438 Results Found
We are collectively generating terabytes and petabytes of data on a daily basis. Today’s organizations and governments worldwide need data curators to help sift through that random data and tease out unique insights and actionable information.
In this presentation, CompTIA’s Dr. James Stanger will provide case studies and examples describing how zero trust is implemented in the private and public sector. Dr. Stanger will outline discussions he has had with industry leaders from Google, NIST, and other organizations worldwide who have led the way in successful zero trust implementations. He will outline the best practices and technologies necessary to build next-level networks.
With the increase in number of devices, technologies, platforms and systems we use in our networks today, either they are for security, voice, routing, collaboration, data center or enterprise, we need something to make life easier and automate configurations for us.
CCNP Security (Cisco Certified Network Professional Security) personnel manages security in Routers, Switches, Networking Devices, and appliances The certified professional is responsible for configuring, supporting, and resolving Firewalls, VPNs, IDS/IPS and content security solutions for their networking environment.
This forty-five minute webinar will help you prepare to write the VCP-DCV 2021 VMware exam (2V0-21.20). In addition to a Q&A session, the webinar will cover tips and tricks that cover the key exam objectives. View the slides
When the agile movement first saw broad adoption, there was tremendous success at the team level. It didn't take long for large organizations to run into challenges seeing that same type of success in larger, more complex initiatives. This presentation is an introduction to the expanded principles of agility intended to harness the effectiveness of agile teams and bring better organizational alignment to larger efforts built upon the effectiveness of highly agile teams.
CCNP Security (Cisco Certified Network Professional Security) personnel manages security in Routers, Switches, Networking Devices, and appliances The certified professional is responsible for configuring, supporting, and resolving Firewalls, VPNs, IDS/IPS and content security solutions for their networking environment.
Value stream mapping can be a dramatically transformational event – expanding empathy across teams, sharing points of view, and solving gaps in understanding which may be robbing everyone of productivity. This webinar will quickly equip attendees with a high-level understanding of value stream mapping and will teach practical tips on how to run a value stream mapping exercise within their teams and organizations.
As the sophistication, stealth, and frequency of cybersecurity threats continue to increase, the complexity of attacks means every organization needs security expertise before, during, and after an attack. For this reason, the demand for cybersecurity operations (CyberOps) personnel keeps going up.
Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This live webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment.