Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Advanced IT Operations with Device42 Device42 If you've already explored the basics of using Device42 and would like to learn more about how to leverage it across IT Operations, this webinar is fo... 6 months ago | 28 mins Rise of the Zombie Army - A Study of Botnets Ronan Lavelle, General Manager EMEA, Zenedge From Haitian folklore to George A. Romero’s Dawn of the Dead, the use of Zombies in fictional settings has experienced a strong resurgence in recent y... 5 years ago | 36 mins Quest Foglight Evolve - Get More From your Infrastructure Resources and Capacity Andy Lawrie No IT environment is without its share of zombie VMs, excess storage or other under-utilized resources that can be re-allocated, re-claimed or retired... 1 year ago | 29 mins Foglight Evolve - Holen Sie mehr aus Ihren Infrastruktur-Ressourcen heraus Meik Kimmel, Edwin Stuiver Eine IT-Umgebung ohne Zombie-VMs, überschüssigen Speicher oder andere nicht ausgelasteten Ressourcen, die neu zugewiesen, zurückgefordert oder stillge... 1 year ago | 43 mins Avoiding the Dark Cloud: How to Banish Zombie Resources and Vampire Instances Todd Bernhard, CloudCheckr Product Marketing Manager Of course, there are no such things as monsters. But Zombies (unattached, unused, and idle resources), Giants (wrong-sized resources), and Vampire Blo... 4 years ago | 28 mins Data loss due to human error - Stop the zombie apocalypse David Lacey, leading researcher in Cybersecurity; Paul Castiglione, Secure File Transfer Advocate, Ipswitch Implementing Compliance Controls for Data Protection in Regulated Industries Securing protected data and meeting data privacy compliance demands are... 6 years ago | 54 mins 2 Minutes on BrightTALK: Organized Security Josh Corman, Director of Security Intelligence, Akamai "The most important tip for surviving the zombie apocalypse, so to speak, is choosing and procuring defensible infrastructure." Josh Corman, Director ... 9 years ago | 3 mins Device Fingerprints Rachel Holander, Roi Paz Learn about different types of device fingerprints and how to manipulate them to ensure you never get blocked when crawling websites. - Introduction ... 3 years ago | 27 mins Tying the Bot – The Marriage of Botnets and DDoS Rakesh Shah, Director of Product Marketing Whether it’s zombie computers that have been infected or attacks from the likes of Anonymous where groups of individuals intentionally download attack... 10 years ago | 43 mins Be Inspired Series (#2) Various The BCMA ‘Be Inspired Series’ showcases the best of branded content from around the globe. The campaigns featured in our latest show reel include rece... 8 years ago | 3 mins Load more