Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Episode 3 | Ryan Cooke on CSPM, DSPM and Data Security in the Cloud

In this episode, the hosts and guest discuss the importance of data security posture management (DSPM) and its role in protecting sensitive data. They explore the evolution of the cybersecurity and data security market over the years, highlighting the challenges and advancements in securing data in cloud environments. The conversation also touches on the vendor landscape, the complexity of selecting security tools, and the need for organizations to invest in data security. The key takeaways include the overwhelming number of security tools available, the importance of aligning security goals with business risks, and the impact of regulations on data security.

Ivanti Neurons for EASM in 105 seconds

Through its agentless approach to monitoring, Ivanti Neurons for EASM provides complete visibility of all the internet-facing assets across an organization’s attack surface. It also delivers actionable intelligence on exposures impacting those assets that enables organizations to minimize their attack surface, thereby lowering the risk of data breaches, fines and downtime.. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

And What About my User Experience?

Monitoring backend signals has been standard practice for years, and tech companies have been alerting their SRE and software engineers when API endpoints are failing. But when you’re alerted about a backend issue, it’s often your end users who are directly affected. Shouldn’t we observe and alert on this user experience issues early on? As frontend monitoring is a newer practice, companies often struggle to identify signals that can help them pinpoint user frustrations or performance problems.

Azure Mangement Platform - Turbo360

Turbo360 (Formerly Serverless360) is an advanced Cloud Management platform that empowers you with significant Azure Cost savings and Infra Monitoring for complex Azure Environments. This tool has helped customers experience annual savings of up to 30% through advanced cost monitoring, granular analysis, optimization insights, and reduced incident resolution time by 80% through holistic infra monitoring across multiple Azure resources with business context.

NinjaOne Speedrun: From zero to fully functional IT in 60 minutes

Does the thought of switching to a new endpoint management solution make you go, “ugh!”? Worried about the time, effort, and frustration that will go into migration and implementation? Fear not! NinjaOne is easy to setup, implement, and use — 92% of customers say it takes them less than a month to fully implement NinjaOne (and 58% say it takes less than a week). Join this NinjaOne Speedrun webinar and conquer IT setup in 60 minutes flat. Our Field CTO Jeff Hunter will be your guide in this fast-paced session, showing you exactly how to.

What is Ransomware and how to prevent ransomware attacks

Find out what ransomware is and its types in this super easy beginner’s guide. This quick video guide explains how ransomware attacks work and the steps enterprises can take to mitigate ransomware. The video also answers questions on – what are the stages of a ransomware attack, what are the various ransomware encryption techniques, and best practices to prevent ransomware attacks.