Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Bye Login, Hi Unlock: FIDO2 WebAuthn Goes Biometric Miguel Fersen, Senior Cloud Consultant GlobalDots ; Eli Arkush, Senior Solution Engineer, Transmit Security Come 2022, online businesses like retail, entertainment & consumer finance, are under increasing pressure: Competition is fierce, and cyber threats ri... 1 week ago | 52 mins Enterprise Data Center Migration: Challenges & Remedies Beshoy Halim, Senior Solutions Engineer, GlobalDots Cloud Computing service will: - Enhance your performance and improve fault tolerance - Boost application availability and reliability - Lower your c... June 1, 2022 9:00am The State of the Phish 2022: An In-Depth Exploration of User Awareness Andy Rose, Resident CISO, and Gretel Egan, Security Awareness Consultant, Proofpoint Join us for a live discussion of our eighth annual State of the Phish report. We will explore user vulnerabilities from multiple angles and look at cy... 1 month ago | 63 mins Improving Quality Control and driving Sustainability with Computer Vision and AI Lorenzo Veronesi, Associate Research Director, IDC Yves de Beauregard, Head of Global Incubation Solutions, Fujitsu Today, manufacturers face urgent needs to increase efficiency, reduce wastage, minimize recalls – and on top of that, make the end-to-end process more... 2 months ago | 41 mins Multi-Cloud Networking and Security with the Modern Network Venky D. - Director of Product Management VMware, Ben F. - Lead Architect William Hill, Ranga. - VP Chief Architect VMware Application environments today, in public and private clouds, aim to improve end-user experience, developer agility and IT service delivery. However, ... 2 months ago | 25 mins Is Microsoft 365 the attackers new playground? Matt Cooke & Brandon Warren, Senior CyberSecurity Strategists, Proofpoint Driven by Microsoft 365, digital transformation is remaking every aspect of modern business. Many organisations are moving to a 'cloud first' model, b... 3 months ago | 40 mins Top 5 IBM i & IBM Z Automation Best Practices Andrew Simpson, Principal Solutions Specialist at Rocket Software While improving productivity across the organization is an ongoing pursuit, when it comes to IBM i and IBM Z applications, you often find it ends up o... 4 hours ago | 37 mins Why Work-from-Anywhere Requires Secure Modern WANs Carrie Goetz, StrategITcom, LLC; Rami Rammaha, Fortinet & Salvatore Salamone, Network Computing For decades, enterprises have searched for networking solutions that would provide remote workers and distributed offices with secure and reliable con... 3 days ago | 58 mins How to Secure Hybrid Cloud Workloads with GCP Network Connectivity Center Matthew Iakhov, Solution Engineering Manager at Versa Networks Variations in security controls across different clouds multiply the risk of data breaches. Very limited dynamic routing intelligence in a cloud infra... 1 day ago | 59 mins IBM Z Master Class: Top 5 IBM Z Automation Best Practices Andrew Simpson, Principal Sales Engineer, Rocket Software Improving productivity across the organization is an ongoing pursuit. However, when it comes to IBM Z® applications, you often find it ends up out of ... 1 day ago | 44 mins Load more