba+ also provides secure file transfer and printing services from various host systems.
slides
video
An Introduction to the Apache Web Server
by Joe Doupnik
Abstract:
     The most popular Linux web server Apache is full of useful features, and its configuration is rather intimidating at first contact. Here we look at it from a short distance, learning enough to activate it intelligently, note some interesting features, and how to learn more later. The intended audience is those who are not yet familiar with Apache.
slides
video
Windows 11 deployment with ENGL Imaging Toolkit
by Heath Upton, Steve Thompson, ENGL
Abstract:
     This session includes demos using Imaging Toolkit and ZENworks Configuration Management to deploy Windows 11. Learn about the new features in Imaging Toolkit 12 including Image Service that simplifies base image creation and Monitor Service that provides live deployment monitoring.
slides
video
Containers Update and Lab With Podman
by Johnnie Odom
Abstract:
     Last year we gave an overview of the container space. This year we will talk about the great leaps podman has made and demonstrate real practices for building containers at small-scale.
slides
video
Wednesday 22 June
An Introduction to Fortify SCA
by Frans van Buul, Micro Focus Product Manager
Abstract:
     Fortify is Micro Focus' portfolio for application security testing and is widely recognized as one of the leaders in this space (alongside Checkmarx, Veracode, Synopsys). One of several application security functionalities delivered by Fortify is static analysis,often referred to as SAST (static application security testing). SAST executes a range of algorithms that try to find security problems by analyzing an application's source code, without executing it in any way (that's the "static" aspect of it). In the modern application development landscape, where large application portfolios get developed and deployed rapidly (DevOps, Agile), this type of automated analysis is essential as manual security review procedures wouldn't sufficiently scale. In this session, you'll get an introduction to Fortify SAST. How does it work, what algorithms are executed, what are its strengths and weaknesses, and how does it relate to other application security testing techniques (such as DAST, IAST, and SCA)?
slides
video
An Introduction to iPrint Advanced
by Robin Redgrave
Abstract:
     This session will cover the functionality that is available as an entitlement to Open Enterprise Server or as a standalone product. We will demonstrate driverless printing, self service driver installation, walk up print job release, mobile printing and much more.
slides
video
NSS and File Services Foundation
by Johnnie Odom, School District of Escambia County
Abstract:
     In a world where files are synchronized over HTTP, do the features and efficiency of the file system really matter? We answer this question by re-familiarizing ourselves with NSS.
slides
video
Single authentication to virtualized Windows desktops on shared devices with Citrix and KeyShield SSO
by Václav Šamša, TDP
Abstract:
     Citrix implements a so-called virtualized smart card to avoid double (triple) authentication. Once the user authenticates to the Citrix server, the Citrix environment delivers the newly issued user's certificate to AD. Then the user authenticates to virtualized windows workstation against MS Kerberos without any further manual interaction. It's a brilliant solution itself, but KeyShield integration for Ubuntu-powered cheap terminals gets it to yet another level. This session shows you what is possible also in a school, library or hospital environment.
slides
video
Easy OAuth and SAML for Internal Applications with Access Manager and Shibboleth
by Johnnie Odom
Abstract:
     Tired of using LDAP for your internal applications? Do you have Access Manager? We review approaches to incorporating OAuth into your app and throw in Shibbolethand SAML and options as well. It's easy and more secure.
slides
video
GroupWise 18.4 new release features presentation and demo.
by Ed Hanley
Abstract:
     Ed Hanley, Solutions Consultant, will provide a demonstration of the new features in GroupWise 18.4, which was released in March. Additionally, an overview of the upgrade process will be covered. At the end this session there will be an opportunity to ask general GroupWise and Enterprise Messaging questions.
slides
video
Tuesday 28 June
Introduction to Retain Unified Archiving
by Vanessa Lisseck
Abstract:
     Micro Focus Retain provides unified archiving of all business communication including email, social media, and mobile communication data for case assessment, search, and eDiscovery. It can be deployed on-premises or in the cloud.
slides
video
Introduction to Directory Resource Administrator
by Anmol Rastogi
Abstract:
     Streamline AD administrative task with automation. Secure AD environment by reducing the number of privilege users. Track the change history report for delegated admins for compliance reporting as proof for auditor. Manage trusted and untrusted domain through central location - Advantage over native tools.
slides
video
An Introduction to IP
by Joe Doupnik
Abstract:
     We take a tourist's view of the TCP/IP protocol landscape, noting many important items in the packet construction of IP, TCP and UDP, and why they are present. The tone is kept light, informative, and practical. The discussion provides a brief introduction to the workings of today's most heavily used communications protocol suite.
slides
video
Introduction to Web to Host
by Shelli Peshkur
Abstract:
     Web-to-Host is a server-based Web application that publishes your existing legacy applications in intranet, extranet, and Internet environments. It includes host display, printer, and file transfer features that enable end users to work productively with host-based information in a familiar Windows or web browser environment. OnWeb Web-to-Host provides access to a broad range of host types, including IBM® mainframe, IBM AS/ 400®, DIGITAL® VAX, UNIX®, and HP® systems.
slides
video
Autopilot deployment with ENGL Imaging Toolkit
by Heath Upton, Steve Thompson, ENG
Abstract:
     This session includes demos using Imaging Toolkit and ZENworks Configuration Management to deploy Windows with Autopilot. Learn about the new features in Imaging Toolkit 12 including Image Servicethat simplifies base image creation and Monitor Service that provides live deployment monitoring.
slides
video
Bringing GMail Into Automated Processes
by Johnnie Odom
Abstract:
     GMail is not real e-mail, but that's okay because real e-mail is unreliable in automated processes. Using GMail with automated processes is also terrible, but in a different way. In this session we will show how you can send messages through GMail programmatically and also how to grab messages from specific senders with specific subjects for non-GMail workflows.

Wednesday 29 June
IDM PHP based Slim Framework
by Ragnar Storstrom
Abstract:
     While you can do many things in NetIQ Identity Manager using drivers and custom forms, you can expand the functionality by creating REST APIs. There are many ways to do this and one way is to use the PHP based Slim Framework. In this session, I will demonstrate how to install the components you need, how to write your first REST endpoint, how to connect to an LDAP directory service, how to connect to a database and how to implement logging.
slides
video
How to securely access your LDAP directories (AD, OpenLDAP, eDir) via REST
by Andreas Fuhrmann, Christian Karch
Abstract:
     LDAP directories are still very common and often used to store identity information. The amount of applications, that want to access these information from inside or outside are increasing more and more. LDAPS or definitely LDAP is not the protocoll you want to use for external application to access your internal identity data. At the moment REST is the service, web application want to use to handle data. But how can you access data in a LDAP directory securely via REST? Seras opens your LDAP directory in a secure way to access the data via https using secure tokens with strictly limited services, offering only access to data you're allowed to see and operations you're allowed to execute.
slides
video
Micro Focus Team Works - Where it Fits and Where it Might Fit
by Johnnie Odom, School District of Escambia County
Abstract:
     When Slack came out, every tech company wanted to fill a Slack-shaped hole in its lineup. Micro Focus introduced TeamWorks, a product which also exists. In this session we will start by demonstrating the Slack-like features of TeamWorks and its architectural similarities to Vibe and Filr. Unlike most discussions, we won't stop there but instead will journey through the tunnel to emerge in a world where TeamWorks can be incorporated in the background to add group collaboration to a larger system.

video
X-raying Files
by Aaron Burgemeister
Abstract:
     Building your toolbox by using grep for fun and profit - Whether it's looking for issues in log files, finding settings in configuration files, or pulling data from any other stream, grep is one of the most fundamental tool for your digital toolbox. This session will touch on the basics of the tool, plus also show the less obvious features that help it solve questions well beyond, "Are these characters in this file." including the really important things in life: upping your social media game with grep to be awesome at Wordle.
slides
Introduction to ZCM Endpoint Antimalware/Patch
by Darrin VandenBos
Abstract:
     Detecting and eliminating software vulnerabilities and malware threats on endpoint devices is key to reducing an organization’s exposure to damaging and costly attacks. Learn how ZENworks Patch Management and ZENworks Endpoint SecurityAntimalware help you meet this challenge. The session covers the purpose of the products, demonstrates features and functionality commonly used in organizations, discusses future direction for the products, and highlights additional resources available tohelp you with the products.
slides
video
ZENworks Top Support Issues and Best Practices
by Arvind Tiwary, Moises Morales
Abstract:
     This session from Micro Focus ZENworks Customer support team covers Common Issues that Customers are encountering with the ZENworks Product and how to resolve them. ZENworks 2020 Update 2 involves significantarchitectural changes to the core components and underlying framework, so this session will cover its appropriate troubleshooting tools/procedures, and best practices on tuning your environment for an optimal performance.
slides
video
The TTP main conference
Monday 11 July
Unified Endpoint Management Roadmap
by Paul Pedron, Darrin VandenBos, Vikram Goyal
Abstract:
     Organizations need secure, automated processes for managing and protecting their endpoint devices and data. However, expanding workspace locations and the growing number of endpoint types continueto challenge IT departments as they look for ways to manage and protect both local and remote devices, while ensuring employees have the resources needed to do their work. See the future of Unified Endpoint Management with the ZENworks Portfolio.
slides
video
Identity Management and Identity Governance Integrations
by Shalabh Garg
Abstract:
     Extend your existing IDM on-premises setup with our new IG-SaaS functionalities. A hybrid strategy allows for a smooth transition to SaaS. Integrate IDM on-premises with IG-SaaS without transferring complex driver policies. Examine the numerous IDM and IG integrations, such as AzureAD, MSTeams, and others, that have recently been improved or added.
slides
video
Migrating the Zone from Physical servers to a cost effective Appliance
by Paul Pedron
Abstract:
     Using a physical or virtual server for your applications can quickly become costly. This is due to OS licensing fees coupled with requirements and resources used to patch these servers regularly. With the newer capabilities introduced in ZENworks 2020 Update 2, it is now possible to move your Windows or Linux servers to a ZENworks Virtual Appliance.
slides
video
MFDC Application Streaming providing Secure Applications and Data Access Anywhere
by Paul Pedron
Abstract:
     Now more than ever before, organizations must be attentive to their users and user access without compromising security. This involves complying with mandates and policies, while continuing to provide needed resources to achieve growth for the organization. Supporting employees in all locations can be difficult with while still adhering to the security policies and data concerns. Solve the security and data containment issues, to increase the power of application provisioning and production in the digital workspacewith MFDC Application Streaming & Packaging.
slides
video
The Next Generation of Patch Management
by Darrin VandenBos
Abstract:
     ZENworks Patch Management is undergoing significant changes in the ZENworks 2020 Update 3 release, including removal of the current subscription download process, improvements to patch scanning times, and use of the new ondemand content distribution method. Join us for all the details you’ll want to know to prepare and implement these exciting new changes!
slides
video
ZENworks Service Desk is a Help Desk system for Any Industry
by Paul Pedron
Abstract:
     Keeping your organization productive requires a proficient Help Desk system and Users and Customer that get accurate information for expediting the resolution of requests. Many tasks— such as fulfilling software requests that require approval, access to inventory, scheduling events/maintenance, recording and tracking assets and issues, which can be repetitive, resulting in wasted time and resources. ZENworks Service Desk can help solve this dilemma by automating processes for any industry, allowing customers and users to manage their issues.
slides
video
Tuesday 12 July
The new Unified Management Console for Open Enterprise Server
by Girish KS
Abstract:
     See a sneak peek into the new Unified Management Console for OES and how you can leverage the new UI to optimize your solution.
slides
video
Radius Accounting authentication for any device on VPN and Wifi
by Václav Šamša, TDP
Abstract:
     There are two basic rules - the user's device must support the method, e.g. Smart Card, and the first authentication should be shared with other systems - this is what users expect as so called SSO. Many devices do not support advanced authentication methods, but their authentication to entrance systems like VPN and WiFi is secure and trusted. Radius Accounting is the de facto standard for SSO between network appliances. This advanced session will teach you how RA works, what is the role of the RA server and RA client and how you can use Radius Accounting in your environment.
slides
video
Student Workers: What Are They Good For?
by Johnnie Odom
Abstract:
     If you are fortunate enough to have student helpers, you know that you are supposed to help them as much as they are helping you. We will talk about strategies to get the most work out of them while giving them the most benefit and saving you the most time. Also, every now and then we need them to haul something heavy.
slides
video
Concensus Driver Updates: Google Workspace Driver Roadmap, Intro to the Canvas Driver
by Mike Weaver, Concensus
Abstract:
     This session will cover current and near future updates to the Google Workspace IDM connector as well as introduce the Concensus Canvas LMS IDM connector. A high-level technical overview of both items will be provided as well as time for questions and answers.
slides
video
Distributing Content Ondemand
by Darrin VandenBos
Abstract:
     For years, ZENworks has excelled at replicating or “pushing” content (bundles, policies, patches, and more) to Primary Servers and Satellite Content Servers, ensuring that the servers have access to the content locally when an endpoint device needs it. In ZENworks 2020 Update 3, we are introducing ondemand content distribution to enable a Primary Server or Satellite Content Server to request content it doesn’t have from other Primaries or Satellites. Join us for details and insights into how you can take advantage of this new content distribution method.
slides
video
Data Access Goverence: Ensure the right people have the right access
by Ed Shropshire
Abstract:
     Micro Focus Data Access Governance is all about the right people having the right access to the right data at the right time. An Integration with NetIQ’s Identity Governance & Voltage Data Discovery gives organizations the power they need to expand the capabilities of access reviews. Now folders containing potentially confidential, sensitive, or regulated files can be easily reviewed to see user access permissions and if those permissions need to be kept, removed, or changed. In addition, DataAccess Governance helps to establish critical data management policies that automatically clean up, move, archive, delete, remediate, and perform a variety of other management actions.
slides
video
Wednesday 13 July
Cloud Integrated Storage Improvements
by Girish KS
Abstract:
     Join us to discuss the various improvements in extending your NSS storage to the cloud.
slides
video
Data Protector backup of virtual & cloud services
by Joerg Richter
Abstract:
     Data Protector aims to provide a stable, agentless backup and snapshot-management suite for virtual machines, containers, applications workingon-premises and in the cloud, and storage providers. Key capabilities are:
• Microsoft 365 Services data backup support for Exchange Online, SharePoint Online, OneDrive for Business, and Teams.
• Protection for Cloud workloads in AWS EC2, containerised workload, and management infrastructure including Kubernetes and OpenShift.
• Protection for storage providers including Ceph RBD, Nutanix, and SUSE Enterprise Storage.
• Broad support for virtual workload management and hypervisor platforms – VMware, MicrosoftHyper-V, KVM, Citrix XEN, Oracle VM, Nutanix, Red Hat Virtualization, OpenStack and more.
• Protection for virtualised databases and applications including application data andconfigurations.
slides
video
Configuring Apache web server in Open Enterprise Server
by Joe Doupnik
Abstract:
     Because for most sites a web server is often the most contacted point by the world this presentation is about how we can configure Apache to withstand the constant probing by the bad guys, plus a few other useful configuration nuances. The material is applicable to Apache on most Micro Focus products and similar installations. Similar web servers, such as Nginx, have similar controls. The solutions are practical, and they are relatively easy to understand and implement.
slides
video
Access Management SaaS - Are you ready?     Canceled
by Chandra Shekar Tumula
Abstract:
     This session will highlight our plans on Access Management SaaS for 2022 and later. It will showcase the value adds for a brand new customer and an existing customer who wants to move to SaaS.

Collaboration Update and Roadmap
by Mike Bills and Eric Maughan
Abstract:
     Discover the latest news and updates on this product line from product management and look at plans for the future.
slides
video
Audit & Compliance Dashboard and Audit driver updates: notes from the field
by Alex Belousov
Abstract:
     Extensions and new functions included into latest version AUDIT & COMPLIANCE DASHBOARD (ACD) and Audit Driver implementation in the Cloud environment.
slides
video
Thursday 14 July
Tooling and Deployment for IDM Containers
by Shalabh Garg
Abstract:
     Terraform and Helm charts were used to automate the deployment and administration of an IDM solution in the cloud. Examine tools that can help you manage complex Identity Manager deployments and automate driver policy testing and deployment across environments.
slides
video
Micro Focus Keynote Presentation
by Peter Sianchuk, VP of Customer Success
Abstract:
     TBA
video
IDM at Carmel College
by Bas Penris
Abstract:
     The journey to a brand new HR and financial system, using a loopback driver to do admin account management, and the other disasters Bas and Jan have been tackling during COVID.
slides
video
REST: How access any LDAP directory safe and secure.
by Andreas Fuhrmann, Christian Karch
Abstract:
     LDAP directories are very common and often used to store identity information. The amount of applications, that want to access this information from inside or outside is increasing constantly. Instead of LDAPS or LDAP, REST is the service, web applications want to use to handle data. To access data in a LDAP directory securely SERAS opens your LDAP directory in a secure way to access the data via https using secure tokens with strictly limited services, offering only access to data you're allowed to see and operations you're allowed to execute.
slides
video
K-12 Uses for Filr and Filr Advanced
by Johnnie Odom
Abstract:
     In most K-12 environments students are either using Google Drive or Microsoft OneDrive. So why do we need a solution for On-Prem files like Filr? The answer is that some users are not students, not all data needs to be in the cloud, and there are some functions that neither GDrive or OneDrive does especially well. For all these needs there is Filr. Also includes a demonstration of which Filr Advanced features you might actually use.
slides
video
Secure Messaging Gateway new and upcoming feature presentation and demo.
by Josh Gibbs
Abstract:
     Secure Messaging Gateway constantly evolves with frequent updates, typically including incremental enhancements and fixes. Larger, more complex features are developed in parallel to the monthly updates and in this session Josh Gibbs will be demonstrating the upcoming, and long awaited statistics service. You'll get a preview of the new, built for purpose, monitoring user interface, how it integrates with the various SMG components and how it works in multi-tenant environments.
video
Friday 15 July
What's new in Access Manager 5.0.2
by Akhil Laddha
Abstract:
     This session will talk about the enhanced user experience in Access Manager 5.0.2 which includes improved upgrade assistant, integrated analytics dashboard etc. This session will talk about all the improvements that have gone under the hood as well which includes OAuth enhancements, Authentication APIs etc
slides
video
Reporting, Monitoring and Alerting for eDir (IDM)
by Andreas Fuhrmann, Konstantin Andriyuk, Christian Karch
Abstract:
     With Identity and Access Management moving more into the center of Cyber Security the need to know what is and was going on in your main directories becomes increasingly important. Additionally getting alerts on specific actions is required by laws, regulations and industry standards. Watch and learn how the latest version of SKyPRO's ACD enables you to do exactly this with NetIQ IDM.
video
PhD-Level SQL For Terrible Applications
by Sean Griffith, Tyler Webb, School District of Escambia County
Abstract:
     College-Level Database Courses cover 90% of SQL syntax and beautifully lay out data relationships in entity diagrams. Once you graduate you have to deal with vendors that use their databases to serialize PHP data, managers whose UML diagrams can only be realized with an ORM, and cultists at both ends of the normalization debate. In order to extract data from the resultant systems, darker methods must be used. Join us as we Choose Violence and (ab)use CTEs, functions/stored procedures, materialized views, and the Heroic Left Lateral Join.
slides
video
Filr at Regensburg and best practices
by Edmund Weber, Dexter D'Arbreau
Abstract:
     Join this session to learn how the University of Regensburg has configured Filr in its complex environment and hear from their Premium Support Engineer the Best Practices when using this product from the support organisation.
slides
video
IDM Database System Users
by Aaron Burgemeister
Abstract:
     IDM JDBC drivers are well known for synchronizing to tables or views in order for applications built on those DBs to have users, passwords, etc. Used less often is the provisioning of accounts directly to the database system itself, e.g. creating accounts within the MytSQL or Oracle environment which can login to the database itself, either to provision DB admins/users or for applications that rely on those credentials. An example will be shown to quickly show how to create users and synchronize passwords to them in XSLT showing advantages and drawbacks of this type of integration.
slides
video
Managing an Academic Computer Center in Today's Reality
by Edmund Weber
Abstract:
     Maneuvering the minefield between user expectations, financial and legal regulations.
slides
video
© Joe Doupnik 2021