Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Getting to Know SASE: Part 1 Kevin Beaver, CIISP, Independent Information Security Consultant, Principle Logic LLC As CSO Online explains, “Edge is the concept that moves computing from a centralized model to a decentralized one, away from datacenter consolidation ... 2 days ago | 16 mins Empowering Sales Through Intent Seth Marrs, Research Director at Forrester and David Pitta, CMO at BrightTALK Your sales team is only as effective as the intelligence at its fingertips. Too many B2B tech sales organizations are leaving money on the table becau... July 21, 2022 4:00pm Getting to Know SASE: Part 1 Kevin Beaver, CIISP, Independent Information Security Consultant, Principle Logic LLC As CSO Online explains, “Edge is the concept that moves computing from a centralized model to a decentralized one, away from datacenter consolidation ... July 19, 2022 12:00pm Avoiding the pitfalls in securing Office 365 Andrey Dankevich, Senior Product Marketing Manager, Kaspersky; Ivan Salikhov, Product Manager, Kaspersky Phishing attacks often target business emails making effective security for Microsoft 365 absolutely vital. With Kaspersky Security for Microsoft Offi... 10 months ago | 45 mins How Salt Lake County Gained Visibility and Control of Distributed Endpoints Phil Bertolini - Senior Vice President, Events at eRepublic State and local government leaders were met with a series of unique challenges in delivering critical citizen services at the beginning of the pandemi... July 21, 2022 2:00pm Recommendation systems: From A/B testing to deep learning Uri Goren, Head of Recommendation, Argmax Recommendation systems got a lot of focus in recent times due to the increase in online shopping. Recommendation always goes hand in hand with measure... 1 week ago | 31 mins How to Build Trust Online Nicole Krug Most consumers go online to check out a business before they make a purchase and make snap decisions on a business's credibility based on what they fi... 3 months ago | 54 mins Redefining Cloud Security with Machine Identity Management Murali Palanisamy, Chief Solutions Officer, AppViewX Cybersecurity for a long time revolved around the central idea of the classic network perimeter, driven by the theory—inside is trusted and outside mu... July 19, 2022 4:00pm Best Practices - Office 365 & SharePoint Online Data Protection W. Curtis Preston, Chief Technical Evangelist, Druva Do you think the native capabilities of Office 365 are enough to protect your business? Would you bet your career on it? Hear from W. Curtis Preston... 2 months ago | 26 mins Everyone’s Online – Solve Voice and Video Issues Fast – EMEA Jay Botelho - Sr. Director of Product Management, Chris Bloom - Product Manager Are your users reporting that a specific application (or the internet in general) is slow, intermittent, or not functioning at all? Is the network bei... 5 months ago | 35 mins Load more