Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Workshop: Troubleshooting Tips & Techniques for Cloud Monitoring and Security Andy Idsinga: Sr. Cloud Architect & Ron Stein: Dir Product Marketing at cPacket Service assurance, application monitoring and cloud security rely on network visibility across the board in a hybrid cloud and multicloud environment ... 3 months ago | 63 mins Monitoring & Logging on AWS James McMillan, Cloud Engineer at Onica Join us to learn about the various AWS Monitoring and Logging services, and how they can help you with customer experience, performance, cost, and ove... 2 years ago | 43 mins How to Build a Threat Hunting Capability in AWS Shaun McCullough, SEC545 Cloud Security Architecture | David Aiken, Solutions Architect Manager, AWS Marketplace Do you know how to build an effective threat hunting program in your AWS environment? In this webinar, you will learn how threat hunting differs from ... 2 years ago | 53 mins How to Build a Threat Hunting Capability in AWS Shaun McCullough, SEC545 Cloud Security Architecture | David Aiken, Solutions Architect Manager, AWS Marketplace Do you know how to build an effective threat hunting program in your AWS environment? In this webinar, you will learn how threat hunting differs from ... 2 years ago | 53 mins How to Build a Threat Hunting Capability in AWS Shaun McCullough, SEC545 Cloud Security Architecture | David Aiken, Solutions Architect Manager, AWS Marketplace Do you know how to build an effective threat hunting program in your AWS environment? In this webinar, you will learn how threat hunting differs from ... 2 years ago | 53 mins AWS Masterclass | Amazon EC2 Danilo Poccia "Masterclass" è una serie di webinar in cui diversi servizi AWS sono presentati in modo approfondito dal punto di vista tecnico. Durante questa sessi... 7 years ago | 77 mins AWS CloudTrail Deep Dive Sivakanth Mundru, Product Manager, AWS CloudTrail Ever wondered how can you find out which user made a particular API call, when the call was made, and which resources were acted upon? In this session... 6 years ago | 38 mins Cloud Standards - Ready for Prime Time Michel Drescher, EGI; Alan Sill, OGF, Texas Tech University; Alex McDonald, NetApp; David Wallom, Oxford e-Research Centre Cloud computing will not reach its full potential without the full development and stable management of standards. Customers expect the freedom of cho... 7 years ago | 54 mins Modernizing your SOC for the Cloud Age Starts with Security Foundations Dimitri McKay, Principal Security Specialist, Splunk | Taylor Williams, Professional Services Director, Zivaro When all data is security-relevant, it’s difficult to know where to start. Getting started requires decisions, but without quality data you’re simply ... 2 years ago | 74 mins Why Advanced Monitoring is Key for Healthy Enterprise Deployments Pablo Alvarez The use of Data Virtualization as a global delivery layer means that Denodo is a critical component of the data architecture. It cannot fail, needs to... 3 years ago | 56 mins Load more