Webinars

Webinars

  • Migration Tips to Upgrade from Citrix ADC to VMware for Load Balancing

    The VMware NSX Advanced Load Balancer (Avi) delivers load balancing, web application firewall (WAF) and container ingress as a single elastic, highly automated, and programmable fabric. Enterprises migrating to Avi from Citrix hardware or virtual appliances find that they can future-proof app delivery with a single platform for data center, cloud, and container-based apps. Learn best practices from a team that has helped enterprises successfully move away from complex deployments: · Scope a migration project and avoid the pitfalls · Simplify day 0 deployment and day 1+ operations · Automate many day-to-day application delivery tasks · Navigate an integrated platform for analytics Read More

  • Why Avi? – The Cloud-Ready Load Balancer

    This session gives an overview of VMware NSX Advanced Load Balancer (Avi) with a modern load balancing architecture. Learn how to migrate easily from Citrix ADC for all use cases, and: · Eliminate capacity management challenges and over provisioning · Manage traffic spikes with on-demand autoscaling · Deploy high performance virtual desktops in record time · Observe and analyze application performance, security posture, and end user issues · Future-proof with a single platform for data center, cloud, and container-based app Read More

  • Future Proof Load Balancing – A Panel of Experts

    Join us for a panel style interview which will explore how modern, cloud-ready load balancing can give businesses their automation advantage and provide consistent application services in a multi-cloud environment. You will hear first hand about: · The journey to agile load balancing and application security · The lightbulb moments to look for alternatives to hardware load balancers like Citrix ADC · Benefits realized after real-world deployments Read More

  • CISO Strategies for the evolving role

    The Role of the Chief Information Security Officer especially in Gen-Z / Digital enterprises (companies usually born out of the cloud, not more than a decade ago, possibly experiencing a growth spurt) is evolving swiftly. While the CISO still carries the burden of expectations inherited from legacy regulations, standard compliance obligations, and customers on tenterhooks; the path to security is now paved with greater dangers of a wider threat landscape, easily accessible attack vectors, and technology that's developing faster than it can be secured. Today's CISO needs to relook at the strategy to secure this dynamic technology arena which seems to have no boundaries, no trust, and tools that are dime a dozen. So how does the CISO do it? How does he not give in to the ultimate FUD (Fear, Uncertainty, and Doubt)? Does the solution lie in tools? people? technology? Here's a set of simple, back-to-basics refreshers on what the CISO needs to REALLY focus on, to sustain, survive and secure the fort. Read More

  • Okta Insights – The State of Modern Identity

    IDC predicts that by the end of 2022, half of the Asia/Pacific economy will be based on or influenced by digital technologies. As a result, organisations will increase leverage of digital technologies to address the rapidly evolving needs of hybrid work, consistent customer experiences and operational autonomy. Identity management solutions have become the cornerstone to manage user identities better. Identity security was the top area of focus for more than 40% of organisations surveyed in IDC's Asia/Pacific Security Services Survey across 879 organisations in the Asia/Pacific region. Although most enterprises have already implemented low-hanging opportunistic and incremental technologies such as multifactor authentication, about 80% of enterprises intend to continue to retain or increase their spending in advanced authentication/multifactor authentication during 2022. Join us in a session to discover where further gains are expected to bear fruit, and what IDC's expectations on the shift to cloud identity services will look like in the next 5 years. Read More

  • How to build a cloud-first DevOps approach

    Are you looking to implement DevOps, unlock the potential of the cloud, or scale adoption across your organisation? We discuss the best cloud-first DevOps approaches to make sure your processes are consistent and repeatable. DevOps is centered around the continuous improvement of software, moving away from rigid methodologies. But this agile mindset needs to apply to the people, processes, and tools that make it happen too. As organisations change and infrastructure and support needs increase, those changes put a strain on compute, storage, network, and software, and the teams that support them. Read More

  • Supporting and Defending Virtual Environments

    Many organizations have adopted or are currently adopting containerization as a strategy for deploying their applications. This provides numerous benefits but also presents challenges when security is taken into consideration, the least of which is tool sprawl. Join us as Dane Grace helps security teams identify the layers of technology and phases of deployment that they need to address. Read More

  • Logicworks: Modernize Your Applications to Accelerate Growth

    Many native enterprises cannot take full advantage of cloud services because of legacy applications. It’s not realistic to refactor every application -- but which modernization projects can get us the most benefit in the cloud? In this presentation, learn how to identify opportunities to refactor your application, prioritize those projects, and help your enterprise make the most of your cloud deployment at scale. Read More

  • Top Questions Investors Miss & Due-Diligence When Investing in Startups

    The startup scene keeps growing year after year. It brings more and more interest from traditional investors. However, investing in startups is highly risky and can bring down the entire portfolio if not managed properly. The correct due-diligence process can shine the light and help you identify the potential winners. During this presentation, Alexey will share the insights he and his team gained after managing hundreds of startup product development projects and how to use it during the pre-investment due-diligence process. This approach is used in various startup investment groups Alexey is associated with. Read More

  • The Egregious 11 — Defending Against the CSA Top Threats

    The cloud carries unique threats. The cloud Security Alliance (CSA) is rapidly becoming the OWASP of cloud security standards. DevOps, containers, micro services, APIs, and orchestration are table stakes for effective cloud-native applications. Securing these software interfaces, configurations, and processes is NOT a trivial task. Furthermore, automation isn’t a panacea; in fact, it can mask critical security flaws that propagate. This session will describe the Top Threats to Cloud Computing (aka “the Egregious Eleven”), how to identify and mitigate these threats, and how they fit into a cloud-native security program. Read More