Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Intel Partner event placeholder Sam Heiney, VP Product, Impero Software and Intel speaker TBC More details to come. June 8, 2022 2:30pm Automating the Machine Identity Management Lifecycle for TLS Certificates Anthony Lombardi Placeholder 8 months ago | 20 mins The Economic Advantages of TLS Certificates-as-a-Service Mark Sanders placeholder 8 months ago | 18 mins The Reality Of Software Defined Storage Peter McCallum, VP Datacenter Solutions Are you looking for freedom to choose or leverage the right storage infrastructure to match your business, operations, and budget? Would you like to b... 6 years ago | 58 mins How the Right Content & Delivery Strategies Double Demand Gen ROI John Steinert, the CMO of TechTarget, and Zak Pines, the VP of Marketing at Bedrock Data As the measurability of marketing campaigns has gone up, marketers have become obsessed with things like CPL and MQL. They’ve focused more of their bu... 5 years ago | 45 mins Houston, We Have a Problem: Sensitive Data Orbiting Your Business Mike Kiser, Sr. Security Strategist, SailPoint Similar to space debris, data is orbiting enterprises at an alarming speed and volume. Like many of the floating objects in space, much of this data i... 4 years ago | 28 mins Cloud security best practices for defending against APTs Tyler Moffitt | Senior Threat Research Analyst Year over year, newer and more inventive social-engineering techniques, such as watering hole attacks and spear phishing, are combined with malware at... 6 years ago | 43 mins 電力與自來水公司新一代的 SCADA 安全性 電力與自來水公司新一代的 SCADA 安全性 電力與自來水公司新一代的 SCADA 安全性 6 years ago | 47 mins Digitally Transform Your Enterprise with Low Code Andrew Murphy, EMEA VP, K2 Placeholder 4 years ago | 66 mins Remove Overhead and Complexity with Tunnel free SD-WAN Ritesh Mukherjee, Vice President Product Management at 128 Technology Removal of tunnels, reduction of bandwidth, end-to-end networking, instantaneous failovers and zero-trust security are superpowers that 128 Technology... 4 years ago | 57 mins