You've requested...

Download this next:

Focus: Object storage

Object storage does away with the tree-like hierarchies of file systems used by traditional storage NAS and SAN systems. Instead, object storage allows access to stored items via a flat system of unique identifiers, something like the domain name system of the internet. Doing away with unwieldy file systems can speed access when large numbers of files are held and are potentially key to stateless web-based applications. In addition, the rich metadata of object storage can boost the potential for analytics on your data. 

These are also closely related to: "Cisco Storage Networking Solutions"

  • A Computer Weekly Buyer's Guide to Next-Generation Storage

    As businesses develop their infrastructure and applications, they find that storage is frequently the main bottleneck affecting the customer experience. Traditional storage input/output (I/O) is insufficient for the fast processors and networks being deployed.

    Because storage needs are ever increasing, systems have to step up their breadth of capabilities—even flash.

    In this 12-page buyer’s guide, Computer Weekly experts address your capacity concerns and look at:

    • The race to develop memory products to meet rocketing data processing needs
    • New approaches to storage as all-flash arrays face ever-rising demand
    • How to maximize your storage investment
    • Key performance attributes of storage media, and how IT leaders can get the best out of it
    • And more 

  • MicroScope July 2019: The effects of Brexit on business

    Business as usual? 

    The effects of Brexit are still largely unknown, Billy Macinnes asks professionals what they’re expecting

    SAN vs NASvs hyper-converged for virtual machine storage 

    Discover the pros and cons of file and block access storage arrays versus the new breed of all-in-one server/storage architecture for storage of virtual machine systems and data

    Barracuda discusses channel overhaul 

    At its Discover 19 event, Barracuda talked about the restructure of its channel and the effects of simplifying its partner programme, with a focus on training and certifications to help partners reach the right level

Find more content like what you just read:

  • Essential Guide to LUN configuration and virtualisation

    In this guide you will find all you need to know about LUNs, LUN configuration and management, including their use in virtualised environments.

    Download

  • SDS implementation: What's the best option for you?

    In this expert e-guide, explore today's SDS implementation options and help you decide which one fits your needs best: commodity or custom hardware. Additionally, uncover the important considerations – like the specific needs of virtual environments, access points, and APIs – that you'll need to address when formulating your storage strategy.

    Download

  • Security leader’s guide to government cloud compliance

    It’s no secret that FedRAMP compliance is the staple of government cloud operations. This SANS white paper examines the security requirements of cloud-based resources as well as how you can best position your agency for that transition. Download and read the SANS white paper now to learn more.

    Download

  • Virtual SAN: It’s a SAN, It’s Virtual, but what is it really?

    What do you think of when you hear the words “virtual SAN”? For some, it may mean addressing application latency and infrastructure costs through consolidation. For others, it may be addressing potential single point of failures. Regardless of the use case, virtual SANs are becoming one of the hottest software-defined storage solutions for IT organizations to maximize storage resources, lower overall TCO, and increase availability of critical applications and data. In this webinar, Jeff Slapp – storage virtualization expert and technical product specialist – introduces the concept of virtual SAN and does a technical deep dive on the most common use cases and deployment models involved with a DataCore Virtual SAN solution.

    Download

  • MythBusters Series: Are all object storage solutions the same?

    There is no argument that data is growing at an exponential rate. There is also no argument that traditional storage technologies, like SAN/NAS, cannot scale to meet the storage needs associated with this data growth. Object storage provides a viable alternative to address this growing storage need. However, the challenge is how to clearly evaluate available products to find the right solution for your needs. Come join us in our Object Storage MythBusters webinar as we discuss if the common perception that “all object storage solutions are the same” is a myth or a fact.

    Download

  • MythBusters Series: Are all object storage solutions the same?

    There is no argument that data is growing at an exponential rate. There is also no argument that traditional storage technologies, like SAN/NAS, cannot scale to meet the storage needs associated with this data growth. Object storage provides a viable alternative to address this growing storage need. However, the challenge is how to clearly evaluate available products to find the right solution for your needs. Come join us in our first Object Storage MythBusters webinar as we discuss if the common perception that “all object storage solutions are the same” is a myth or a fact.

    Download

  • MythBusters Series: Are all object storage solutions the same?

    There is no argument that data is growing at an exponential rate. There is also no argument that traditional storage technologies, like SAN/NAS, cannot scale to meet the storage needs associated with this data growth. Object storage provides a viable alternative to address this growing storage need. However, the challenge is how to clearly evaluate available products to find the right solution for your needs. Come join us in our first Object Storage MythBusters webinar as we discuss if the common perception that “all object storage solutions are the same” is a myth or a fact.

    Download

  • Containers and storage 101: The fundamentals of container storage

    In this e-guide we look at the basics of Docker storage and backup, key containers capabilities in storage vendors' offers and how containers can be incorporated into the private cloud environment.

    Download

  • Network Diagramming Multi-Site Infrastructure - 45 minutes

    Diagrams help understand network topologies, but it isn't easy to represent complex infrastructure when there are so many network types and information needs. The convergence of IoT, security, signage and BMS with ICT results in many parallel “networks” on a mix of physical and virtual infrastructure. This webinar will focus on reducing effort and improving quality of project and operational network topology diagrams, complementing discovery, monitoring and workflow toolsets. We will cover LAN, VLAN, SDN, SAN, cloud, copper/fiber/power, environments, data flows, resilience, addressing, etc.

    Download

  • NVMe-oF: Discovery Automation for NVMe IP-based SANs

    NVMe® IP-based SANs (including TCP, RoCE, iWARP) have the potential to provide significant benefits in application environments ranging from the Edge to the Data Center. However, before we can fully unlock NVMe IP-based SAN’s potential, we first need to overcome the NVMe over Fabrics (NVMe-oF™) discovery problem. This discovery problem, specific to IP based fabrics, can result in the need for Host administrators to explicitly configure each Host to access each of the NVM subsystems in their environment. In addition, any time an NVM Subsystem interface is added or removed, the Host administrator may need to explicitly update the configuration of impacted hosts. This process does not scale when more than a few Host and NVM subsystem interfaces are in use. Also, due to the de-centralized nature of this process, it also adds complexity when trying to use NVMe IP-based SANs in environments that require a high-degrees of automation. For these and other reasons, several companies have been collaborating on innovations that simplify and automate the discovery process used with NVMe IP-based SANs. During this session we will explain: • NVMe IP-based SAN discovery problem • The types of network topologies that can support the automated discovery of NVMe-oF Discovery controllers • Direct Discovery versus Centralized Discovery • An overview of the discovery protocol After you watch the webcast, check out the Q&A blog: https://bit.ly/3nI8Tk4

    Download

  • NVMe-oF: Discovery Automation for NVMe IP-based SANs

    NVMe® IP-based SANs (including TCP, RoCE, iWARP) have the potential to provide significant benefits in application environments ranging from the Edge to the Data Center. However, before we can fully unlock NVMe IP-based SAN’s potential, we first need to overcome the NVMe over Fabrics (NVMe-oF™) discovery problem. This discovery problem, specific to IP based fabrics, can result in the need for Host administrators to explicitly configure each Host to access each of the NVM subsystems in their environment. In addition, any time an NVM Subsystem interface is added or removed, the Host administrator may need to explicitly update the configuration of impacted hosts. This process does not scale when more than a few Host and NVM subsystem interfaces are in use. Also, due to the de-centralized nature of this process, it also adds complexity when trying to use NVMe IP-based SANs in environments that require a high-degrees of automation. For these and other reasons, several companies have been collaborating on innovations that simplify and automate the discovery process used with NVMe IP-based SANs. During this session we will explain: • NVMe IP-based SAN discovery problem • The types of network topologies that can support the automated discovery of NVMe-oF Discovery controllers • Direct Discovery versus Centralized Discovery • An overview of the discovery protocol After you watch the webcast, check out the Q&A blog: https://bit.ly/3nI8Tk4

    Download

  • NVMe-oF: Discovery Automation for NVMe IP-based SANs

    NVMe® IP-based SANs (including TCP, RoCE, iWARP) have the potential to provide significant benefits in application environments ranging from the Edge to the Data Center. However, before we can fully unlock NVMe IP-based SAN’s potential, we first need to overcome the NVMe over Fabrics (NVMe-oF™) discovery problem. This discovery problem, specific to IP based fabrics, can result in the need for Host administrators to explicitly configure each Host to access each of the NVM subsystems in their environment. In addition, any time an NVM Subsystem interface is added or removed, the Host administrator may need to explicitly update the configuration of impacted hosts. This process does not scale when more than a few Host and NVM subsystem interfaces are in use. Also, due to the de-centralized nature of this process, it also adds complexity when trying to use NVMe IP-based SANs in environments that require a high-degrees of automation. For these and other reasons, several companies have been collaborating on innovations that simplify and automate the discovery process used with NVMe IP-based SANs. During this session we will explain: • NVMe IP-based SAN discovery problem • The types of network topologies that can support the automated discovery of NVMe-oF Discovery controllers • Direct Discovery versus Centralized Discovery • An overview of the discovery protocol After you watch the webcast, check out the Q&A blog: https://bit.ly/3nI8Tk4

    Download

  • NVMe-oF: Discovery Automation for NVMe IP-based SANs

    NVMe® IP-based SANs (including TCP, RoCE, iWARP) have the potential to provide significant benefits in application environments ranging from the Edge to the Data Center. However, before we can fully unlock NVMe IP-based SAN’s potential, we first need to overcome the NVMe over Fabrics (NVMe-oF™) discovery problem. This discovery problem, specific to IP based fabrics, can result in the need for Host administrators to explicitly configure each Host to access each of the NVM subsystems in their environment. In addition, any time an NVM Subsystem interface is added or removed, the Host administrator may need to explicitly update the configuration of impacted hosts. This process does not scale when more than a few Host and NVM subsystem interfaces are in use. Also, due to the de-centralized nature of this process, it also adds complexity when trying to use NVMe IP-based SANs in environments that require a high-degrees of automation. For these and other reasons, several companies have been collaborating on innovations that simplify and automate the discovery process used with NVMe IP-based SANs. During this session we will explain: • NVMe IP-based SAN discovery problem • The types of network topologies that can support the automated discovery of NVMe-oF Discovery controllers • Direct Discovery versus Centralized Discovery • An overview of the discovery protocol After you watch the webcast, check out the Q&A blog: https://bit.ly/3nI8Tk4

    Download

  • NVMe-oF: Discovery Automation for NVMe IP-based SANs

    NVMe® IP-based SANs (including TCP, RoCE, iWARP) have the potential to provide significant benefits in application environments ranging from the Edge to the Data Center. However, before we can fully unlock NVMe IP-based SAN’s potential, we first need to overcome the NVMe over Fabrics (NVMe-oF™) discovery problem. This discovery problem, specific to IP based fabrics, can result in the need for Host administrators to explicitly configure each Host to access each of the NVM subsystems in their environment. In addition, any time an NVM Subsystem interface is added or removed, the Host administrator may need to explicitly update the configuration of impacted hosts. This process does not scale when more than a few Host and NVM subsystem interfaces are in use. Also, due to the de-centralized nature of this process, it also adds complexity when trying to use NVMe IP-based SANs in environments that require a high-degrees of automation. For these and other reasons, several companies have been collaborating on innovations that simplify and automate the discovery process used with NVMe IP-based SANs. During this session we will explain: • NVMe IP-based SAN discovery problem • The types of network topologies that can support the automated discovery of NVMe-oF Discovery controllers • Direct Discovery versus Centralized Discovery • An overview of the discovery protocol After you watch the webcast, check out the Q&A blog: https://bit.ly/3nI8Tk4

    Download

  • 2023 SANS CTI Survey Event | Keeping Up with A Changing Threat Landscape

    Over the past year, cyber threats have continued to plague organisations of all types. From geopolitical conflicts such as the war in Ukraine to the increased use of social engineering techniques by adversaries, cyber threat intelligence (CTI) professionals have had a challenging time providing actionable intelligence to their consumers. On this webcast, we’ll review insights from this year’s SANS CTI Survey, including both the changing threats as well as the processes analysts use to address the current threat landscape. Register now and gain access to the full report by SANS authors Rebekah Brown (SANS certified instructor candidate), and Katie Nickels (SANS certified instructor). SANS event sponsored by Silobreaker, Anomali, Bitdefender, Cisco & ZeroFox.

    Download

  • Demystifying storage performance metrics

    We walk you through the key storage metrics you need to know about, look at how storage array makers present them in their product literature, and how to decode IOPS, latency and read/write performance figures.

    Download

  • Data center convergence's storage benefits

    Large data centers are experiencing massive growth in storage traffic and storage capacity requirements. This expert Eguide explains how data center convergence enabled by software-defined networking and storage can manage this rapid growth for you. And read on for an evaluation of new storage for virtualization options.

    Download

  • Google’s Chronicle Security Operations: Why Doesn’t My SIEM Do That?

    Organizations need modern threat detection that operates at scale, and Google’s cloud-native SIEM platform, Chronicle, delivers. During SANS tests, analysts observed multiple threat detections that most organizations haven’t even pondered including in their SIEM. SIEMs in general were supposed to enable three main goals: - Increase visibility. - Enable detection of security events. - Support the response of discovered security issues. While those goals haven’t changed, it’s undeniable that traditional SIEM solutions have failed to address them. Addressing these shortcomings are core to the Chronicle mission. During this webcast, SANS Senior Instructor Jake Williams shares his experience with Chronicle, evaluating its features and usability from a practitioner perspective. Learn how Chronicle has a significant number of capabilities and was obviously designed to address shortcomings inherent in many SIEM platforms. Watch now and find out why you’ll ask, “Why doesn’t my SIEM do that?” on more than one occasion.

    Download

  • Comprehensive SAN Health Checkup: Navigating New Technological Frontiers

    In an era defined by rapid technological change, ensuring the optimal performance and reliability of your Storage Area Network (SAN) is paramount. This webinar offers an in-depth exploration of the comprehensive SAN health checkup process, crucial for maintaining robust and efficient storage systems. Participants will gain insights into the latest tools and techniques for assessing SAN health, identifying potential vulnerabilities, and implementing strategies for proactive management. Join us as we navigate the new technological frontiers in SAN optimization, equipping your organization with the knowledge to enhance performance, reduce downtime, and streamline storage operations for a competitive edge.

    Download

  • Comprehensive SAN Health Checkup: Navigating New Technological Frontiers

    In an era defined by rapid technological change, ensuring the optimal performance and reliability of your Storage Area Network (SAN) is paramount. This webinar offers an in-depth exploration of the comprehensive SAN health checkup process, crucial for maintaining robust and efficient storage systems. Participants will gain insights into the latest tools and techniques for assessing SAN health, identifying potential vulnerabilities, and implementing strategies for proactive management. Join us as we navigate the new technological frontiers in SAN optimization, equipping your organization with the knowledge to enhance performance, reduce downtime, and streamline storage operations for a competitive edge.

    Download

  • Storage for containers and virtual environments

    In this e-guide we give you a complete run-through of the main choices in data storage for containers, look at the essentials of virtual servers storage, plus all you need to know about storage performance in virtual server and desktop environments.

    Download

  • Simplifying Cloud Security: A SANS Review of Forcepoint ONE

    Join SANS instructor Matt Bromiley and Mike Schuricht, VP of Product Management from Forcepoint, for an in-depth review of the Forcepoint ONE Security Service Edge platform. In this webinar, they discuss the challenges posed by the need to secure a hybrid workforce and show how unifying CASB, ZTNA, SWG and DLP services makes it easier to implement a Zero Trust strategy. Supporting the webinar is the accompanying SANS Product Review of Forcepoint ONE whitepaper.

    Download

  • Data protection, management, and backup in today's cloud environments

    As data volumes continue to increase exponentially, cloud migration projects have accelerated—meaning that organizations have a myriad of backlogged data management, backup, and protection projects. Download this expert guide to discover the various opportunities and challenges changing data frameworks and backup expectations are creating.

    Download

  • Securely moving to the (government) cloud to email

    For any organization involved in the government cloud ecosystem, security is nonnegotiable. In this webcast, SANS analyst and instructor, Matt Bromiley, joins Cisco Technical Marketing Engineer, Christian Clasen, to discuss how you can securely move your government cloud to an email platform. Watch now to learn more.

    Download

  • Best practices for remote data backups

    This guide provides tips and best practices for your organisation's offsite data backups. It addresses questions you need to ask to determine which remote backup approach is the right fit for your organisation. In this e-guide, discover which remote backup strategy is right for your organisation.

    Download

  • SANS 2022 Top New Attacks and Threat Report

    Gain a deeper insight into top threats highlighted during the annual SANS keynote panel at RSA® Conference 2022. In this webinar, LogRhythm’s Deputy CISO Kevin Kirkwood, along with SANS instructors Ed Skoudis, Heather Mahalik, Johannes Ullrich, and Katie Nickels, fill you in on emerging attack techniques and what you can do to counter them. Don't miss actionable advice on the critical skills, processes, and controls you need to protect the organization from advanced threats!

    Download

  • SANS 2024 Survey: Managing The Evolving Threat Landscape - Webinar Highlights

    While cybersecurity attacks pose a major threat, geopolitical tensions around the world are increasingly impacting daily operations. Distant conflicts can disrupt supply chains, critical infrastructure, and digital services. According to the recent SANS 2024 CTI Survey, 78 percent of respondents reported that geopolitics was somewhat or a very important factor in determining CTI requirements, up 7 percent from last year. In this webinar we’ll review highlights from this year’s SANS CTI Report including the evolving threat landscape as well as the challenges that CTI professionals need to address and plan for. Andy Grayland, CISO at Silobreaker will look at how open-source intelligence (OSINT) enhances situational awareness, using real-life examples that you can use to improve operational resilience and response planning.

    Download

  • Automating Visio Network Diagramming

    Diagrams help with design and understanding of network topologies, but there are so many network types and information needs. Representing complex infrastructure is made simpler and faster using MS Visio with the automation techniques we’ll cover in the webinar. The convergence of IoT, security, signage and BMS with ICT results in many parallel “networks” on a mix of physical and virtual infrastructure – expanding the numbers of network diagrams required. This webinar focuses on reducing effort and improving quality of project and operational network topology diagrams - complementing discovery, monitoring and workflow toolsets. We will cover LAN, VLAN, SDN, SAN, cloud, copper/fiber/power, environments, data flows, resilience, addressing, etc.

    Download

  • Simplifying Cloud Security - A SANS Review of Forcepoint ONE

    Join SANS instructor Matt Bromiley and Mike Schuricht, VP of Product Management from Forcepoint, for an in-depth review of the Forcepoint ONE Security Service Edge platform. In this webinar, they discuss the challenges posed by the need to secure a hybrid workforce and show how unifying CASB, ZTNA, SWG and DLP services makes it easier to implement a Zero Trust strategy. The webinar includes a product demonstration of Forcepoint ONE. Supporting the webinar is the accompanying SANS Product Review of Forcepoint ONE whitepaper.

    Download

  • SAN block access storage in the age of cloud and hyper-converged

    In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.

    Download

  • SAN block access storage in the age of cloud and hyper-converged

    In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.

    Download

  • SANS 2022 Top New Attacks and Threat Report [EMEA]

    This webcast will provide deeper insight into the threats highlighted during the annual SANS keynote panel discussion at the RSA® Conference 2022. The webcast will include insight from SANS instructors Ed Skoudis, Heather Mahalik, Johannes Ullrich, and Katie Nickels on the dangerous new attack techniques they see emerging. It also includes actionable advice on the critical skills, processes, and controls needed to protect enterprises from these advanced attacks. Topics will focus on: • Briefing of the most dangerous new attack techniques in use today • What can organisations do to prepare and counter these attacks

    Download

  • SANS 2022 Top New Attacks and Threat Report [APAC]

    This webcast will provide deeper insight into the threats highlighted during the annual SANS keynote panel discussion at the RSA® Conference 2022. The webcast will include insight from SANS instructors Ed Skoudis, Heather Mahalik, Johannes Ullrich, and Katie Nickels on the dangerous new attack techniques they see emerging. It also includes actionable advice on the critical skills, processes, and controls needed to protect enterprises from these advanced attacks. Topics will focus on: • Briefing of the most dangerous new attack techniques in use today • What can organisations do to prepare and counter these attacks

    Download

  • Active Cloud Risk. How to Combat the Most Critical Threats

    Cloud has changed the way we develop, deploy, and scale apps. Traditional perimeter and end-point security does not address the distributed and ephemeral nature of cloud and has huge blind spots for adversaries to go undetected. Active cloud risk is the most imminent threat security teams need to address. Even purpose-built Cloud Security Posture Management (CSPM) tools, relying on point-in-time assessments, need to catch up in detecting and mitigating these active risks. This SANS Spring 2024 CyberFest keynote addresses the distinction between static and active cloud risks, common tactics used in cloud attacks, and the new 5/5/5 framework that sets a new standard in detecting, prioritizing, and responding to active cloud risks and threats. Watch it for a live discussion and real-life examples from our experts from Sysdig and Amazon.

    Download

  • StorPool Storage assists Dustin Group in consolidating legacy silos

    Dustin, a leading IT and managed services provider, launched a large-scale project to condense their complex and costly stack of multiple IT systems. Access Dustin’s case study to learn 5 reasons why Dustin chose StorPool Storage for this project, and the innate benefits they received from software-defined storage (SDS) as a result.

    Download

  • SANS 2024 Top Attacks and Threats Report

    The dust has begun to settle on another successful RSA Conference where SANS continued its 15-year tradition of highlighting some of the year's most concerning emerging threats. This year’s Top New Attacks & Threats Report and virtual event will take a deeper dive into the emerging threats discussed during the annual SANS keynote at RSA Conference and look at numerous other noteworthy attacker trends. SANS Certified Instructor and event chair, Lee Crognale will provide mitigation strategies and actionable advice on the critical skills, processes, and controls needed to protect enterprises from these advanced attacks. Topics include: - The Security Cost of Technical Debt - Verifying Identity in the Age of AI - LLMs Hyper-Accelerate the Exploitation Lifecycle - The Use of AI to Defeat Novel Malware - The Organizational Risks associated with Generative AI - Developing Detection Mechanisms for Detecting Deepfakes & Gaining Digital Trust.

    Download

  • CW APAC, February 2020: Expert Advice: Container Storage

    In this handbook, focused on storage in the Asia-Pacific region, Computer Weekly looks at how container applications can make companies more agile, the cost benefits of data storage and the most common data storage myths that need to be debunked.

    Download

  • Ransomware Prevention Panel: How to Address a Pervasive and Unrelenting Threat

    This on-demand webcast takes a deeper dive into the SANS white paper, How to Address a Pervasive and Unrelenting Threat, written by SANS instructor Justin Henderson. Justin moderated a panel that as they explored major themes of the paper and answered some of the leading industry questions about ransomware, including: - What are ways that organizations can protect against infection vectors? - What are some of the trends occurring with recent ransomware attacks? - How does the prevention and detection of ransomware change with remote workforces? Watch this on-demand webcast for the answers to these questions and so much more!

    Download

  • CW Buyer's Guide to 5G mobile networking

    5G mobile networking has the potential to propel business into the future. In this 17-page buyer's guide, Computer Weekly looks at how to optimise 5G, the advantages of advanced communications and what Télécoms Sans Frontières has achieved through harnessing it.

    Download

  • Jargon buster guide to hybrid cloud storage

    In this Jargon Buster guide we bring you definitions for the key concepts in hybrid cloud storage plus in-depth articles on hybrid cloud file and object storage, how to use the cloud as a storage tier and the key decision points when it comes to private cloud vs hybrid cloud.

    Download

  • Object storage: A great fit for large, unstructured data sets

    Object storage is a rising star. In this e-guide we walk you through the key differences between object storage and the currently more mainstream approaches - file and block access. In doing so you'll clearly see the benefits and drawbacks of the object approach, which is to organise data in a flat structure with unique identifiers.

    Download

  • Maximize SOC Potential: Lessons from the 2024 SANS SOC Survey

    The latest 2024 SANS SOC Survey highlights that SOC teams grapple with significant challenges, including lack of automation, staffing constraints, and limited operational visibility, even as their responsibilities expand. Learn key findings from the survey and tips on how to build an automated SOC from Swimlane’s CISO, all in just 30 minutes! Register now for the Maximize SOC Potential: Lessons from the 2024 SANS SOC Survey webinar on Thursday, August 22 at 2 pm ET. You’ll learn: -The pressing need for automation in security operations -How staffing challenges and limited enterprise visibility hinder SOC effectiveness -Tips on how to improve SOC automation & orchestration

    Download

  • SANS Evaluator's Guide to NextGen SIEM

    There’s no question about it: Legacy SIEMs hinder your ability to achieve your security objectives. Traditional solutions are limited and often lack the flexibility to scale and grow as your security needs increase. To combat today’s threats, you need a next-gen SIEM that leverages the architecture and security capabilities that are best suited to detect both known and unknown threats within your environment. But what makes a SIEM “next-gen”? And how do you know if the SIEM technology you’re looking at possesses these requirements? In this on-demand webcast, Christopher Crowley, senior instructor at SANS, and Barbara Filkins, senior analyst at SANS, join Sara Kingsley, senior product marketing manager at LogRhythm, to explain what comprises a modern SIEM solution and share tips for evaluating a next-gen SIEM platform. In this webcast, you’ll learn: How next-gen SIEM capabilities map to the modern security team’s needs The architectural requirements for a solution to support these needs The evaluation steps you can take to select the best SIEM for you The questions you should ask SIEM vendors to support your evaluation process Watch the webcast now to get the tools you need to evaluate and choose a next-gen SIEM that fits the needs of your organization’s requirements.

    Download

  • SANS Evaluator's Guide to NextGen SIEM

    There’s no question about it: Legacy SIEMs hinder your ability to achieve your security objectives. Traditional solutions are limited and often lack the flexibility to scale and grow as your security needs increase. To combat today’s threats, you need a next-gen SIEM that leverages the architecture and security capabilities that are best suited to detect both known and unknown threats within your environment. But what makes a SIEM “next-gen”? And how do you know if the SIEM technology you’re looking at possesses these requirements? In this on-demand webcast, Christopher Crowley, senior instructor at SANS, and Barbara Filkins, senior analyst at SANS, join Sara Kingsley, senior product marketing manager at LogRhythm, to explain what comprises a modern SIEM solution and share tips for evaluating a next-gen SIEM platform. In this webcast, you’ll learn: - How next-gen SIEM capabilities map to the modern security team’s needs - The architectural requirements for a solution to support these needs - The evaluation steps you can take to select the best SIEM for you - The questions you should ask SIEM vendors to support your evaluation process Watch the webcast now to get the tools you need to evaluate and choose a next-gen SIEM that fits the needs of your organization’s requirements.

    Download

  • SANS Evaluator's Guide to NextGen SIEM

    There’s no question about it: Legacy SIEMs hinder your ability to achieve your security objectives. Traditional solutions are limited and often lack the flexibility to scale and grow as your security needs increase. To combat today’s threats, you need a next-gen SIEM that leverages the architecture and security capabilities that are best suited to detect both known and unknown threats within your environment. But what makes a SIEM “next-gen”? And how do you know if the SIEM technology you’re looking at possesses these requirements? In this on-demand webcast, Christopher Crowley, senior instructor at SANS, and Barbara Filkins, senior analyst at SANS, join Sara Kingsley, senior product marketing manager at LogRhythm, to explain what comprises a modern SIEM solution and share tips for evaluating a next-gen SIEM platform. In this webcast, you’ll learn: How next-gen SIEM capabilities map to the modern security team’s needs The architectural requirements for a solution to support these needs The evaluation steps you can take to select the best SIEM for you The questions you should ask SIEM vendors to support your evaluation process Watch the webcast now to get the tools you need to evaluate and choose a next-gen SIEM that fits the needs of your organization’s requirements.

    Download

  • A Computer Weekly buyer's guide to optimising storage

    The implementation of effective storage optimisation has becomean important factor in business. In this 12-page buyer's guide,Computer Weekly looks at cost implications, the hyper-convergedinfrastructure minefield and the alternatives to shared storage

    Download

  • Who is Scale Computing?

    Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. In this presentation, viewers will learn more about Scale Computing and SC//Platform, a complete platform for running applications at the distributed edge with all the software, hardware, and services needed. Recorded in San Francisco as part of Edge Field Day on February 22, 2023.

    Download