SlideShare uma empresa Scribd logo
1 de 29
Introducing
Perforce Helix
Chris Hoover
Global VP, Products & Marketing
Charles McLouth
Senior Director, Technical Sales
What we’ll talk about today
• New challenges for product
development
• Our vision for cross-team
collaboration
• Introducing Perforce Helix
• Q&A
2
Charlie McLouth
Senior Director
Solutions Engineering
Chris Hoover
Global Vice President
Products & Marketing
Modern product development
3
Today’s products reflect a complex
combination of design and technology
code
media
docs
designs
New cross-team challenges
4
DevOps
• Poor visibility between teams
introduces friction and design
errors
• Poor component reuse results
in higher production costs
• More delays, less efficient
product delivery
• Increased risk of poor quality
code
media
docs
designs
Increased risk of IP theft
5
DevOps Chief Security
Officer
code
media
docs
designs
The impact of IP theft
• Annual losses due to IP theft > $300B
• “The greatest transfer of wealth in history”
• Subsidizes competitors and foreign
suppliers
• Diminishes productivity growth,
innovation, product advancements
6
Our Goal: Connect, protect & support
7
• Contributors work within
their familiar tools and
workflows
• Platform supports all assets,
regardless of
type or size
• Scalable, highly available
• Secured IP & theft detection
• Cross-team collaboration,
lower cost
Introducing
Perforce Helix
• Flexible workflows
• Fast & scalable
• Every asset
• Everywhere
• Secure
• Open & extensible
9
Contributors
Consumers
Introducing Perforce Helix
Cutting-edge SCM capabilities
10
Logs Analytics
Versioning Engine (P4D)
IP Threat
Detection
DVCS
Permissions
Git Fusion
Ongoing Updates:
• Cluster Manager
• Parallel Sync
• Lockless Reads
What you’ve asked for in a DVCS…
• Greater productivity
• “Doesn’t matter what it is as long as it’s Git.”
• Web experience for managing Git
That’s why Perforce now offers a choice of…
• Native Helix DVCS
• Git Fusion
• A complete Git ecosystem
11
New native DVCS
capabilities
Modern product development
• Native support in the core
• New push/fetch protocol (built for speed
and large data sets)
• Move content and metadata between
servers and peers
• Relocate content as part of push/fetch
• Enterprise-grade security/access control
• Meticulous preservation of history and
audit trails
13
Shared
Repository
Developer
Repository
Developer
Repository
Developer
Repository
Push
Fetch
Share components with distributed teams
14
A new Git
ecosystem integrated
with Helix
GitSwarm: Complete Git ecosystem
16
• Self service repos
• Pull requests
• Permissions
• Issue tracking, etc.
Integrated within Helix
17
• Distributed environment for
developers
• Git experience and workflow
equivalent to well known tools
Configurable sync
• Single source of truth
• Perforce reliability and stability
protecting your assets
Helix Versioning EngineGitSwarm
Advanced new
security capabilities
Customer: $20B manufacturer
19
2 engineers
stole data
1 YEAR
$1 million spent
Large security vendor
failed to find anything
2 WEEKS
Easily identified
the 2 engineers
Found 3 additional
users stealing data
in North America
Found 8 additional
users stealing data
outside North
America
THREAT
DETECTION
X
Reduces noise and false positives
• Each entity maintains a persistent risk score
(user, machine, asset)
• Risk scores change based on activities
• Real-time aggregation of multiple events
“connects the dots” of related activities
20
John Smith is accessing an unusual, important file 25
… at a time of day he was almost never active at before 46
… and took from a source code project that has been inactive for months 80
… and is downloading more source code from more folders than his peers 96
Behavioral
Risk Model
Behavioral
Risk Score
Entity Risk
Model
Entity Risk
Score
Helix Threat Detection
21
Analytics Modeling
• Baselines and creates clusters
• Learns Patterns
• Learns Anomalies (unusual hours,
data volumes, application types &
more
Risk Scoring
• Risk by User
• Risk by Activity
• Risk by File
• Risk by Time
• Risk by Volume
• Risk by Method/Exit
Verification & Investigation
• Highly Readable Event Alarms
• Very Intuitive UI
• Executive Reporting
All Users
Riskfrom0-100
BEHAVIORAL ANALYTICS
2
0
5
23
Wintermute Wintermute 89
Armitage 82
Hideo 26
Maelcum 26
Molly 25
Aerol 25
Strayllight 25
Case 18
Chiba 8
Proteus 7
Interactive risk reporting and drilldown
22
Interactive risk reporting and drilldown
23
Request a free risk
analysis report.
New hosted
deployment options
Helix Enterprise OnDemand
• Full capabilities of Helix Enterprise
• Single-tenant environment
• Tailored to your needs
• Delivered, managed and
supported by Perforce
25
Introducing Helix Cloud
• Multi-tenant SaaS offering
with free and premium tiers
• Git and P4D private repo hosting
with full remote access
• Very large files welcome
• Simple, social sharing for
non-technical users
• Easily import content from
third-party repositories
26
In summary
• Native enterprise-grade DVCS
• New solution for Git
• New solution for IP threat
detection
• Available on premise
and cloud
27
A better way to build complex products
28
code
media
docs
designs
Questions
29
Chris Hoover
chrish@perforce.com
Charles McLouth
cmclouth@perforce.com
Resources
perforce.com/helix
p4ideax.com
forums.perforce.com

Mais conteúdo relacionado

Mais procurados

Deep Visibility: Logging From Distributed Microservices
Deep Visibility: Logging From Distributed MicroservicesDeep Visibility: Logging From Distributed Microservices
Deep Visibility: Logging From Distributed Microservices
AaronLieberman5
 

Mais procurados (20)

DEVNET-1117 Open Source DevCenter Launched within DevNet
DEVNET-1117	Open Source DevCenter Launched within DevNetDEVNET-1117	Open Source DevCenter Launched within DevNet
DEVNET-1117 Open Source DevCenter Launched within DevNet
 
Deep Visibility: Logging From Distributed Microservices
Deep Visibility: Logging From Distributed MicroservicesDeep Visibility: Logging From Distributed Microservices
Deep Visibility: Logging From Distributed Microservices
 
No you are not a DevOps engineer (revisted)
No you are not a DevOps engineer (revisted)No you are not a DevOps engineer (revisted)
No you are not a DevOps engineer (revisted)
 
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
Addressing the 8 Key Pain Points of Kubernetes Cluster ManagementAddressing the 8 Key Pain Points of Kubernetes Cluster Management
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
 
DCSF 19 Zero Trust Networks Come to Enterprise Kubernetes
DCSF 19 Zero Trust Networks Come to Enterprise KubernetesDCSF 19 Zero Trust Networks Come to Enterprise Kubernetes
DCSF 19 Zero Trust Networks Come to Enterprise Kubernetes
 
Perforce helix git swarm jan 2016(pva1) meetup
Perforce helix git swarm jan 2016(pva1) meetupPerforce helix git swarm jan 2016(pva1) meetup
Perforce helix git swarm jan 2016(pva1) meetup
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
Embacing service-level-objectives of your microservices in your Cl/CD
Embacing service-level-objectives of your microservices in your Cl/CDEmbacing service-level-objectives of your microservices in your Cl/CD
Embacing service-level-objectives of your microservices in your Cl/CD
 
Mastering Secrets Management in Rundeck
Mastering Secrets Management in RundeckMastering Secrets Management in Rundeck
Mastering Secrets Management in Rundeck
 
Accelerate your dev ops transformation with continuous automation
Accelerate your dev ops transformation with continuous automationAccelerate your dev ops transformation with continuous automation
Accelerate your dev ops transformation with continuous automation
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
 
EasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng OeiEasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng Oei
 
Red Hat multi-cluster management & what's new in OpenShift
Red Hat multi-cluster management & what's new in OpenShiftRed Hat multi-cluster management & what's new in OpenShift
Red Hat multi-cluster management & what's new in OpenShift
 
DCSF 19 Mitigating Legacy Windows Operating System Vulnerabilities with Docke...
DCSF 19 Mitigating Legacy Windows Operating System Vulnerabilities with Docke...DCSF 19 Mitigating Legacy Windows Operating System Vulnerabilities with Docke...
DCSF 19 Mitigating Legacy Windows Operating System Vulnerabilities with Docke...
 
F5 Cloud Solutions
F5 Cloud SolutionsF5 Cloud Solutions
F5 Cloud Solutions
 
DevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOpsDevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOps
 
Building Next Generation Applications and Microservices
Building Next Generation Applications and Microservices Building Next Generation Applications and Microservices
Building Next Generation Applications and Microservices
 
Cloud native
Cloud nativeCloud native
Cloud native
 
Webinar: APPSeCONNECT Product Updates 2019 - Major Highlights
Webinar: APPSeCONNECT Product Updates 2019 - Major HighlightsWebinar: APPSeCONNECT Product Updates 2019 - Major Highlights
Webinar: APPSeCONNECT Product Updates 2019 - Major Highlights
 
Infrastructure as Code principles and practices
Infrastructure as Code  principles and practicesInfrastructure as Code  principles and practices
Infrastructure as Code principles and practices
 

Destaque

Year 10 Engineering - Lesson 12 - Spinner Project
Year 10 Engineering - Lesson 12 - Spinner ProjectYear 10 Engineering - Lesson 12 - Spinner Project
Year 10 Engineering - Lesson 12 - Spinner Project
Rob Winter
 
Year 10 Engineering - Lesson 1 - Intro To Course And Technical Drawing Basics
Year 10 Engineering - Lesson 1 - Intro To Course And Technical Drawing BasicsYear 10 Engineering - Lesson 1 - Intro To Course And Technical Drawing Basics
Year 10 Engineering - Lesson 1 - Intro To Course And Technical Drawing Basics
Rob Winter
 
Exercicescorrigs 130111070052-phpapp01
Exercicescorrigs 130111070052-phpapp01Exercicescorrigs 130111070052-phpapp01
Exercicescorrigs 130111070052-phpapp01
moussking
 
Le choix d'investissement - les méthodes de calculs dans un avenir certain et...
Le choix d'investissement - les méthodes de calculs dans un avenir certain et...Le choix d'investissement - les méthodes de calculs dans un avenir certain et...
Le choix d'investissement - les méthodes de calculs dans un avenir certain et...
Hajar EL GUERI
 
Exercice d'application des choix d'investissement
Exercice d'application des choix d'investissement Exercice d'application des choix d'investissement
Exercice d'application des choix d'investissement
Hajar EL GUERI
 

Destaque (13)

La ética y valores como esencia del ser humano
La ética y valores como esencia del ser humanoLa ética y valores como esencia del ser humano
La ética y valores como esencia del ser humano
 
Year 10 Engineering - Lesson 12 - Spinner Project
Year 10 Engineering - Lesson 12 - Spinner ProjectYear 10 Engineering - Lesson 12 - Spinner Project
Year 10 Engineering - Lesson 12 - Spinner Project
 
Engineering Curves
Engineering CurvesEngineering Curves
Engineering Curves
 
Year 10 Engineering - Lesson 1 - Intro To Course And Technical Drawing Basics
Year 10 Engineering - Lesson 1 - Intro To Course And Technical Drawing BasicsYear 10 Engineering - Lesson 1 - Intro To Course And Technical Drawing Basics
Year 10 Engineering - Lesson 1 - Intro To Course And Technical Drawing Basics
 
devon2013: 사내Git저장소개발사례
devon2013: 사내Git저장소개발사례devon2013: 사내Git저장소개발사례
devon2013: 사내Git저장소개발사례
 
Unit 3 machines
Unit 3 machines Unit 3 machines
Unit 3 machines
 
Embracing Git and Distributed Teams
Embracing Git and Distributed TeamsEmbracing Git and Distributed Teams
Embracing Git and Distributed Teams
 
Decisions d'Investissement et de Financement , S5 ENCGA
Decisions d'Investissement et de Financement , S5 ENCGADecisions d'Investissement et de Financement , S5 ENCGA
Decisions d'Investissement et de Financement , S5 ENCGA
 
Springs
SpringsSprings
Springs
 
Exercicescorrigs 130111070052-phpapp01
Exercicescorrigs 130111070052-phpapp01Exercicescorrigs 130111070052-phpapp01
Exercicescorrigs 130111070052-phpapp01
 
HELIX-LOOP-HELIX, HELIX-TURN-HELIX
HELIX-LOOP-HELIX, HELIX-TURN-HELIXHELIX-LOOP-HELIX, HELIX-TURN-HELIX
HELIX-LOOP-HELIX, HELIX-TURN-HELIX
 
Le choix d'investissement - les méthodes de calculs dans un avenir certain et...
Le choix d'investissement - les méthodes de calculs dans un avenir certain et...Le choix d'investissement - les méthodes de calculs dans un avenir certain et...
Le choix d'investissement - les méthodes de calculs dans un avenir certain et...
 
Exercice d'application des choix d'investissement
Exercice d'application des choix d'investissement Exercice d'application des choix d'investissement
Exercice d'application des choix d'investissement
 

Semelhante a Introducing Perforce Helix

Semelhante a Introducing Perforce Helix (20)

Challenges Scaling DevOps
Challenges Scaling DevOpsChallenges Scaling DevOps
Challenges Scaling DevOps
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
 
GraphTour - Neo4j Database Overview
GraphTour - Neo4j Database OverviewGraphTour - Neo4j Database Overview
GraphTour - Neo4j Database Overview
 
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
 
Introducing GitSwarm: Pure Git with Globally Scalable DevOps
Introducing GitSwarm: Pure Git with Globally Scalable DevOpsIntroducing GitSwarm: Pure Git with Globally Scalable DevOps
Introducing GitSwarm: Pure Git with Globally Scalable DevOps
 
HIPAA 101 Compliance Threat Landscape & Best Practices
HIPAA 101 Compliance Threat Landscape & Best PracticesHIPAA 101 Compliance Threat Landscape & Best Practices
HIPAA 101 Compliance Threat Landscape & Best Practices
 
DevOps and Git: Solving for CI/CD at Scale
DevOps and Git: Solving for CI/CD at ScaleDevOps and Git: Solving for CI/CD at Scale
DevOps and Git: Solving for CI/CD at Scale
 
Devops phase-1
Devops phase-1Devops phase-1
Devops phase-1
 
Amplexor Drupal for the Enterprise seminar - Acquia: dream it, Drupal it
Amplexor Drupal for the Enterprise seminar - Acquia: dream it, Drupal itAmplexor Drupal for the Enterprise seminar - Acquia: dream it, Drupal it
Amplexor Drupal for the Enterprise seminar - Acquia: dream it, Drupal it
 
Enterprise CI as-a-Service using Jenkins
Enterprise CI as-a-Service using JenkinsEnterprise CI as-a-Service using Jenkins
Enterprise CI as-a-Service using Jenkins
 
Lyra Infosystems - GitLab Overview Deck 2020
Lyra Infosystems - GitLab Overview Deck 2020Lyra Infosystems - GitLab Overview Deck 2020
Lyra Infosystems - GitLab Overview Deck 2020
 
We've Got Docker & Cloud, Now What?
We've Got Docker & Cloud, Now What? We've Got Docker & Cloud, Now What?
We've Got Docker & Cloud, Now What?
 
An Architecture for Autonomy
An Architecture for AutonomyAn Architecture for Autonomy
An Architecture for Autonomy
 
Mitigate potential compliance risks
Mitigate potential compliance risksMitigate potential compliance risks
Mitigate potential compliance risks
 
ShiftGearsWithInformationSecurity.pdf
ShiftGearsWithInformationSecurity.pdfShiftGearsWithInformationSecurity.pdf
ShiftGearsWithInformationSecurity.pdf
 
A proven path for migrating from clearcase to git and or subversion
A proven path for migrating from clearcase to git and or subversionA proven path for migrating from clearcase to git and or subversion
A proven path for migrating from clearcase to git and or subversion
 
From Containerized Application to Secure and Scaling With Kubernetes
From Containerized Application to Secure and Scaling With KubernetesFrom Containerized Application to Secure and Scaling With Kubernetes
From Containerized Application to Secure and Scaling With Kubernetes
 
Immutable Service Delivery Shenzhen 2016
Immutable Service Delivery   Shenzhen 2016Immutable Service Delivery   Shenzhen 2016
Immutable Service Delivery Shenzhen 2016
 
Open Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation SecurityOpen Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation Security
 

Mais de Perforce

Mais de Perforce (20)

How to Organize Game Developers With Different Planning Needs
How to Organize Game Developers With Different Planning NeedsHow to Organize Game Developers With Different Planning Needs
How to Organize Game Developers With Different Planning Needs
 
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...
Regulatory Traceability:  How to Maintain Compliance, Quality, and Cost Effic...Regulatory Traceability:  How to Maintain Compliance, Quality, and Cost Effic...
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...
 
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
 
Understanding Compliant Workflow Enforcement SOPs
Understanding Compliant Workflow Enforcement SOPsUnderstanding Compliant Workflow Enforcement SOPs
Understanding Compliant Workflow Enforcement SOPs
 
Branching Out: How To Automate Your Development Process
Branching Out: How To Automate Your Development ProcessBranching Out: How To Automate Your Development Process
Branching Out: How To Automate Your Development Process
 
How to Do Code Reviews at Massive Scale For DevOps
How to Do Code Reviews at Massive Scale For DevOpsHow to Do Code Reviews at Massive Scale For DevOps
How to Do Code Reviews at Massive Scale For DevOps
 
How to Spark Joy In Your Product Backlog
How to Spark Joy In Your Product Backlog How to Spark Joy In Your Product Backlog
How to Spark Joy In Your Product Backlog
 
Going Remote: Build Up Your Game Dev Team
Going Remote: Build Up Your Game Dev Team Going Remote: Build Up Your Game Dev Team
Going Remote: Build Up Your Game Dev Team
 
Shift to Remote: How to Manage Your New Workflow
Shift to Remote: How to Manage Your New WorkflowShift to Remote: How to Manage Your New Workflow
Shift to Remote: How to Manage Your New Workflow
 
Hybrid Development Methodology in a Regulated World
Hybrid Development Methodology in a Regulated WorldHybrid Development Methodology in a Regulated World
Hybrid Development Methodology in a Regulated World
 
Better, Faster, Easier: How to Make Git Really Work in the Enterprise
Better, Faster, Easier: How to Make Git Really Work in the EnterpriseBetter, Faster, Easier: How to Make Git Really Work in the Enterprise
Better, Faster, Easier: How to Make Git Really Work in the Enterprise
 
Easier Requirements Management Using Diagrams In Helix ALM
Easier Requirements Management Using Diagrams In Helix ALMEasier Requirements Management Using Diagrams In Helix ALM
Easier Requirements Management Using Diagrams In Helix ALM
 
How To Master Your Mega Backlog
How To Master Your Mega Backlog How To Master Your Mega Backlog
How To Master Your Mega Backlog
 
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
 
How to Scale With Helix Core and Microsoft Azure
How to Scale With Helix Core and Microsoft Azure How to Scale With Helix Core and Microsoft Azure
How to Scale With Helix Core and Microsoft Azure
 
Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2
 
Should You Break Up With Your Monolith?
Should You Break Up With Your Monolith?Should You Break Up With Your Monolith?
Should You Break Up With Your Monolith?
 
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
 
What's New in Helix ALM 2019.4
What's New in Helix ALM 2019.4What's New in Helix ALM 2019.4
What's New in Helix ALM 2019.4
 
Free Yourself From the MS Office Prison
Free Yourself From the MS Office Prison Free Yourself From the MS Office Prison
Free Yourself From the MS Office Prison
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

Introducing Perforce Helix

  • 1. Introducing Perforce Helix Chris Hoover Global VP, Products & Marketing Charles McLouth Senior Director, Technical Sales
  • 2. What we’ll talk about today • New challenges for product development • Our vision for cross-team collaboration • Introducing Perforce Helix • Q&A 2 Charlie McLouth Senior Director Solutions Engineering Chris Hoover Global Vice President Products & Marketing
  • 3. Modern product development 3 Today’s products reflect a complex combination of design and technology code media docs designs
  • 4. New cross-team challenges 4 DevOps • Poor visibility between teams introduces friction and design errors • Poor component reuse results in higher production costs • More delays, less efficient product delivery • Increased risk of poor quality code media docs designs
  • 5. Increased risk of IP theft 5 DevOps Chief Security Officer code media docs designs
  • 6. The impact of IP theft • Annual losses due to IP theft > $300B • “The greatest transfer of wealth in history” • Subsidizes competitors and foreign suppliers • Diminishes productivity growth, innovation, product advancements 6
  • 7. Our Goal: Connect, protect & support 7 • Contributors work within their familiar tools and workflows • Platform supports all assets, regardless of type or size • Scalable, highly available • Secured IP & theft detection • Cross-team collaboration, lower cost
  • 9. • Flexible workflows • Fast & scalable • Every asset • Everywhere • Secure • Open & extensible 9 Contributors Consumers Introducing Perforce Helix
  • 10. Cutting-edge SCM capabilities 10 Logs Analytics Versioning Engine (P4D) IP Threat Detection DVCS Permissions Git Fusion Ongoing Updates: • Cluster Manager • Parallel Sync • Lockless Reads
  • 11. What you’ve asked for in a DVCS… • Greater productivity • “Doesn’t matter what it is as long as it’s Git.” • Web experience for managing Git That’s why Perforce now offers a choice of… • Native Helix DVCS • Git Fusion • A complete Git ecosystem 11
  • 13. Modern product development • Native support in the core • New push/fetch protocol (built for speed and large data sets) • Move content and metadata between servers and peers • Relocate content as part of push/fetch • Enterprise-grade security/access control • Meticulous preservation of history and audit trails 13 Shared Repository Developer Repository Developer Repository Developer Repository Push Fetch
  • 14. Share components with distributed teams 14
  • 15. A new Git ecosystem integrated with Helix
  • 16. GitSwarm: Complete Git ecosystem 16 • Self service repos • Pull requests • Permissions • Issue tracking, etc.
  • 17. Integrated within Helix 17 • Distributed environment for developers • Git experience and workflow equivalent to well known tools Configurable sync • Single source of truth • Perforce reliability and stability protecting your assets Helix Versioning EngineGitSwarm
  • 19. Customer: $20B manufacturer 19 2 engineers stole data 1 YEAR $1 million spent Large security vendor failed to find anything 2 WEEKS Easily identified the 2 engineers Found 3 additional users stealing data in North America Found 8 additional users stealing data outside North America THREAT DETECTION X
  • 20. Reduces noise and false positives • Each entity maintains a persistent risk score (user, machine, asset) • Risk scores change based on activities • Real-time aggregation of multiple events “connects the dots” of related activities 20 John Smith is accessing an unusual, important file 25 … at a time of day he was almost never active at before 46 … and took from a source code project that has been inactive for months 80 … and is downloading more source code from more folders than his peers 96 Behavioral Risk Model Behavioral Risk Score Entity Risk Model Entity Risk Score
  • 21. Helix Threat Detection 21 Analytics Modeling • Baselines and creates clusters • Learns Patterns • Learns Anomalies (unusual hours, data volumes, application types & more Risk Scoring • Risk by User • Risk by Activity • Risk by File • Risk by Time • Risk by Volume • Risk by Method/Exit Verification & Investigation • Highly Readable Event Alarms • Very Intuitive UI • Executive Reporting All Users Riskfrom0-100 BEHAVIORAL ANALYTICS 2 0 5 23 Wintermute Wintermute 89 Armitage 82 Hideo 26 Maelcum 26 Molly 25 Aerol 25 Strayllight 25 Case 18 Chiba 8 Proteus 7
  • 22. Interactive risk reporting and drilldown 22
  • 23. Interactive risk reporting and drilldown 23 Request a free risk analysis report.
  • 25. Helix Enterprise OnDemand • Full capabilities of Helix Enterprise • Single-tenant environment • Tailored to your needs • Delivered, managed and supported by Perforce 25
  • 26. Introducing Helix Cloud • Multi-tenant SaaS offering with free and premium tiers • Git and P4D private repo hosting with full remote access • Very large files welcome • Simple, social sharing for non-technical users • Easily import content from third-party repositories 26
  • 27. In summary • Native enterprise-grade DVCS • New solution for Git • New solution for IP threat detection • Available on premise and cloud 27
  • 28. A better way to build complex products 28 code media docs designs

Notas do Editor

  1. Telling the story in a short version: Company came to us after they found 2 engineers had stolen a large amount of very high value data The company spent a year and over a million dollars working with a traditional security player and were unable to deploy a tool that would have detected these two engineers - traditional approaches failed. They were a Perforce customer and approached Interset and Perforce to see if analytics could be the answer. The company sent us 30 days of log data, including the theft by these users, to see if we could surface the attack – and it was easy. In two weeks, we had clearly defined the attacks of these two users. We also discovered 11 others that were stealing from them – they had no idea. Three in North America – action has been taken against them – and eight in China currently being investigated. It is important to understand that the company was struggling with two problems They had no visibility into the activities in their Perforce environment. They could not see if users were stealing data – or any risky activity The company had over 20K developers – that means the 30 days of logs contained millions of events that occurred in the Perforce system. Behavioral analytics was able to collect, correlate, analyze and score all of those events. The result – the users doing bad things scored the highest risk…. And were found. We can solve the really hard threat problems – we can see things other tools cannot see. How? ... Other Anecdotes: Four engineers from a large company over a period of time stole a lot of data when they left the company and went to a competitor. It took this company almost nine months to determine what had happened afterwards. They found out from a 3rd party, a partner of both companies, that suddenly some of the things started looking the same. They were seeing some of the same design specs and the same training manuals were showing up. When they went back and looked, sure enough they found out that this attack had taken place. Helix Threat Detection could have discovered this suspicious activity while it was happening, tell you exactly who to looked at what, and what to worry about. And you can dig in and look at the activity in terms of a time period, from a person, or from the perspective of a project or file folder structure, and prevent the data theft. A large company kept inactive projects accessible for a long time. An insider breached the source code of these open projects, and this was undiscovered until many years later when a similar game was observed running and available in China.
  2. In additional to Behavioral Risk algorithms, the Helix Threat Detection product also calculates Entity Risk, summarizing multiple behavioral risk scores or events into a single risk “story”. This completely unique approach reduces noisy false positives to highlight very anomalous activity or combinations of behaviors into a single risk view that focuses attention from limited resources to the top anomalous “risky” threats.
  3. Helix Threat Detection uses advanced behavioral analytics and machine learning to evaluate every event that occurs and applies a risk score to each. It then “connects the dots” of high risk events and surfaces the most important ones to take action on. What caused the risk, who is involved and what projects/files or other assets are at greatest risk are all clearly defined in easy to understand terms and with just one or two clicks. In screen one, the highest risk account and projects are easily defined. Note that the data is anonymized for privacy protection. With one click to screen two, the interactions between accounts and projects are defined. Clicking to expand a story brings you to screens 3 and 4 to quickly see the details of the risky actions. Easy to understand language explains exactly what happened to what project, and who was involved and when.
  4. Helix Threat Detection uses advanced behavioral analytics and machine learning to evaluate every event that occurs and applies a risk score to each. It then “connects the dots” of high risk events and surfaces the most important ones to take action on. What caused the risk, who is involved and what projects/files or other assets are at greatest risk are all clearly defined in easy to understand terms and with just one or two clicks. In screen one, the highest risk account and projects are easily defined. Note that the data is anonymized for privacy protection. With one click to screen two, the interactions between accounts and projects are defined. Clicking to expand a story brings you to screens 3 and 4 to quickly see the details of the risky actions. Easy to understand language explains exactly what happened to what project, and who was involved and when.