Cisco Storage Networking Solutions
By: Cisco Systems, Inc. View more from Cisco Systems, Inc. >>
Download this next:
Focus: Object storage
By: TechTarget ComputerWeekly.com
Type: eGuide
Object storage does away with the tree-like hierarchies of file systems used by traditional storage NAS and SAN systems. Instead, object storage allows access to stored items via a flat system of unique identifiers, something like the domain name system of the internet. Doing away with unwieldy file systems can speed access when large numbers of files are held and are potentially key to stateless web-based applications. In addition, the rich metadata of object storage can boost the potential for analytics on your data.
These are also closely related to: "Cisco Storage Networking Solutions"
-
MicroScope July 2019: The effects of Brexit on business
By: MicroScope
Type: Ezine
Business as usual?
The effects of Brexit are still largely unknown, Billy Macinnes asks professionals what they’re expecting
SAN vs NASvs hyper-converged for virtual machine storage
Discover the pros and cons of file and block access storage arrays versus the new breed of all-in-one server/storage architecture for storage of virtual machine systems and data
Barracuda discusses channel overhaul
At its Discover 19 event, Barracuda talked about the restructure of its channel and the effects of simplifying its partner programme, with a focus on training and certifications to help partners reach the right level
-
AFAs ensure storage is an infrastructure bottleneck no more
By: TechTarget ComputerWeekly.com
Type: eBook
As businesses develop their infrastructure and applications, they find that storage is frequently the main bottleneck affecting the customer experience. Traditional storage input/output (I/O) is insufficient for the fast processors and networks being deployed.
Because storage needs are ever increasing, systems have to step up their breadth of capabilities—even flash.
In this 12-page buyer’s guide, Computer Weekly experts address your capacity concerns and look at:
- The race to develop memory products to meet rocketing data processing needs
- New approaches to storage as all-flash arrays face ever-rising demand
- How to maximize your storage investment
- Key performance attributes of storage media, and how IT leaders can get the best out of it
- And more
Find more content like what you just read:
-
Essential Guide to LUN configuration and virtualisation
By: TechTarget ComputerWeekly.com
Type: eGuide
In this guide you will find all you need to know about LUNs, LUN configuration and management, including their use in virtualised environments.
-
SDS implementation: What's the best option for you?
By: IBM
Type: eGuide
In this expert e-guide, explore today's SDS implementation options and help you decide which one fits your needs best: commodity or custom hardware. Additionally, uncover the important considerations – like the specific needs of virtual environments, access points, and APIs – that you'll need to address when formulating your storage strategy.
-
Security leader’s guide to government cloud compliance
By: Cisco
Type: Analyst Report
It’s no secret that FedRAMP compliance is the staple of government cloud operations. This SANS white paper examines the security requirements of cloud-based resources as well as how you can best position your agency for that transition. Download and read the SANS white paper now to learn more.
-
Virtual SAN: It’s a SAN, It’s Virtual, but what is it really?
By:
Type: Video
What do you think of when you hear the words “virtual SAN”? For some, it may mean addressing application latency and infrastructure costs through consolidation. For others, it may be addressing potential single point of failures. Regardless of the use case, virtual SANs are becoming one of the hottest software-defined storage solutions for IT organizations to maximize storage resources, lower overall TCO, and increase availability of critical applications and data. In this webinar, Jeff Slapp – storage virtualization expert and technical product specialist – introduces the concept of virtual SAN and does a technical deep dive on the most common use cases and deployment models involved with a DataCore Virtual SAN solution.
-
Containers and storage 101: The fundamentals of container storage
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we look at the basics of Docker storage and backup, key containers capabilities in storage vendors' offers and how containers can be incorporated into the private cloud environment.
-
2023 SANS CTI Survey Event | Keeping Up with A Changing Threat Landscape
By:
Type: Replay
Over the past year, cyber threats have continued to plague organisations of all types. From geopolitical conflicts such as the war in Ukraine to the increased use of social engineering techniques by adversaries, cyber threat intelligence (CTI) professionals have had a challenging time providing actionable intelligence to their consumers. On this webcast, we’ll review insights from this year’s SANS CTI Survey, including both the changing threats as well as the processes analysts use to address the current threat landscape. Register now and gain access to the full report by SANS authors Rebekah Brown (SANS certified instructor candidate), and Katie Nickels (SANS certified instructor). SANS event sponsored by Silobreaker, Anomali, Bitdefender, Cisco & ZeroFox.
-
Network Diagramming Multi-Site Infrastructure - 45 minutes
By:
Type: Talk
Diagrams help understand network topologies, but it isn't easy to represent complex infrastructure when there are so many network types and information needs. The convergence of IoT, security, signage and BMS with ICT results in many parallel “networks” on a mix of physical and virtual infrastructure. This webinar will focus on reducing effort and improving quality of project and operational network topology diagrams, complementing discovery, monitoring and workflow toolsets. We will cover LAN, VLAN, SDN, SAN, cloud, copper/fiber/power, environments, data flows, resilience, addressing, etc.
-
MythBusters Series: Are all object storage solutions the same?
By:
Type: Replay
There is no argument that data is growing at an exponential rate. There is also no argument that traditional storage technologies, like SAN/NAS, cannot scale to meet the storage needs associated with this data growth. Object storage provides a viable alternative to address this growing storage need. However, the challenge is how to clearly evaluate available products to find the right solution for your needs. Come join us in our Object Storage MythBusters webinar as we discuss if the common perception that “all object storage solutions are the same” is a myth or a fact.
-
MythBusters Series: Are all object storage solutions the same?
By:
Type: Replay
There is no argument that data is growing at an exponential rate. There is also no argument that traditional storage technologies, like SAN/NAS, cannot scale to meet the storage needs associated with this data growth. Object storage provides a viable alternative to address this growing storage need. However, the challenge is how to clearly evaluate available products to find the right solution for your needs. Come join us in our first Object Storage MythBusters webinar as we discuss if the common perception that “all object storage solutions are the same” is a myth or a fact.
-
MythBusters Series: Are all object storage solutions the same?
By:
Type: Replay
There is no argument that data is growing at an exponential rate. There is also no argument that traditional storage technologies, like SAN/NAS, cannot scale to meet the storage needs associated with this data growth. Object storage provides a viable alternative to address this growing storage need. However, the challenge is how to clearly evaluate available products to find the right solution for your needs. Come join us in our first Object Storage MythBusters webinar as we discuss if the common perception that “all object storage solutions are the same” is a myth or a fact.
-
NVMe-oF: Discovery Automation for NVMe IP-based SANs
By:
Type: Talk
NVMe® IP-based SANs (including TCP, RoCE, iWARP) have the potential to provide significant benefits in application environments ranging from the Edge to the Data Center. However, before we can fully unlock NVMe IP-based SAN’s potential, we first need to overcome the NVMe over Fabrics (NVMe-oF™) discovery problem. This discovery problem, specific to IP based fabrics, can result in the need for Host administrators to explicitly configure each Host to access each of the NVM subsystems in their environment. In addition, any time an NVM Subsystem interface is added or removed, the Host administrator may need to explicitly update the configuration of impacted hosts. This process does not scale when more than a few Host and NVM subsystem interfaces are in use. Also, due to the de-centralized nature of this process, it also adds complexity when trying to use NVMe IP-based SANs in environments that require a high-degrees of automation. For these and other reasons, several companies have been collaborating on innovations that simplify and automate the discovery process used with NVMe IP-based SANs. During this session we will explain: • NVMe IP-based SAN discovery problem • The types of network topologies that can support the automated discovery of NVMe-oF Discovery controllers • Direct Discovery versus Centralized Discovery • An overview of the discovery protocol After you watch the webcast, check out the Q&A blog: https://bit.ly/3nI8Tk4
-
NVMe-oF: Discovery Automation for NVMe IP-based SANs
By:
Type: Talk
NVMe® IP-based SANs (including TCP, RoCE, iWARP) have the potential to provide significant benefits in application environments ranging from the Edge to the Data Center. However, before we can fully unlock NVMe IP-based SAN’s potential, we first need to overcome the NVMe over Fabrics (NVMe-oF™) discovery problem. This discovery problem, specific to IP based fabrics, can result in the need for Host administrators to explicitly configure each Host to access each of the NVM subsystems in their environment. In addition, any time an NVM Subsystem interface is added or removed, the Host administrator may need to explicitly update the configuration of impacted hosts. This process does not scale when more than a few Host and NVM subsystem interfaces are in use. Also, due to the de-centralized nature of this process, it also adds complexity when trying to use NVMe IP-based SANs in environments that require a high-degrees of automation. For these and other reasons, several companies have been collaborating on innovations that simplify and automate the discovery process used with NVMe IP-based SANs. During this session we will explain: • NVMe IP-based SAN discovery problem • The types of network topologies that can support the automated discovery of NVMe-oF Discovery controllers • Direct Discovery versus Centralized Discovery • An overview of the discovery protocol After you watch the webcast, check out the Q&A blog: https://bit.ly/3nI8Tk4
-
NVMe-oF: Discovery Automation for NVMe IP-based SANs
By:
Type: Talk
NVMe® IP-based SANs (including TCP, RoCE, iWARP) have the potential to provide significant benefits in application environments ranging from the Edge to the Data Center. However, before we can fully unlock NVMe IP-based SAN’s potential, we first need to overcome the NVMe over Fabrics (NVMe-oF™) discovery problem. This discovery problem, specific to IP based fabrics, can result in the need for Host administrators to explicitly configure each Host to access each of the NVM subsystems in their environment. In addition, any time an NVM Subsystem interface is added or removed, the Host administrator may need to explicitly update the configuration of impacted hosts. This process does not scale when more than a few Host and NVM subsystem interfaces are in use. Also, due to the de-centralized nature of this process, it also adds complexity when trying to use NVMe IP-based SANs in environments that require a high-degrees of automation. For these and other reasons, several companies have been collaborating on innovations that simplify and automate the discovery process used with NVMe IP-based SANs. During this session we will explain: • NVMe IP-based SAN discovery problem • The types of network topologies that can support the automated discovery of NVMe-oF Discovery controllers • Direct Discovery versus Centralized Discovery • An overview of the discovery protocol After you watch the webcast, check out the Q&A blog: https://bit.ly/3nI8Tk4
-
NVMe-oF: Discovery Automation for NVMe IP-based SANs
By:
Type: Talk
NVMe® IP-based SANs (including TCP, RoCE, iWARP) have the potential to provide significant benefits in application environments ranging from the Edge to the Data Center. However, before we can fully unlock NVMe IP-based SAN’s potential, we first need to overcome the NVMe over Fabrics (NVMe-oF™) discovery problem. This discovery problem, specific to IP based fabrics, can result in the need for Host administrators to explicitly configure each Host to access each of the NVM subsystems in their environment. In addition, any time an NVM Subsystem interface is added or removed, the Host administrator may need to explicitly update the configuration of impacted hosts. This process does not scale when more than a few Host and NVM subsystem interfaces are in use. Also, due to the de-centralized nature of this process, it also adds complexity when trying to use NVMe IP-based SANs in environments that require a high-degrees of automation. For these and other reasons, several companies have been collaborating on innovations that simplify and automate the discovery process used with NVMe IP-based SANs. During this session we will explain: • NVMe IP-based SAN discovery problem • The types of network topologies that can support the automated discovery of NVMe-oF Discovery controllers • Direct Discovery versus Centralized Discovery • An overview of the discovery protocol After you watch the webcast, check out the Q&A blog: https://bit.ly/3nI8Tk4
-
NVMe-oF: Discovery Automation for NVMe IP-based SANs
By:
Type: Talk
NVMe® IP-based SANs (including TCP, RoCE, iWARP) have the potential to provide significant benefits in application environments ranging from the Edge to the Data Center. However, before we can fully unlock NVMe IP-based SAN’s potential, we first need to overcome the NVMe over Fabrics (NVMe-oF™) discovery problem. This discovery problem, specific to IP based fabrics, can result in the need for Host administrators to explicitly configure each Host to access each of the NVM subsystems in their environment. In addition, any time an NVM Subsystem interface is added or removed, the Host administrator may need to explicitly update the configuration of impacted hosts. This process does not scale when more than a few Host and NVM subsystem interfaces are in use. Also, due to the de-centralized nature of this process, it also adds complexity when trying to use NVMe IP-based SANs in environments that require a high-degrees of automation. For these and other reasons, several companies have been collaborating on innovations that simplify and automate the discovery process used with NVMe IP-based SANs. During this session we will explain: • NVMe IP-based SAN discovery problem • The types of network topologies that can support the automated discovery of NVMe-oF Discovery controllers • Direct Discovery versus Centralized Discovery • An overview of the discovery protocol After you watch the webcast, check out the Q&A blog: https://bit.ly/3nI8Tk4
-
Data center convergence's storage benefits
By: IBM
Type: eGuide
Large data centers are experiencing massive growth in storage traffic and storage capacity requirements. This expert Eguide explains how data center convergence enabled by software-defined networking and storage can manage this rapid growth for you. And read on for an evaluation of new storage for virtualization options.
-
Comprehensive SAN Health Checkup: Navigating New Technological Frontiers
By:
Type: Replay
In an era defined by rapid technological change, ensuring the optimal performance and reliability of your Storage Area Network (SAN) is paramount. This webinar offers an in-depth exploration of the comprehensive SAN health checkup process, crucial for maintaining robust and efficient storage systems. Participants will gain insights into the latest tools and techniques for assessing SAN health, identifying potential vulnerabilities, and implementing strategies for proactive management. Join us as we navigate the new technological frontiers in SAN optimization, equipping your organization with the knowledge to enhance performance, reduce downtime, and streamline storage operations for a competitive edge.
-
Comprehensive SAN Health Checkup: Navigating New Technological Frontiers
By:
Type: Replay
In an era defined by rapid technological change, ensuring the optimal performance and reliability of your Storage Area Network (SAN) is paramount. This webinar offers an in-depth exploration of the comprehensive SAN health checkup process, crucial for maintaining robust and efficient storage systems. Participants will gain insights into the latest tools and techniques for assessing SAN health, identifying potential vulnerabilities, and implementing strategies for proactive management. Join us as we navigate the new technological frontiers in SAN optimization, equipping your organization with the knowledge to enhance performance, reduce downtime, and streamline storage operations for a competitive edge.
-
Securely moving to the (government) cloud to email
By: Cisco
Type: Webcast
For any organization involved in the government cloud ecosystem, security is nonnegotiable. In this webcast, SANS analyst and instructor, Matt Bromiley, joins Cisco Technical Marketing Engineer, Christian Clasen, to discuss how you can securely move your government cloud to an email platform. Watch now to learn more.
-
Demystifying storage performance metrics
By: TechTarget ComputerWeekly.com
Type: eGuide
We walk you through the key storage metrics you need to know about, look at how storage array makers present them in their product literature, and how to decode IOPS, latency and read/write performance figures.
-
Storage for containers and virtual environments
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we give you a complete run-through of the main choices in data storage for containers, look at the essentials of virtual servers storage, plus all you need to know about storage performance in virtual server and desktop environments.
-
Google’s Chronicle Security Operations: Why Doesn’t My SIEM Do That?
By:
Type: Video
Organizations need modern threat detection that operates at scale, and Google’s cloud-native SIEM platform, Chronicle, delivers. During SANS tests, analysts observed multiple threat detections that most organizations haven’t even pondered including in their SIEM. SIEMs in general were supposed to enable three main goals: - Increase visibility. - Enable detection of security events. - Support the response of discovered security issues. While those goals haven’t changed, it’s undeniable that traditional SIEM solutions have failed to address them. Addressing these shortcomings are core to the Chronicle mission. During this webcast, SANS Senior Instructor Jake Williams shares his experience with Chronicle, evaluating its features and usability from a practitioner perspective. Learn how Chronicle has a significant number of capabilities and was obviously designed to address shortcomings inherent in many SIEM platforms. Watch now and find out why you’ll ask, “Why doesn’t my SIEM do that?” on more than one occasion.
-
Simplifying Cloud Security: A SANS Review of Forcepoint ONE
By:
Type: Replay
Join SANS instructor Matt Bromiley and Mike Schuricht, VP of Product Management from Forcepoint, for an in-depth review of the Forcepoint ONE Security Service Edge platform. In this webinar, they discuss the challenges posed by the need to secure a hybrid workforce and show how unifying CASB, ZTNA, SWG and DLP services makes it easier to implement a Zero Trust strategy. Supporting the webinar is the accompanying SANS Product Review of Forcepoint ONE whitepaper.
-
SAN block access storage in the age of cloud and hyper-converged
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
-
SAN block access storage in the age of cloud and hyper-converged
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
-
SANS 2022 Top New Attacks and Threat Report
By:
Type: Video
Gain a deeper insight into top threats highlighted during the annual SANS keynote panel at RSA® Conference 2022. In this webinar, LogRhythm’s Deputy CISO Kevin Kirkwood, along with SANS instructors Ed Skoudis, Heather Mahalik, Johannes Ullrich, and Katie Nickels, fill you in on emerging attack techniques and what you can do to counter them. Don't miss actionable advice on the critical skills, processes, and controls you need to protect the organization from advanced threats!
-
Data protection, management, and backup in today's cloud environments
By: Rubrik
Type: White Paper
As data volumes continue to increase exponentially, cloud migration projects have accelerated—meaning that organizations have a myriad of backlogged data management, backup, and protection projects. Download this expert guide to discover the various opportunities and challenges changing data frameworks and backup expectations are creating.
-
SANS 2024 Survey: Managing The Evolving Threat Landscape - Webinar Highlights
By:
Type: Replay
While cybersecurity attacks pose a major threat, geopolitical tensions around the world are increasingly impacting daily operations. Distant conflicts can disrupt supply chains, critical infrastructure, and digital services. According to the recent SANS 2024 CTI Survey, 78 percent of respondents reported that geopolitics was somewhat or a very important factor in determining CTI requirements, up 7 percent from last year. In this webinar we’ll review highlights from this year’s SANS CTI Report including the evolving threat landscape as well as the challenges that CTI professionals need to address and plan for. Andy Grayland, CISO at Silobreaker will look at how open-source intelligence (OSINT) enhances situational awareness, using real-life examples that you can use to improve operational resilience and response planning.
-
Best practices for remote data backups
By: TechTarget ComputerWeekly.com
Type: eGuide
This guide provides tips and best practices for your organisation's offsite data backups. It addresses questions you need to ask to determine which remote backup approach is the right fit for your organisation. In this e-guide, discover which remote backup strategy is right for your organisation.
-
Simplifying Cloud Security - A SANS Review of Forcepoint ONE
By:
Type: Replay
Join SANS instructor Matt Bromiley and Mike Schuricht, VP of Product Management from Forcepoint, for an in-depth review of the Forcepoint ONE Security Service Edge platform. In this webinar, they discuss the challenges posed by the need to secure a hybrid workforce and show how unifying CASB, ZTNA, SWG and DLP services makes it easier to implement a Zero Trust strategy. The webinar includes a product demonstration of Forcepoint ONE. Supporting the webinar is the accompanying SANS Product Review of Forcepoint ONE whitepaper.
-
SANS 2022 Top New Attacks and Threat Report [EMEA]
By:
Type: Replay
This webcast will provide deeper insight into the threats highlighted during the annual SANS keynote panel discussion at the RSA® Conference 2022. The webcast will include insight from SANS instructors Ed Skoudis, Heather Mahalik, Johannes Ullrich, and Katie Nickels on the dangerous new attack techniques they see emerging. It also includes actionable advice on the critical skills, processes, and controls needed to protect enterprises from these advanced attacks. Topics will focus on: • Briefing of the most dangerous new attack techniques in use today • What can organisations do to prepare and counter these attacks
-
SANS 2022 Top New Attacks and Threat Report [APAC]
By:
Type: Replay
This webcast will provide deeper insight into the threats highlighted during the annual SANS keynote panel discussion at the RSA® Conference 2022. The webcast will include insight from SANS instructors Ed Skoudis, Heather Mahalik, Johannes Ullrich, and Katie Nickels on the dangerous new attack techniques they see emerging. It also includes actionable advice on the critical skills, processes, and controls needed to protect enterprises from these advanced attacks. Topics will focus on: • Briefing of the most dangerous new attack techniques in use today • What can organisations do to prepare and counter these attacks
-
Automating Visio Network Diagramming
By:
Type: Talk
Diagrams help with design and understanding of network topologies, but there are so many network types and information needs. Representing complex infrastructure is made simpler and faster using MS Visio with the automation techniques we’ll cover in the webinar. The convergence of IoT, security, signage and BMS with ICT results in many parallel “networks” on a mix of physical and virtual infrastructure – expanding the numbers of network diagrams required. This webinar focuses on reducing effort and improving quality of project and operational network topology diagrams - complementing discovery, monitoring and workflow toolsets. We will cover LAN, VLAN, SDN, SAN, cloud, copper/fiber/power, environments, data flows, resilience, addressing, etc.
-
Object storage: A great fit for large, unstructured data sets
By: TechTarget ComputerWeekly.com
Type: eGuide
Object storage is a rising star. In this e-guide we walk you through the key differences between object storage and the currently more mainstream approaches - file and block access. In doing so you'll clearly see the benefits and drawbacks of the object approach, which is to organise data in a flat structure with unique identifiers.
-
SANS 2024 Top Attacks and Threats Report
By:
Type: Replay
The dust has begun to settle on another successful RSA Conference where SANS continued its 15-year tradition of highlighting some of the year's most concerning emerging threats. This year’s Top New Attacks & Threats Report and virtual event will take a deeper dive into the emerging threats discussed during the annual SANS keynote at RSA Conference and look at numerous other noteworthy attacker trends. SANS Certified Instructor and event chair, Lee Crognale will provide mitigation strategies and actionable advice on the critical skills, processes, and controls needed to protect enterprises from these advanced attacks. Topics include: - The Security Cost of Technical Debt - Verifying Identity in the Age of AI - LLMs Hyper-Accelerate the Exploitation Lifecycle - The Use of AI to Defeat Novel Malware - The Organizational Risks associated with Generative AI - Developing Detection Mechanisms for Detecting Deepfakes & Gaining Digital Trust.
-
CW Buyer's Guide to 5G mobile networking
By: TechTarget ComputerWeekly.com
Type: eBook
5G mobile networking has the potential to propel business into the future. In this 17-page buyer's guide, Computer Weekly looks at how to optimise 5G, the advantages of advanced communications and what Télécoms Sans Frontières has achieved through harnessing it.
-
Top 6 StorPool advantages for primary & secondary block storage
By: StorPool
Type: Case Study
Dustin, a leading IT and managed services provider, launched a large-scale project to condense their complex and costly stack of multiple IT systems. Access Dustin’s case study to learn 5 reasons why Dustin chose StorPool Storage for this project, and the innate benefits they received from software-defined storage (SDS) as a result.
-
Active Cloud Risk. How to Combat the Most Critical Threats
By:
Type: Replay
Cloud has changed the way we develop, deploy, and scale apps. Traditional perimeter and end-point security does not address the distributed and ephemeral nature of cloud and has huge blind spots for adversaries to go undetected. Active cloud risk is the most imminent threat security teams need to address. Even purpose-built Cloud Security Posture Management (CSPM) tools, relying on point-in-time assessments, need to catch up in detecting and mitigating these active risks. This SANS Spring 2024 CyberFest keynote addresses the distinction between static and active cloud risks, common tactics used in cloud attacks, and the new 5/5/5 framework that sets a new standard in detecting, prioritizing, and responding to active cloud risks and threats. Watch it for a live discussion and real-life examples from our experts from Sysdig and Amazon.
-
Ransomware Prevention Panel: How to Address a Pervasive and Unrelenting Threat
By:
Type: Video
This on-demand webcast takes a deeper dive into the SANS white paper, How to Address a Pervasive and Unrelenting Threat, written by SANS instructor Justin Henderson. Justin moderated a panel that as they explored major themes of the paper and answered some of the leading industry questions about ransomware, including: - What are ways that organizations can protect against infection vectors? - What are some of the trends occurring with recent ransomware attacks? - How does the prevention and detection of ransomware change with remote workforces? Watch this on-demand webcast for the answers to these questions and so much more!
-
CW APAC, February 2020: Expert Advice: Container Storage
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, focused on storage in the Asia-Pacific region, Computer Weekly looks at how container applications can make companies more agile, the cost benefits of data storage and the most common data storage myths that need to be debunked.
-
A Computer Weekly buyer's guide to optimising storage
By: TechTarget ComputerWeekly.com
Type: eGuide
The implementation of effective storage optimisation has becomean important factor in business. In this 12-page buyer's guide,Computer Weekly looks at cost implications, the hyper-convergedinfrastructure minefield and the alternatives to shared storage
-
Jargon buster guide to hybrid cloud storage
By: TechTarget ComputerWeekly.com
Type: eGuide
In this Jargon Buster guide we bring you definitions for the key concepts in hybrid cloud storage plus in-depth articles on hybrid cloud file and object storage, how to use the cloud as a storage tier and the key decision points when it comes to private cloud vs hybrid cloud.
-
2023 SANS Multi-Cloud Survey: Focus on DNS
By:
Type: Replay
SANS Research has concluded that more organizations have adopted multi-cloud strategies as a means of becoming more competitive within their industries. This event will expand on the findings of the SANS 2022 Multi-Cloud Survey, including insights on the current adoption trends of multi-cloud, how decisions to adopt multi-cloud are made, and the difficulties that cybersecurity teams face in addressing cloud services. This Infoblox produced webinar succeeds the December 7th, 2022 multi-cloud event held by SANS and will feature more expansive findings on DNS Security. Join Infoblox Sr. Product Marketing Manager Bob Hansmann to gain more insight on: - How organizations maintain providing DNS services across multi-cloud environments. - The ways in which DNS can be utilized as a security defense. - Respondent satisfaction levels on DNS visibility and how it is being used. - How organizations are detecting internet activity to protect their infrastructure.
-
Maximize SOC Potential: Lessons from the 2024 SANS SOC Survey
By:
Type: Talk
The latest 2024 SANS SOC Survey highlights that SOC teams grapple with significant challenges, including lack of automation, staffing constraints, and limited operational visibility, even as their responsibilities expand. Learn key findings from the survey and tips on how to build an automated SOC from Swimlane’s CISO, all in just 30 minutes! Register now for the Maximize SOC Potential: Lessons from the 2024 SANS SOC Survey webinar on Thursday, August 22 at 2 pm ET. You’ll learn: -The pressing need for automation in security operations -How staffing challenges and limited enterprise visibility hinder SOC effectiveness -Tips on how to improve SOC automation & orchestration
-
Bringing cloud-style pricing to SSD storage: An inside look
By: Nimble Storage
Type: eGuide
In this expert-guide, learn about Nimble Storage's new cloud-style pricing model for their all-flash and hybrid storage arrays, as well as some other new features like support for Docker containers, predictive analytics, and more.
-
[APAC] Avoiding or Minimizing Ransomware Impact to the Bottom Line
By:
Type: Replay
In the event of a ransomware attack, security managers must be able to give business-relevant risk recommendations to CEOs and boards of directors. Most of the thought and effort required to do so must take place well before the attack. On this webcast, John Pescatore, SANS Director of Emerging Security Trends, and Benjamin Wright, lawyer and SANS Senior Instructor, will discuss key ransomware issues, including: - Key security processes to avoid ransomware attacks - Issues around ransomware payoffs if an attack succeeds - How cyber insurance can play a role in reducing the financial impact of an attack Register now!
-
Object storage and the unstructured data deluge: Your full guide
By: HGST
Type: eGuide
This expert resource serves as your full guide to object storage implementation, with cloud workload, sync-and-share, API-accessible storage, and more use cases examined. Download now to gain full access, learning how object storage maintains the unstructured data deluge, and view an object vs. file vs. block storage bake off.