Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date What's New with Symantec's Integrated Hybrid Network Security Solution Narayana Rao Bezawada (BN), Solutions Engineer, Asia Pacific and Japan, Symantec Enterprise Division, Broadcom Software Join the Symantec team on May 18 to learn more about what's new with Symantec's Integrated Hybrid Network Security Solution. This webinar will addres... 6 days ago | 39 mins Monitoring Spark on Kubernetes: Key Performance Metrics Alex Pierce, Pepperdata Field Engineer Spark on Kubernetes is growing in popularity due to improved isolation, better resource sharing, and the ability to leverage homogeneous and cloud-nat... 3 weeks ago | 19 mins Secure Browser or Browser Isolation 101 Evgeniy Kharam, VP, Cybersecurity Solution Architecture at Herjavec Group Browsing is now an inherent part of our work and personal lives, from researching, shopping, social media, and accessing SaaS applications. Unfortunat... 4 weeks ago | 38 mins Act Now! Application Maintenance Can’t be Delayed Anymore Debbie Z – Director, App Dev & BI, Sanjay N – VP, Consulting, Manan T – Manager, Consulting, Zach F - Sr. Manager, App Dev Enterprises today can’t look at application maintenance in isolation. Continuous integration and deployment model, which are the need of the hour, can... 2 months ago | 47 mins RBI - Unpacking Netskope: Remote Browser Isolation Tim Chiu, Netskope Senior Director of Product Marketing The internet is both one of the most important productivity tools for businesses as well as one of the biggest liabilities to those businesses due to ... 4 weeks ago | 30 mins Solving the 'work anywhere and access everything' security challenge Mark Guntrip, Sr Director of Cybersecurity Strategy, Menlo Security The corporate world has changed in many ways. Some forced, some desired. The end user experience of working within an organization, large or small, is... 6 days ago | 28 mins Insights for CISOs: Web Isolation Technology Swetha R K, Frost & Sullivan, Scott Petry, Authentic8 and Henry Harrison, Garrison With the growing volume of cyberattacks and heightened adoption of digital transformation initiatives by businesses, a reactive detect-and-respond str... 1 month ago | 33 mins Secure Application Access for All Your Users Eric Schwake, Menlo Security | Dan Kirsch and Mitch Ashley, TechStrong Research How can you safely give employees and contractors access to applications while staying secure? Security can’t be a roadblock—employees need access to ... 1 month ago | 51 mins Solving the 'work anywhere and access everything' security challenge Eric Schwake, Sr. Manager of Cybersecurity Strategy, Menlo Security The corporate world has changed in many ways. Some forced, some desired. The end user experience of working within an organization, large or small, is... 4 weeks ago | 35 mins Monitoring Spark on Kubernetes: Key Performance Metrics Alex Pierce, Pepperdata Field Engineer Spark on Kubernetes is growing in popularity due to improved isolation, better resource sharing, and the ability to leverage homogeneous and cloud-nat... 2 months ago | 19 mins Load more