Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Tech Talk Series 5: Rapid Data Ingestion with Redis Enterprise Talon Miller, Technical Product Marketing Manager Virag Tripathi, Principle Field Engineer Vital data can end up locked in legacy databases because it seems too complex, time-consuming, and costly to unlock its full potential. Not with Redi... 1 week ago | 26 mins Top 5 Use Cases for Threat Intelligence Platforms (TIP) Mark Bermingham, Mark Carosella This Lunch-and-Learn webinar will highlight the key use cases for a modern Threat Intelligence Platform (TIP) and show live demonstrations of how Cywa... June 9, 2023 5:00pm Product Chat: Unpacking Abnormal's Latest Launch Nicole Jiang, Director of Product and Design and Vineet Edupuganti, Director of Product Management, Abnormal Security Protecting your collaboration apps, streamlining deployment, and expanding data ingestion to stop attacks now and in the future. While email remains ... 2 weeks ago | 31 mins Rapid Data Ingestion with Redis Enterprise Talon Miller, Technical Product Marketing Manager Virag Tripathi, Principle Field Engineer Vital data can end up locked in legacy databases because it seems too complex, time-consuming, and costly to unlock its full potential. Not with Redi... July 18, 2023 7:00pm Go from Continuous Delivery to Accelerated Delivery of your Digital Projects Shamim Ahmed, CTO from Broadcom, Jim Mercer, Analyst from IDC and Ramendeep Bhurjee, VP from Cigniti With digital transformations being the top-most priority for most enterprises today, it becomes mission-critical for technology strategists and practi... June 22, 2023 3:00pm TIP the Scales Through Effective Threat Intel Management Mark Bermingham, Dir. Product Marketing, Cyware; Mark Carosella, Sr. Solutions Engineer, Cyware Threat intelligence is only useful if you do something about it, but most conventional TIP products only collect feeds, leaving it up to security team... 1 month ago | 38 mins Automating Threat Intelligence Ingestion and Analysis Mark Bermingham, Mark Carosella This Lunch-and-Learn series demonstrates an end-to-end approach to Threat Intel Management, automating ingestion, processing, dissemination, and orche... 4 months ago | 18 mins Zero to SIEM in Seconds Sanjay Raja, VP Product Marketing and Solutions | Antony Farrow, Sr Director of Solution Architecture Improving threat detection, investigation and response within your SOC requires the ability to optimize, accelerate and improve the accuracy across fo... 1 month ago | 57 mins Building an Open Data Lake House Using Trino and Apache Iceberg Matt Fuller Co-Founder & VP, Product | Starburst & Tom Nats Director Customer Solutions | Starburst As companies build their data analytics practice, they quickly outgrow running analytics off their operational store that powers their applications. B... 2 months ago | 35 mins Scaling Media Delivery Workflows with bunny.net and Backblaze Pat Patterson, Backblaze Delivering content to your end users at scale can be challenging and costly. They expect exceptional web and mobile experiences with snappy load times... 3 months ago | 48 mins Load more