Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 5 Enterprise Kubernetes Trends Adam Bergh, Solutions Architect & Cloud Native Technical Partnerships, Kasten by Veeam; Matt Bator, Produc Adopting Kubernetes and running the platform to its fullest potential can be a bumpy road, but it doesn't have to be. Join Adam and Matt who will shar... March 29, 2023 11:30am Managing data protection: If you can't measure it, you can't manage it Pragyansmita Nayak, Ph.D, Chief Data Officer | Hitachi Vantara Federal An unspoken requirement has emerged calling for IT staff to conduct data management in a non-intrusive manner. Skipping risk mitigation to avoid inter... 4 weeks ago | 57 mins 5 Enterprise Kubernetes Trends Adam Bergh, Solutions Architect & Cloud Native Technical Partnerships, Kasten by Veeam; Matt Bator, Produc Adopting Kubernetes and running the platform to its fullest potential can be a bumpy road, but it doesn't have to be. Join Adam and Matt who will shar... 4 weeks ago | 49 mins Align Your Second Generation MAP With Your Digital First Buyer’s Journey Marianne S. Hewitt, Marketing Strategy and Technology Leader, The Growth Strategy Group Second generation Marketing Automation Platforms (MAPs) are not flexible enough with access to real time data to deliver the CX your customers deserve... 3 months ago | 35 mins The ROI of Low-Code Security Automation Ed Amoroso, TAG Cyber & Cody Cornell, Swimlane As the world’s leading security-forward organizations increasingly turn to low-code security automation, a new independent study from TAG Cyber reveal... March 23, 2023 6:00pm Public Key Infrastructure as a Service vs. Traditional PKI Alon Nachmany, Field CISO, AppViewX While Public Key Infrastructure (PKI) is fundamental to enterprise security, traditional PKI deployments are often complex, expensive and a burden to ... March 23, 2023 2:00pm Automating Intelligent Actions Based on Threat Intel Mark Bermingham, Mark Carosella This Lunch-and-Learn series highlights Cyware’s end-to-end approach to Threat Intel Management, automating ingestion, processing, dissemination, and o... 5 days ago | 31 mins Transform security operations with the ServiceNow platform Alex Cox, Director, product management, ServiceNow A brief demonstration of ServiceNow's Security Operations suite, illustrating how it can help get work done in security and beyond. Through the contex... 2 weeks ago | 18 mins Security Automation and The Evolution of SOAR with IDC Chris Kissel, IDC Security Products Research VP; and Cody Cornell, Swimlane Co-Founder and Chief Strategy Officer While first generation SOAR (Security Orchestration, Automation and Response) platforms promised the moon, they often failed to deliver for a variety ... March 28, 2023 4:00pm How to Integrate CI/CD Pipelines into Network Automation & Orchestration Morgan Stern, VP of Automation Strategy at Itential, & Joksan Flores, Solutions Engineer at Itential Network infrastructure has in most cases been managed using traditional, manually driven methods. This approach is poorly equipped to handle the widen... April 5, 2023 4:00pm Load more