Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Reference Designs for Application Security in Kubernetes - Ep 13 Fabrizio Fiorucci - Solutions Architect, F5 and Philippe Cloup - Senior Solutions Architect, F5 Kubernetes has become the de facto platform standard for modern applications. While it provides tools and capabilities to control network and applicat... 1 day ago | 57 mins Your Data. Your Responsibility. Protect Microsoft 365 with HPE and Veeam Christophe Bertrand, ESG | Parissa Mohamadi, HPE | Christopher Donohoe, Veeam With data at the heart of your organization, it’s essential to ensure that Microsoft 365 data is protected, recoverable, and accessible. Together, HPE... 1 week ago | 32 mins Uniting Security Operations: How Gigamon Democratizes Security Intelligence Fayyaz Rajpari, Senior Director, Product Management - Gigamon When it comes to cybersecurity, how do you “connect the dots between the ops” — NetOps, CloudOps, DevOps, and SecOps — so everyone gets the valuable s... March 2, 2023 6:00pm Closing the Security Gap on SaaS Applications Ryan Hosken, Senior Solutions Consultant, OpenText Security Solutions ANZ Backup and protect data on Microsoft 365, Google, Salesforce, Dropbox & Box platforms The average business uses dozens of third-party SaaS application... 4 weeks ago | 28 mins Closing the Security Gap on SaaS Applications Ryan Hosken, Senior Solutions Consultant, OpenText Security Solutions ANZ Backup and protect data on Microsoft 365, Google, Salesforce, Dropbox & Box platforms The average business uses dozens of third-party SaaS application... 2 months ago | 28 mins Responsible Compliance for Cloud Security Manik Garg, Compliance Product Owner, Adobe When moving to the cloud, people often rely on their cloud service provider (CSP) for security and other baseline configurations, assuming that the cl... 2 months ago | 22 mins STRONGER 2022: Why Cybersecurity is Now a Shared Responsibility STRONGER 2022 In this STRONGER keynote, hear from leaders in technology, cybersecurity, and corporate responsibility as they dive into the ubiquitousness of informa... 3 months ago | 53 mins Best Practices for Securing Public Cloud Platforms with CrowdStrike & AWS [NAM] Merritt Baer (Principal, Office of CISO, AWS), David Puzas (Sr. Product Marketing Manager, CrowdStrike) Before the rise of cloud computing, enterprises could expect to be responsible for securing the systems in their data centers, their applications — ev... 2 months ago | 49 mins Best Practices For Securing Public Cloud Platforms With CrowdStrike And AWS Merritt Baer (Principal, Office of the CISO, AWS), David Puzas (Sr. Product Marketing Manager, Cloud Security, CrowdStrike) Before the rise of cloud computing, enterprises could expect to be responsible for securing the systems in their data centers, their applications — ev... 4 months ago | 49 mins Demystifying Kubernetes Network Security Richard Meeus, Director of Security Technology and Strategy, Yuval Goldberg, Senior Manager, Product Management, Akamai As Kubernetes (K8s) catches on and becomes a staple in almost any datacenter, it is more important than ever to understand the network security bounda... 5 months ago | 46 mins Load more