The seven deadly sins of multi-cloud
– The dos, don’ts and other dangers
If you are currently struggling with your multi-cloud implementation, or if you are still at the planning stages, tune it.
Mis-behaving: the Evolution of the Insider Threat
– Dealing with the undesirable emergence of rogue behaviours
We speak to experts from LogRhythm, a security intelligence company that produces SIEM and UEBA products, and security industry analyst firm Freeform Dynamics
Putting the privilege back into access management
– How hard can it be?
If you’re looking at how to manage accounts on a by-privilege basis, or you want to get your head your access management demons; tune in.
Five Steps To Level Up Your Threat Intelligence Management
– Keep on top of IT security threats
Deploying a threat intelligence capability is more than just collecting data feeds and linking them into Security Incident and Event Management.September 2018
Using Open Source Libraries to Speed Development Whilst Minimising Risk
– The state of open source security in DevOps
Better, faster, cheaper… these are the promises of DevOps. But then comes security, which requires a level of assurance.September 2018
Following Bottomline’s journey to the Hybrid Cloud
– Learn where Hybrid Cloud can take you
In this Webinar, we speak to Peter Marshall, head of infrastructure at Bottomline, about the company’s adoption of hybrid cloud, its highs and lows, revelations and gotchas. Nutanix will share the wider industry view, as well as their design and build expertise, and our very own Jon Collins will guide the conversation and throw in the jokes.August 2018
Moving beyond SQL
– Deliver the Personalized, Responsive Experiences Customers Crave
In many situations, a datastore based around NoSQL may hold the key — but there is no one-size-fits-all.June 2018
Is all flash ready to be the data center default?
– Let’s look under the covers of a modern system to find out
As costs have come down, and efficiency, resilience and flexibility have increased, should you now choose all flash unless there’s a good reason not to?May 2018
IT as a platform for business success
– Delivering on the dream
No IT environment is an island. You’ve done what you can to manage your core applications and services, things are running relatively smoothly but you’ve reached the point where there’s not much more efficiency you can gain.March 2018
Breaking the storage bottleneck
– How NVMe enables the real-time business
If you are looking for new ways to process data rapidly, mine the data mountain and want to know what NVMe can deliver in response, tune in to this conversation.December 2017
Delivering an enterprise cloud architecture
– It’s about process, says someone that wears the t-shirt
If you are working through the process of delivering a flexible enterprise cloud, and want to still come out smiling at the end, watch this webcast.October 2017
Futureproof Your Data Centre Server Security Strategy
– Maximise existing investments. Set priorities for the future.
How should data centre investment and security strategies be evolving in parallel - what can be done now to make the most of existing investments, at the same time as setting priorities for the future?September 2017
Putting Hyperconverged Systems in context
– A top-down view
A top-down view onto hyperconverged systems and storage, asking what problems it solves from the point of view of business and IT service delivery.July 2017
Who’s afraid of the big, bad botnet?
– The dangers, and how to guard against them
If you haven't had any of your key systems or services brought down by a DDoS attack, you are among the lucky ones.June 2017
Beyond Big Data
– Making business value the object of the exercise
To really gain competitive advantage requires the integration of data feeds into business workflows. In layman’s terms, people working for the business will do a better job if they have the information they need, when they need it.April 2017
Why you should care about Ransomware
– My kingdom for a bitcoin!
Many organisations remain in blissful ignorance of the financial impact Ransomware can have.January 2017
Office 365 deployments don't secure themselves?
– What you need to know
Here’s what you need to know, whether planning, deploying or indeed, post-deployment.December 2016
Enabling the Digital Workforce
– Optimising the employee experience in the digital age
In this age of digital transformation, do employees still matter? The answer is yes, more than ever...October 2016
How feasible is continuous security?
– The changing game of application security
The world has moved on in terms of how applications are created and deployed, but in the new normal of continuous delivery, is security keeping up?September 2016