Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

How to record, log and audit any Microsoft Hyper-V, VMware Horizon, and Citrix session with EKRAN

Ekran System® can help you to organize virtual desktop monitoring and user session recording in environments like VMware Horizon, Microsoft Hyper-V, or Citrix. In addition to Citrix session recording, Ekran System delivers a comprehensive set of identity and access management features, real-time alerting, and incident response tool sets.

Kubernetes Access Controls with Calico Enterprise - How to apply egress access controls

No matter where you are in your Kubernetes journey, eventually you’ll have to connect your k8s cluster to external resources like databases, cloud services, and third-party APIs. A majority of existing workloads are non-Kubernetes, and at some point, your Kubernetes applications will need to communicate with them.

DevSecOps Best Practices with JFrog Xray

JFrog builds security products that enable organizations to trust their pipeline from development to deployment and production. In this webinar, you will learn how to leverage JFrog Xray to achieve radical transparency of the binary components in your data center. Understand the impact of these components on production system quality, performance, and architectural changes. We will also cover security topics such as circle of trust, security between locations, security replication, access tokens, and auditing.

What is DLP?

This video briefly explains what data loss prevention is and which steps are crucial to establish a DLP process in your organization. Your confidential, regulated or business-critical data is constantly at risk of being lost. For example, it could be leaked from an unsecure location, or it might be sent to the wrong recipient in an email. To prevent critical information from leaving your organization, you need data loss prevention (DLP).