.NET IT Downloads
-
What is SASE? A Practical Guide to Security
Sponsored by: CradlepointWorking to boost their network security postures, many businesses have harnessed the power of zero trust and SD-WAN. In under thirty minutes, two leaders from Cradlepoint explore how your business can implement such capabilities in the NetCloud Exchange architecture. Watch the demo now to unlock these insights.
-
Voltage Fusion Overview and Introduction
Sponsored by: OpenTextThis video provides an overview of a data discovery solution designed to equip data protection and risk management professionals with the tools they need to quickly find, secure, and protect sensitive and high-value data. Tune in to learn how you can leverage the service to unlock complete visibility across structured and unstructured data silos.
-
Demo: Bridging observability and automation with Event-Driven Ansible
Sponsored by: Red Hat & DynatraceThis product demo illustrates how you can save valuable time by integrating observability data with an automation platform to enable automated remediation. Tune in to learn how you can maximize the value of your observability stack and simplify troubleshooting processes for your IT teams.
-
Red Hat OpenShift Couchbase Operator install and Cluster Configuration
Sponsored by: Red Hat and CouchbaseThis video provides a step-by-step demo on how to install the Red Hat OpenShift Couchbase Operator as well as perform a Couchbase cluster configuration. Tune in to learn how you can get up and running quickly.
-
Couchbase Solution: Catalog and Inventory
Sponsored by: Red Hat and CouchbaseBusinesses with large and dynamically changing portfolios require an agile and flexible data infrastructure that allows them to deliver relevant product content and a real-time view of inventory throughout the customer experience to drive every browse closer to a buy. Tune into this product demo to learn how you can use one.
-
Couchbase Cluster demo with Red Hat OpenShift and Twitter
Sponsored by: Red Hat and CouchbaseIn this product demo, you will learn how to configure a multi-node Couchbase Cluster and deploy an app that consumes Tweets from Twitter with specific hashtags. Tune in to learn more.
-
Backup and DR for Databases on OpenShift with Gaurav Rishi & Michael Courcy
Sponsored by: Red Hat & VeeamThis webcast takes a deep dive into backup and disaster recovery for databases on OpenShift, and specifically how Kasten by Veeam can assist in those efforts. Tune in to learn how you can leverage the solution to enhance backup and restore, disaster recovery, and application mobility for your IT environment.
-
Couchbase Cross-Data-Center-Replication (XDCR) demo
Sponsored by: Red Hat and CouchbaseHow can you strengthen your organization’s data synchronization and replication capabilities to improve data management workflows? Tune into this product demo to learn what cross-data-center-replication (XDCR) is, how you can use it, and why it’s crucial for effective data management across multiple data center locations.
-
Network monitoring and troubleshooting
Sponsored by: LogicMonitorAs their hybrid IT infrastructures grow more complex, many organizations have turned to a unified monitoring platform to detect any issues, especially those posed by increasingly complex cyberthreats. Check out this video to learn about one such platform.
-
How Product leaders drive operational excellence
Sponsored by: AirtableWatch this product demo to see how leading organizations like Netflix, Shopify, and Amazon transform work with Airtable. At the end, you will understand how teams democratize information accessibility with a single source of truth, visualize the same information in different ways, and automate work to free up time. Tune in to learn more.
-
Immutable Microsoft 365 Data
Sponsored by: Veeam SoftwareCheck out this step-by-step demo to learn how your team can create immutable backup copies to any object storage with the help of Veeam Backup.
-
Veeam Data Platform: VM Backup and Instant Recovery Demo
Sponsored by: Veeam SoftwareBacking up and recovering virtual machines is a critical part of any modern data protection strategy. Watch this product demo to learn how you can leverage the Veeam Data Platform to enable VM backup and instant recovery and better secure your organization’s virtual environment.
-
Endace Video 8
Sponsored by: EndaceTo protect your network from today’s increasing and advancing cyberthreats, you need reliable, fast-acting incident response tools. This video illustrates how an integration between Endace Network History and Vectra can be a worthwhile addition to your incident response technologies. Watch now to learn more.
-
Endace Video 7
Sponsored by: EndaceIn this video, Endace’s Michael Morris demonstrates an integration and workflow between Endace, Cisco Firepower and Splunk Enterprise. View now to understand how the workflow can enable analysts to more confidently remediate security incidents.
-
(Demo) How to build an API marketplace with Amplify Enterprise Marketplace
Sponsored by: AxwayFor organizations looking to expand digital services into new use cases and new markets, there is a platform that allows you to quickly create and develop your own marketplace of APIs. With APIs completely packaged and neatly categorized, your internal and external stakeholders will be more productive. Read on to learn more about it.
-
Endace Video 4
Sponsored by: EndaceThe cyber landscape is dense with threats. Therefore, the question is not whether your business will have to respond to a security incident, but rather how quickly will your business be able to. And you want your answer to be “very quickly.” View this video to learn how you can speed your incident response with Endace and Palo Alto Networks.
-
Endace Video 5
Sponsored by: EndaceToday’s cyber landscape is crowded with threats, forcing every organization to proceed with caution. And proceeding with caution means ensuring a strong incident-response strategy. This video explains how you can strengthen your strategy by integrating EndaceProbe with Splunk SOAR. Watch now to learn more.
-
Endace Video 2
Sponsored by: EndaceWant to accelerate the resolution of security attacks? This demo maps out how you can do so by leveraging an integration workflow from Cisco Stealthwatch to EndaceProbe. View now to learn more.
-
Endace Video 6
Sponsored by: EndaceYour network, like every network, is in danger of being attacked by the many emerging and complex threats in the cyber landscape. So, how can you augment your defense measures? View this video to learn about one avenue toward enhanced network security: running Cisco Firepower Virtual Firewall on EndaceProbe.
-
ServiceNow Video 1
Sponsored by: ServiceNowServiceNow’s Field Service Management application helps organizations manage work tasks performed on location. This brief demo shows how the service works with examples of how to minimize time to resolution with things like an POS network outage and how to schedule a variety of assignments for completion. Watch the demo.
-
HackerOne Bug Bounty Demo
Sponsored by: HackerOneCybersecurity is only as strong as its weakest link. HackerOne Bug Bounty uses a crowd sourcing model to pay freelance hackers for every security weakness they find in your system, thus facilitating high volume and high-quality testing. Watch this full demonstration and see if Bug Bounty is the testing solution you need.
-
A live demonstration of Acronis Cyber Protect
Sponsored by: AcronisCybersecurity is a constant battle against malicious actors. In order to win you must ensure that you are fully prepared with the weapons you need to defend your organization against hackers. Tune into this demonstration to see firsthand how Acronis Cyber Protect can defend your organization against cyberthreats.