Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Criteria for Selecting the Right Threat Detection & Incident Response Solution Nick Cavalancia - Techvangelism | George Anderson - Secureworks | Cat Coode - Binary Tattoo | Dom Glavach - CyberSN.com Selecting the right threat detection and incident response solution for your organization can be overwhelming. From Endpoint Detection & Response (EDR... 3 weeks ago | 46 mins Cyber Security: One Problem, One Purpose, One Answer Jason Rivera, Director, Strategic Threat Advisory Group, at CrowdStrike On this session, Jason Rivera, Director, Strategic Threat Advisory Group, at CrowdStrike will share his perspective on how to detect, react and remedi... February 16, 2023 10:00am Up-Level Your Network to Enable Remote Work, Clouds, and the New Edge Chris Taylor Applications are increasingly in the cloud and users are accessing them from home, in the office, or on the road. SD-WAN and SASE can connect these di... February 2, 2023 4:00pm Improve Network Security, Reliability, and Hygiene with Unprecedented Visibility Scot Wilson and Kevin Kuhls, Technical Solutions Architects, Forward Networks Enterprise networks are comprised of tens to hundreds of thousands of devices from dozens of vendors running billions of lines of code across a hybrid... 5 days ago | 51 mins Building a Dynamic Network Infrastructure Babu Peddu at Intel, Sven Freudenfeld at Lanner, and Kevin Austin at NoviFlow This webinar will provide an overview of the benefits of implementing SRv6 in a telecoms network and the advantages of deploying such a solution: prov... February 7, 2023 4:00pm Key Findings from 2022 Data Threat Report – Financial Services Edition Eric Hanselman, Chief Analyst, 451 Research; Marcelo Delima, Global Solutions Marketing Manager, Thales Financial services firms are typically ahead of other industries in cyber defense maturity due to their highly regulated nature. However, advanced sec... February 2, 2023 4:00pm Why VMware Horizon is the Best Alternative to Citrix Gabe Knuth, Sr. Product Line Marketing Manager Desktop and app virtualization is more critical to businesses than ever before, and with all the recent news around Citrix, it’s understandable if you... February 9, 2023 4:00pm Best Practices on Web Application Security and Demo Christian Treutler and Ashutosh Gupta | VMware This session is a practitioner’s favorite - build and deploy web application security for multi-cloud and microservices architectures while minimizing... 1 week ago | 60 mins Prevention is Key: Defining a Proactive Security Strategy Dave Gruber - Principal Analyst at ESG and Arun Krishnamoorthy, Senior Director of Product Management at Dell Technologies A successful security strategy requires vigilance, but organizations may be spreading their IT teams too thin. Enterprise Strategy Group has recently ... 1 week ago | 46 mins Tackle scale & complexity in your edge deployments Carlos Torres, EMEA Edge Go to Market Specialist, Red Hat | Joachim von Thadden, EMEA Specialist Solution Architect, Red Hat At Red Hat, we see edge computing as an opportunity to extend the open hybrid cloud all the way to the data sources and end users. Edge is a strategy ... 2 weeks ago | 28 mins Load more