Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Rubrik Coffee&Demo - Protect your Microsoft 365 Data with Rubrik

As with all cloud-based services, while Microsoft is responsible for security of the cloud, the customer is always responsible for security in the cloud. While they provide a number of compliance and eDiscovery tools to manage application data, native backup and recovery isn't one of them. During this demonstration you will learn: Discover opportunities for data loss in Microsoft 365 Understand the role of third-party backup in a robust SaaS data management strategy Learn how to onboard, automate protection, and rapidly recover your application data - all from one interface - with Rubrik

Rubrik Coffee&Demo - Introduction to Cloud Data Management

It is now more important than ever to have a backup and recovery plan in place for your data. Rubrik's Cloud Data Management software platform securely delivers backup, recovery, analytics, and compliance across data centers and clouds. Join us to get a hands on feel for how easy it is to backup and recover your data with Rubrik. You won't want to miss this! During this demonstration you will learn.

Rubrik Coffee&Demo - Introduction to Polaris I: Security by Design

Don't wait for ransomware to strike, be ready when it does. Rubrik stores all data in an immutable format, meaning ransomware cannot access your backups. Additional security measures include multifactor user authentication, zerotrust cluster design, and retention lock support. During this demonstration you will learn: Introduction to Polaris Rubrik Security by Design Ransomware Remediation with RADAR/SONAR Centralized Reporting with Polaris GPS AppFlows

Rubrik Coffee&Demo - Introduction to Polaris II: Cloud Native Protection

In this week's coffee break we'll show you how Rubrik brings radical simplicity to backup and recovery in a hybrid-cloud world. Join us as for a hands-on view of how Rubrik protects public cloud workloads through a unified software fabric. Bringing it all together under one simple management solution. During this demonstration you will learn: Protecting AWS EC2 / EBS & RDS Workloads Protecting Azure Workloads Protecting Google Cloud Platform Workloads

Splunk: Detect and Prevent Fraud With Splunk

What is your organization doing to protect against fraudulent activity? Have you taken the necessary measures to reduce monetary loss, keep your customer and brand reputation high while keeping organizational efficiencies on track? What about staying ahead of fraudsters and bots impersonating humans? Organizations from hospitals & banks to government agencies have to manage all of this whilst meeting strict compliance guidelines, managing data and IT cybersecurity and more... How do they do it?

Tigera: Product Launch: NextGen Security and Observability for Kubernetes

On behalf of everyone at Tigera, we are immensely proud to deliver a new revolution in Security and Observability for Kubernetes Networking and Microservices. We've spent a lot of time listening to you, our community, and our customers, to better understand what you need to secure, observe, and troubleshoot, your mission-critical microservices running on Kubernetes.