Category: IT Analyst

How can organizations use deception tactics to thwart hackers? (w. @AttivoNetworks)

It’s naturally assumed that hackers have the upper hand when it comes to deception because they hide their tactics and methods. With the right tools, the organization can also leverage deception to their advantage. Taking cues from military strategic theory, …

How do you manage heterogeneous data lakes easily and at scale? w. @AtScale

Summary: In this short video learn how to manage heterogeneous data lakes when they span a variety of locations, clouds and workflows. Notable Quote: “…we give you access to the data regardless where it's stored, regardless how it's stored, and …

What is Veeam Availability Orchestrator?

Summary: Backup is king but recovery is queen. The only reason to backup is to recover and having the ability to recover isn’t enough. You’ve got to be able to prioritize, document, practice and test so you’ll be ready when …

Help! I need to manage large vSphere and vCenter environments. Call up: @RuneCastBiz

Managing large vSphere and vCenter environments is a complex task but you don’t have to feel like you’re alone. There’s a plethora of information and tribal knowledge out there stored in areas ranging from the VMware knowledge base to social …

Could you stop an "Edward Snowden" on your network? Learn how to w. @WheelSystems

Video Summary: The concept is to record every network packet movement associated with your privlieged users so you can replay it at a later date. This is a Privileged Access Management (PAM) system that serves as a deterrent as well …

How & why to move workloads from bare metal to hypervisor to cloud? with @DH2i

In this short video, learn how & why having the ability to move workloads from different operating environemts, whether server, hypervisor or cloud provides advantages to your datacenter. With this type of flexilibity a variety of advantages impact res…

Original