logicworks
In this 10-minute webinar, get an overview of the latest infrastructure-as-code (IaC) tools, including AWS CloudFormation, Service Catalog, Terraform, and Sparkleformation, and learn how to automate and secure self-service catalogs of templates. Our veteran DevOps engineer and AWS Certified Professional, Alex Opsina, will talk about why you need IaC and how to implement it on AWS.
Watch Now
Denodo
What started to evolve as the most agile and real-time enterprise data fabric, data virtualization is proving to go beyond its initial promise and is becoming one of the most important enterprise big data fabrics.Attend this session to learn:What data virtualization really is,How it differs from other enterprise data integration technologies,Real-world examples of data virtualization in action from companies such as Logitech, Autodesk and Festo.
Watch Now
Cohesity
Data growth is driving storage complexities. Majority of today’s enterprise secondary storage infrastructure is fragmented and inefficient that contains dark data. To address growing data requirements and support modern applications, Gartner predicts that "By 2021, more than 80% of enterprise data will be stored in scale-out storage systems in enterprise and cloud data centers, up from 30% today.” Watch this webinar to learn how Cohesity is simplifying file and object storage on a hyperconverged, scale-out solution, and how Manhattan Associates (NASDAQ - MANH) leveraged Cohesity to consolidate their secondary storage workloads on a single platform.
Watch Now
OPSWAT
Air-gapped and isolated networks shine in certain cyber defense situations where very high levels of protection are required. Their main advantage is that they greatly reduce the attack surface and even make many attack types unfeasible. This webinar discusses air-gapped and isolated networks, their strengths and weaknesses, and covers one of the most critical defense measures that is required in isolated networks, the media security station or kiosk and discusses best practices in employing "kiosks" as a critical part of an isolated network defense strategy.
Watch Now