Security news and support resources, featuring the hottest solutions, technologies and vendors in the Security world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Security

Security

VMware Cloud on AWS – AWS Technical Deep Dive Video

Amazon Web Services
What are the best practices for incorporating VMware Cloud on AWS into your existing architectures? You’ll learn about design considerations for integrating your Software Defined Data Centers (SDDCs) with native AWS services, and hear how VMware Cloud on AWS helps leverage your existing investments while providing the scalability, agility and security of AWS. Architects, system […]

Citrix Synergy TV Video – Secure content collaboration with ShareFile and the secure digital perimeter

Citrix Systems
Citrix Synergy TV – SYN217 – Secure content collaboration with ShareFile and the secure digital perimeter Cloud content platforms are increasingly becoming the preferred solution of end users; however, this creates challenges for IT as they struggle to maintain security and leverage their existing infrastructure. Citrix ShareFile integrates with the secure digital perimeter (SDP) framework […]

Citrix Synergy TV Video – A software-defined approach to managing and securing the endpoint

Citrix Systems
Organizations savvy about endpoint management know that software thin clients and desktop conversion software can help reduce the cost of virtual desktop deployments. However, they may not be aware that a software-defined approach to managing endpoints is now paving the way for greater security and mobility in the enterprise, laying the foundation to support emerging […]

Citrix Synergy TV Video – Discover the NetScaler ADC and AWS advantage

Citrix Systems
Learn how NetScaler can take your AWS deployment to the next level by delivering the benefits of the cloud with the centralized control and security inherent to on-premises deployments. In AWS environments, NetScaler goes beyond basic load balancing and optimization functionality to deliver high application uptime and greater performance with enterprise-grade security and scalability. But […]

Citrix Synergy TV Video – Realize your future today with Cisco technology

Citrix Systems
Digital transformation continues to impact the future of work for everyone. Cisco technologies are at the core of modern architectures that bring advances in productivity and security. Attend this session for the latest on Cisco’s compute platforms including the award-winning hyperconverged solution, HyperFlex. You will hear Cisco’s latest announcement for HyperFlex, see a demo highlighting […]

Citrix Synergy TV Video – Secure Mail: the best enterprise-grade email app

Citrix Systems
Email is still the #1 killer app used by enterprises. Learn how Secure Mail provides a business-optimized experience without compromising on enterprise security. This session will provide demos and focus on unique capabilities that increase employee productivity. Note: This session will be available for on demand viewing post-event on Citrix Synergy TV. This video is […]

Microsoft: This is SO cool! Use Azure AD to login to Azure Linux virtual machines

Microsoft
Linux virtual machines are very popular in Azure. A challenge everyone faces is securely managing the accounts and credentials used to login to these VMs. Typically, people create local administrator accounts and use either SSH keys or passwords to login to the VM. As people join or leave teams, new local accounts need to be […]

Veeam DataLabs Overview

Veeam
The ability to back up your data and recover is one thing, but let’s also consider the opportunity to leverage that backup data or even the ability to leverage the investment you made further with your production storage. Enabling other parts of your business to benefit from that data is even more important as we […]

Next Generation Security – AWS Technical Deep Dive Video

Amazon Web Services
In this session we will explore the current financial regulatory landscape and future compliance trends. We will dive deep on to how to leverage AWS services to implement next generation security and compliance at scale. The session will be delivered by Myles Hosford, APAC Security Solution Architect, and James Wilkins, Lead of the Cloud Task […]

Best Practices for Cloud Security in the Cloud Adoption Journey – AWS Technical Deep Dive Video

Amazon Web Services
Organizations are migrating their on-premise data center and application environments to public cloud to accelerate digital business. AWS enables agility and elasticity for digital workloads and DevOps teams, but the expanded digital attack surface across the hybrid cloud needs to be protected in order to ensure secure interactions and data. We discuss best practices for […]

Microsoft: Are My RDP Connections Really Secured by a Certificate?

Microsoft
Hello everyone! Tim Beasley – Platforms PFE coming at you live from the funky fresh jam known as LAS VEGAS! That’s right people! I’m having a blast by the pool at the MGM Grand and loving life!! …writing a blog post for Microsoft. At Vegas. In the sun poolside…writing…a…technical blog post…what’s wrong with me?! Okay […]

VMware: Provision and Manage Kubernetes Clusters as-a-Service using vRealize Automation and Pivotal Container Service

VMware
Pivotal Container Service (PKS) aims to simplify how enterprises deploy, run and manage Kubernetes clusters on any cloud. Download the release from PivNet. Every enterprise wants to run containers in production. However, primary questions being asked are: “How do I get Kubernetes to work in my data center? How do I simplify deployment of kubernets clusters? […]

Citrix: How to Easily Host a Multi-Auth Landing Page on NetScaler Gateway

Citrix Systems
This blog post will show you how to create a NetScaler Gateway that will host a simple landing page that can provide access to Gateways with different authentication options. Below is an example landing page that specifies smartcard as the main authentication method and RADIUS with username/password for users who have an exception. I know […]

Damage Limitation for Cyber-Attacks Achieved through Business Continuity offered by Software- Defined Storage:

DataCore
Three months ago in a candid interview with The Guardian newspaper, Ciaran Martin, head of the Government’s National Cyber Security Centre, warned of an imminent cyber-attack on UK infrastructures. Given that the Government itself set up NCSC, (the front window for the GCHQ government surveillance agency), receipt of such a gloomy warning in itself was […]

Visit Our Sponsors

Close