ComputerWeekly.com Research Library

Powered by Bitpipe.com

.NET IT Downloads

  • What is SASE? A Practical Guide to Security

    Sponsored by: Cradlepoint

    Working to boost their network security postures, many businesses have harnessed the power of zero trust and SD-WAN. In under thirty minutes, two leaders from Cradlepoint explore how your business can implement such capabilities in the NetCloud Exchange architecture. Watch the demo now to unlock these insights.

  • Voltage Fusion Overview and Introduction

    Sponsored by: OpenText

    This video provides an overview of a data discovery solution designed to equip data protection and risk management professionals with the tools they need to quickly find, secure, and protect sensitive and high-value data. Tune in to learn how you can leverage the service to unlock complete visibility across structured and unstructured data silos.

  • Demo: Bridging observability and automation with Event-Driven Ansible

    Sponsored by: Red Hat & Dynatrace

    This product demo illustrates how you can save valuable time by integrating observability data with an automation platform to enable automated remediation. Tune in to learn how you can maximize the value of your observability stack and simplify troubleshooting processes for your IT teams.

  • Red Hat OpenShift Couchbase Operator install and Cluster Configuration

    Sponsored by: Red Hat and Couchbase

    This video provides a step-by-step demo on how to install the Red Hat OpenShift Couchbase Operator as well as perform a Couchbase cluster configuration. Tune in to learn how you can get up and running quickly.

  • Couchbase Solution: Catalog and Inventory

    Sponsored by: Red Hat and Couchbase

    Businesses with large and dynamically changing portfolios require an agile and flexible data infrastructure that allows them to deliver relevant product content and a real-time view of inventory throughout the customer experience to drive every browse closer to a buy. Tune into this product demo to learn how you can use one.

  • Couchbase Cluster demo with Red Hat OpenShift and Twitter

    Sponsored by: Red Hat and Couchbase

    In this product demo, you will learn how to configure a multi-node Couchbase Cluster and deploy an app that consumes Tweets from Twitter with specific hashtags. Tune in to learn more.

  • Backup and DR for Databases on OpenShift with Gaurav Rishi & Michael Courcy

    Sponsored by: Red Hat & Veeam

    This webcast takes a deep dive into backup and disaster recovery for databases on OpenShift, and specifically how Kasten by Veeam can assist in those efforts. Tune in to learn how you can leverage the solution to enhance backup and restore, disaster recovery, and application mobility for your IT environment.

  • Couchbase Cross-Data-Center-Replication (XDCR) demo

    Sponsored by: Red Hat and Couchbase

    How can you strengthen your organization’s data synchronization and replication capabilities to improve data management workflows? Tune into this product demo to learn what cross-data-center-replication (XDCR) is, how you can use it, and why it’s crucial for effective data management across multiple data center locations.

  • Network monitoring and troubleshooting

    Sponsored by: LogicMonitor

    As their hybrid IT infrastructures grow more complex, many organizations have turned to a unified monitoring platform to detect any issues, especially those posed by increasingly complex cyberthreats. Check out this video to learn about one such platform.

  • How Product leaders drive operational excellence

    Sponsored by: Airtable

    Watch this product demo to see how leading organizations like Netflix, Shopify, and Amazon transform work with Airtable. At the end, you will understand how teams democratize information accessibility with a single source of truth, visualize the same information in different ways, and automate work to free up time. Tune in to learn more.

  • Immutable Microsoft 365 Data

    Sponsored by: Veeam Software

    Check out this step-by-step demo to learn how your team can create immutable backup copies to any object storage with the help of Veeam Backup.

  • Veeam Data Platform: VM Backup and Instant Recovery Demo

    Sponsored by: Veeam Software

    Backing up and recovering virtual machines is a critical part of any modern data protection strategy. Watch this product demo to learn how you can leverage the Veeam Data Platform to enable VM backup and instant recovery and better secure your organization’s virtual environment.

  • Endace Video 8

    Sponsored by: Endace

    To protect your network from today’s increasing and advancing cyberthreats, you need reliable, fast-acting incident response tools. This video illustrates how an integration between Endace Network History and Vectra can be a worthwhile addition to your incident response technologies. Watch now to learn more.

  • Endace Video 7

    Sponsored by: Endace

    In this video, Endace’s Michael Morris demonstrates an integration and workflow between Endace, Cisco Firepower and Splunk Enterprise. View now to understand how the workflow can enable analysts to more confidently remediate security incidents.

  • (Demo) How to build an API marketplace with Amplify Enterprise Marketplace

    Sponsored by: Axway

    For organizations looking to expand digital services into new use cases and new markets, there is a platform that allows you to quickly create and develop your own marketplace of APIs. With APIs completely packaged and neatly categorized, your internal and external stakeholders will be more productive. Read on to learn more about it.

  • Endace Video 4

    Sponsored by: Endace

    The cyber landscape is dense with threats. Therefore, the question is not whether your business will have to respond to a security incident, but rather how quickly will your business be able to. And you want your answer to be “very quickly.” View this video to learn how you can speed your incident response with Endace and Palo Alto Networks.

  • Endace Video 5

    Sponsored by: Endace

    Today’s cyber landscape is crowded with threats, forcing every organization to proceed with caution. And proceeding with caution means ensuring a strong incident-response strategy. This video explains how you can strengthen your strategy by integrating EndaceProbe with Splunk SOAR. Watch now to learn more.

  • Endace Video 2

    Sponsored by: Endace

    Want to accelerate the resolution of security attacks? This demo maps out how you can do so by leveraging an integration workflow from Cisco Stealthwatch to EndaceProbe. View now to learn more.

  • Endace Video 6

    Sponsored by: Endace

    Your network, like every network, is in danger of being attacked by the many emerging and complex threats in the cyber landscape. So, how can you augment your defense measures? View this video to learn about one avenue toward enhanced network security: running Cisco Firepower Virtual Firewall on EndaceProbe.

  • ServiceNow Video 1

    Sponsored by: ServiceNow

    ServiceNow’s Field Service Management application helps organizations manage work tasks performed on location. This brief demo shows how the service works with examples of how to minimize time to resolution with things like an POS network outage and how to schedule a variety of assignments for completion. Watch the demo.

  • HackerOne Bug Bounty Demo

    Sponsored by: HackerOne

    Cybersecurity is only as strong as its weakest link. HackerOne Bug Bounty uses a crowd sourcing model to pay freelance hackers for every security weakness they find in your system, thus facilitating high volume and high-quality testing. Watch this full demonstration and see if Bug Bounty is the testing solution you need.

  • A live demonstration of Acronis Cyber Protect

    Sponsored by: Acronis

    Cybersecurity is a constant battle against malicious actors. In order to win you must ensure that you are fully prepared with the weapons you need to defend your organization against hackers. Tune into this demonstration to see firsthand how Acronis Cyber Protect can defend your organization against cyberthreats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.