Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to leverage full cloud adoption in payments Darren Busby (MYHSM Global Head Sales) | Sudhir Kalidindi (AWS Principal Solutions Architect) | Suresh Vaghjiani (CLOWD9 CEO) Digital transformation and the global growth of electronic payments forges ahead with unprecedented momentum, but this growth potential does not guara... 5 days ago | 58 mins Simplifying Cloud Security - A SANS Review of Forcepoint ONE Matt Bromiley, SANS Analyst | Mike Schuricht, VP, Products, Forcepoint Join SANS instructor Matt Bromiley and Mike Schuricht, VP of Product Management from Forcepoint, for an in-depth review of the Forcepoint ONE Security... 3 weeks ago | 60 mins 5 Considerations for a Smooth Replacement of NetScaler Yaron Azerual Citrix recently announced that they’ll soon turn their focus away from you and most customers anddevote all of their resources to their top 1600 custo... March 30, 2023 3:00pm 7 Steps to Secure Your Kubernetes Cluster Pavel Chistikov, Kasten by Veeam Running and securing Kubernetes clusters in production is a complex process, but it doesn’t have to be. Join Pavel Chistikov at Kasten by Veeam who wi... 2 weeks ago | 57 mins Container Security Essentials David Benas, Associate Principal Consultant, Synopsys As the popularity of cloud-native applications continues to surge, containers are becoming the preferred option to package and deploy these applicatio... 3 weeks ago | 61 mins Essential Guidance for Taming Cloud Complexity via Unified Multicloud Management Mary Johnston Turner, Research Vice President at IDC Successful enterprises often rely on multiple cloud services to enable mission critical digital initiatives. Ensuring consistent performance, securit... April 20, 2023 4:00pm 7 Steps to Secure Your Kubernetes Cluster Pavel Chistikov, Kasten by Veeam Running and securing Kubernetes clusters in production is a complex process, but it doesn’t have to be. Join Pavel Chistikov at Kasten by Veeam who wi... 3 weeks ago | 57 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 2 weeks ago | 38 mins Cloud workloads: Best practices onboarding apps to a Kubernetes-based platform Paul Whiten, Red Hat; Manu Joy, Red Hat and Somnath Banerjee, Red Hat After deciding which cloud migration approach to take, you need to understand the nuances of the platforms that will be running your workloads. Kubern... 1 hour ago | 60 mins Shifting to a Zero Trust security model Emre Tezisci (Product Marketing Manager, Barracuda), Daniel Ekroth (CIO, Sparc Group) Join our webinar and discover how ZTNA can: Prevent unauthorised access to corporate resources and digital assets. Reduce your overall attack surface ... March 28, 2023 9:00am Load more