Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date dataBelt® – A complete managed service for Security Certificates Matt Smith How many of you have experienced a service outage due to an expired security certificate? It’s probably more suitable to ask who hasn’t been impacted ... 1 week ago | 15 mins When CDNs Fail: Staying Online with an Origin Shield Thijs Feryn, Technical Evangelist, Varnish Software If your CDN fails, your website drops offline, taking your audience and revenue with it. In this webinar we’ll show how an origin shield can save yo... 6 months ago | 47 mins From Reactive to Proactive: Building a Synthetic Monitoring Practice Billy Hoffman - Sr. Principal Engineer, Splunk Many organizations already use synthetic performance monitoring to measure service uptime and alert on availability issues. However Synthetic monitori... 4 months ago | 59 mins Prevent Cyberattacks: Third-Party Risk Management Tony Howlett, SecureLink's Previous CISO Cyber attacks from nation-state actors and their proxies are on the rise. Many of these attackers seek a broader scale to do more damage than simply d... 7 months ago | 59 mins Why retail observability is a key ingredient for digital transformation? Digitate’s Vikas Kalra, Global Product Manager and VS Joshi, Global Head of Product Marketing Traditional infrastructure monitoring that simply monitors databases, servers, network, and other infrastructure components is just not enough! Reta... 2 months ago | 35 mins The Successful Six: Securing Your Data with OpenEdge Replication + Transparent D Marv Stone, Principal Sales Engineer, Progress Securing your data is a top priority, and the first session in our “successful six” series dives into why. See how you can secure your data without ne... 3 years ago | 38 mins Simplify and Modernize your Public Key Infrastructure (PKI) Murali Palanisamy, Chief Solutions Officer, AppViewX Is your organization using weak keys? Organizations using weak keys or vulnerable web servers are easy targets for hackers. However strange it might s... 9 months ago | 37 mins The Website Resiliency Imperative Andy Lawrence, Vice President at 451 Research, Engin Akyol, CTO of Distil Networks, and Scott Hilton, VP & GM Product Develop Many posit that cloud architectures/business models will bring about a more patient, gradual availability model, where failures are either rendered un... 5 years ago | 53 mins How United Guarantees High Availability of Critical Applications with DR Testing Marian Lakov, IT Architect, United | Hetal Petal, Systems Engineer, Zerto The best way to plan for a disaster or outage is to have rock-solid tests that prove your IT and operational readiness. But from workflows to storage ... 3 years ago | 54 mins How to cut downtime 50% with this Fortune 500 strategy Rene Neumann, EU Solutions Engineering Manager at ZPE Systems & Jim Wilson, VP of Sales & Customer Success at ZPE Systems Edge network downtime means business downtime — and plenty of costs to go with it. At $5,600 per minute offline, companies large and small need to pin... 2 years ago | 29 mins