Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Varnish Configuration Language (VCL), the language that powers Varnish Cache Thijs Feryn, Tech Evangelist, Varnish Software Varnish is the world's most powerful and flexible HTTP cache that is used to accelerate more than 10 million websites globally. A big part of its attr... February 21, 2023 4:00pm Overcoming Kubernetes Container Access and Scalability Challenges Brian O'Sulivan, Cloud Director of Product Management - Gigamon + Naveed Cochinwala, Distinguished Engineer - Gigamon To eliminate East-West blind spots, you must be able to acquire and inspect Kubernetes container traffic. We’ll start by explaining the fundamentals o... February 15, 2023 12:00am Back to Business for China & 2023 Outlook Brendan Ahern, Xiaolin Chen 2022 ended on a high note. China removed its zero-COVID policy, and the Public Company Accounting Oversight Board (PCAOB) announced that it had secure... 4 weeks ago | 78 mins Overcoming Kubernetes Container Access and Scalability Challenges Brian O'Sulivan, Cloud Director of Product Management - Gigamon + Naveed Cochinwala, Distinguished Engineer - Gigamon To eliminate East-West blind spots, you must be able to acquire and inspect Kubernetes container traffic. We’ll start by explaining the fundamentals o... 1 month ago | 32 mins Create new automation content more quickly and easily Colin McNaughton, Red Hat; Dylan Silva, Red Hat and Brad Thornton, Red Hat With automation, processes that used to take days and hours can be done much more quickly. As automation expands, the benefits become dramatic. Becaus... 4 weeks ago | 61 mins Increasing your visibility through ESET Inspect James Rodewald, Security Services Team Lead @ESET ESET Inspect allows advanced visibility and traceability into how the threats that are stopped by ESET’s many layers of protection arrived on your end... 7 months ago | 17 mins Increasing your visibility through ESET Inspect James Rodewald, Security Services Team Lead ESET Inspect allows advanced visibility and traceability into how the threats that are stopped by ESET’s many layers of protection arrived on your end... 8 months ago | 17 mins Using File Analysis to Identify and Respond To Unknown Malware Isaac Dvir, Hallgrímur Björnsson, and Finnbogi (“Bimbi“) Finnbogason, R & D Team at Cyren Upwards of 20% of files not detected by AV engines turn out to be malicious. Because sandbox analysis is slow and expensive, organizations are forced ... 5 months ago | 38 mins Data Accuracy for Turbocharging Your Network Performance Monitoring Josh Joiner - Solutions Engineering and Support, Iain Kenney - Senior Director and Head of Product Management Get the best practices for: -- what to consider when building your network infrastructure --analyze and inspect all the packets going through your net... 1 year ago | 35 mins Data Accuracy for Turbocharging Your Network Performance Monitoring Josh Joiner - Solutions Engineering and Support, Iain Kenney - Senior Director and Head of Product Management Get the best practices for: -- what to consider when building your network infrastructure --analyze and inspect all the packets going through your net... 1 year ago | 35 mins Load more