On Demand
Join the editors of Redmondmag.com, Virtualization & Cloud review and AWSinsider.net will bring together independent cloud and security experts that will cover best practices for managing and securing your modern hybrid cloud infrastructure. Register today!
The public's fascination with this particular generative AI application notwithstanding, the most significant impact of this category of technologies is likely to occur behind the scenes in both industrial and edge applications. Learn more.
From supplementing Azure AD/Active directory to new approaches with Zero Trust and Continuous Adaptive Risk and Trust Assessment (CARTA) to compliance issues, you'll get real-world advice and best practices you can implement right away to get your enterprise secure with IAM. Don't miss it!
Yesterday’s directory services are becoming increasingly obsolete and cloud based Identity management seems to be the way forward. If not managed properly however, these systems can quickly become unwieldy. Join this session to learn best practices strategies for managing identities in the cloud and keeping things from getting out of hand.
Identity misuse is involved in virtually every successful cybersecurity incident. Because of this, Identity Threat Detection and Response (ITDR) has emerged to encompass the tools and processes that protect identity infrastructures. When combined with XDR (eXtended Detection and Response), this joint solution is the most modern, effective, and efficient approach to protect against cyber adversaries. Join SentinelOne and Gartner for a webinar as we address current adversary techniques driving the need for combined XDR and ITDR, and best practices for implementation.
In this Tech Talk, industry expert Paul Nicholson talks with veteran technology journalist John K. Waters about meeting this vexing challenge and the conversation will cover building a better hybrid cloud operating model. Learn more!
Join this session to learn different considerations on how to best keep large organizations aligned on a hybrid cloud strategy and best practices for working with multicloud environments.
Please join us in this session as we discuss several best practices and patterns that will make your application ready for the cloud and ready for DevOps. We'll discuss CI/CD, Microservices, Security Vulnerability checks, and more!
Join this this free, half-day summit covering what's new in application architecture best practices and learn some real-word advice for implementing these best practices. Make sure you're caught up and your apps can be everything they should be -- sign up today!
In this session we’ll explore some of the available architectures and talk about how applying best practices in building software benefits everyone across the enterprise.
Join our webinar for an in-depth look at what this strategy entails and its key objectives. We'll also explore how you can create a Zero Trust environment in your organization to keep threats at bay.
In this webinar, we will discuss the challenges of continuous event monitoring, triaging, and incident response in the Microsoft Sentinel service offering. We will cover best practices for configuring Microsoft Sentinel services to exceed industry standards and provide strategies for 24/7 incident response services. Learn more!
Register for this Coffee Talk to learn the biggest threats hitting enterprises right now, the latest developments in AI-powered threat detection, and the steps you need to take to make sure your data is kept safe from attackers. Sign up today!
Don't miss this free half-day summit, where the editors of Redmondmag.com, Virtualization & Cloud review and AWSinsider.net will bring together independent cloud management and security experts that will cover modern best practices for managing and securing your modern hybrid cloud infrastructure in 2023.
In this webinar, we'll share how ManageEngine AD360 helps you be compliant. Learn how NIST has evolved to keep up with the changing cybersecurity landscape, the cost of non-compliance while dealing with federal data, and more.