Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Zero Trust Architecture. Establishing a security blueprint: step by step Dr. Christopher Meyer, Product Manager Utimaco | Dr. Fabian Eidens, Technology Manager Utimaco Zero Trust Architecture. Establishing a security blueprint - step by step, brick by brick: Things to bear in mind when building your Zero Trust Archit... 3 days ago | 62 mins Bringing Video Surveillance to the Edge at the Intersection of IT and Security Danny Collins, Product Marketing Manager, Wasabi Technologies; Mike O’Neil, Director of Systems Engineers, Scale Computing The digital transformation in the video surveillance industry is generating a new demand among customers processing data closer to the endpoint, or th... June 22, 2023 6:00pm See Forcepoint ONE Zero Trust Network Access (ZTNA) in Action Nate Springer, Director of Platform Engineering, Forcepoint | Corey Kiesewetter, Sr. Product Marketing Manager, Forcepoint Easy access to private applications without the risks and costs of a VPN Forcepoint ONE Zero Trust Network Access (ZTNA) makes remote access to priv... 2 months ago | 36 mins 5 Steps to Simplifying Zero Trust with SASE Corey Kiesewetter, Sr. Product Marketing Manager, Forcepoint Join Corey Kiesewetter as he discusses the benefits of a single-vendor SASE solution and how the CASB, ZTNA, SWG, DLP and Secure SD-WAN components can... 5 months ago | 23 mins Global Information Management Trends in 2023 & Finding the Right Cloud Strategy Brandon Voight, Regional Director of Sales, Content Manager, OpenText Good information management is essential in our digital-first age. Recent trends encourage increased cloud deployment. But how does this affect inform... 2 days ago | 60 mins How Wasabi Hot Cloud Storage Makes Veeam Backup Better Drew Schlussel, Sr. Director Product Marketing, Wasabi; Caitlin Tindle, Alliance Marketing Manager, Wasabi With the delivery of Veeam Backup & Replication v12, direct-to-object backup and recovery has come to the forefront of the data protection and ransomw... 3 days ago | 22 mins The Workload-First Approach for a Multicloud World: A Tech CEO’s Cloud Strategy Johnny Dallas, Zeet | Pavel Despot, Akamai | Dave McCarthy, IDC Is your workload strategy taking full advantage of the multicloud environment? IT buyers tell IDC that cloud computing accounts for 31% of total IT bu... 4 days ago | 39 mins How To Create a More Secure World: Replacing Inadequate VPNs with ZTNA Security Evangelist - Jon Taylor The global pandemic and rise in remote work has forced organizations to review how they provide remote workers access to IT resources. Existing soluti... 2 days ago | 30 mins Does the Future of CIAM Depend on Identity Fabrics or Identity Suite? Ward Duchamps, Sr. Product Manager, CIAM, Thales Several identity models are currently influencing the rapid development of digital identities. But which one will lead the future of Customer Identity... 3 days ago | 37 mins 3 ways to modernize and standardize your Red Hat Enterprise Linux infrastructure Eric Hendricks, Senior Technical Marketing Manager, Red Hat Today’s IT landscape requires efficient innovation and adaption, but it can be challenging. Organizations have to balance existing system maintenance ... June 14, 2023 5:00pm Load more