Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to maintain security in a hybrid work environment Thomas Wingfield, Product Marketing Manager & Molita Sorisho, Product Marketing Mngr & Sanjay Khanna, Product Manager @ Webex Security is paramount today. With people now working from everywhere, your risk surface has expanded. Even if your databases and networks are protecte... 1 day ago | 30 mins Unlock the Benefits of HPC Cloud for Compute- and Data-Intensive Workflows Wolfgang Gentzsch, President & Co-founder, UberCloud If you are in the middle of your corporate digital transformation journey, and you are aiming to also include your High-Performance Computing (HPC) en... 4 days ago | 47 mins Security Resilience in a Hybrid World Sean Earhard, Director of Sales Business Development, Cisco and Krystal James, Sales Business Development Manager, Cisco Security resilience is confronting a new world where everyone and everything is connecting. Businesses are operating as integrated ecosystems with bou... 2 days ago | 23 mins Secure SD-WAN: Connect and protect your hybrid work to multicloud applications Steve Harrison, TME Manager, Meraki. Prashant Tripathi Chief Architect SD-WAN, Viptela In a hybrid environment with data everywhere, delivering secure access to applications and data is your most critical challenge. What does it take to ... 1 week ago | 60 mins A New Approach for Observability in Kubernetes Environments Robert Castley, Staff Sales Engineer EMEA at Splunk While Kubernetes abstracts away many infrastructure complexities enabling DevOps teams to move faster and scale efficiently, it also introduces new op... July 4, 2022 12:00pm Keep Your Avid Environments Safe from Ransomware with Wasabi and Marquis Paul Glasgow, Managing Dir., Marquis; Simon Fearn, Product Mgr., Marquis; Ben Bonadies, Solutions Marketing Mgr., Wasabi Despite growing public awareness, ransomware has continued to wreak havoc on businesses around the world, and media and entertainment companies are no... 3 days ago | 38 mins 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... July 7, 2022 9:00am Trends in Cloud Security: Key Findings from the 2022 Thales Cloud Security Study Eric Hanselman, Principal Research Analyst, 451 Research; John McNeice, Research Analyst, 451 Research Businesses across the globe are accelerating the shift to the cloud in a modern digital world where hybrid workforces are accessing data from anywhere... 1 week ago | 50 mins Securing & Safeguarding User Experience for Hybrid Work and Cloud Transformation Mark Leary of IDC and Paul Kao of Broadcom Software Organizations are seeking new, more efficient ways to deliver secure, flexible solutions to their employees, partners and customers. This often means ... 23 hours ago | 55 mins New Collaborative Work Management Features Ming Cheung, Sr Consultant, Broadcom Come check out the new Collaborative Work Management features in Clarity 16.0.2. In a quick overview, we'll take a look at the to-do checklists and ho... 1 day ago | 53 mins Load more