Growing Your Business With the Intelligent Edge: Securing the Edge

Edge devices are often located in highly visible and accessible locations. They may have confidential or sensitive data on them, as well as proprietary software and workloads. So, what does security look like when the device itself can be physically removed or manipulated by any potential threat actor?

Watch this lively conversation with four Insight security and infrastructure experts to hear anecdotes from the field, learn strategies for edge device security, and find out how to develop a successful edge security program.

DevOps Is More Than Automation

Shift your DevOps mindset from just technologies and skill sets to teams and cultures and watch your team flourish. Learn about the relationship between DevOps, Agile, and your organization — and how to gain optimal results — in this on-demand webinar.

Growing Your Business With the Intelligent Edge Computer Vision Use Cases

Part of the spectrum of Artificial Intelligence (AI), computer vision focuses on creating digital systems that can view, process, and respond to visual input. In this conversation, a continuation of our previous session on leveraging the intelligent edge, Insight experts discuss the definition of computer vision, the key components of a computer vision-powered application, and how to best leverage computer vision to power innovative business use cases.

Delivering a Differentiated IT Experience With APEX

Join Insight and Dell Technologies to discover how APEX, a flexible consumption model, helps you simplify digital transformation. This As a Service offering helps you leverage proven technology within a world-class portfolio of As a Service IT infrastructure — to deliver flexible IT on demand from trusted partners.

In this session led by Insight’s Chris Kapusta, senior manager, and Dell Technologies’ Adam Smolka, senior director, you’ll learn:

  • What is APEX and how it enables digital transformation
  • Top challenges that a consumption model can help solve
  • Ways to take control of your IT infrastructure security
  • Key examples on how APEX can allow you to scale up and down to pay for what you use

Expand Your Horizons — Growing Your Business With the Intelligent Edge

When it comes to growing your business, intelligent edge holds tremendous potential to drive transformation and improve outcomes. In this video, our experts discuss what it means to redefine intelligent edge so it incorporates local compute, AI, and data analytics to inform your decision-making processes and take your business to the next level.

Getting It Done — Stories in a CI/CD Environment

Help your team efficiently increase response time and enhance features by bringing in more detailed feedback from customers in your Continuous Integration and Continuous Delivery (CI/CD) environment. Watch this webinar to see how unique stories can make a difference in quality.

Data Protection Best Practices — from Risk Mitigation to Incident Response

Your data is valuable — and cyber attackers know it. The threat of ransomware has surged drastically in recent years, and no business is safe. How do you know you’re prepared? As a business leader, it can be difficult staying up to date on ever-evolving security best practices and understanding which solutions are worth your investment.

Join Insight’s Chris Kapusta, senior manager, Clay Heuckendorf, senior architect, and Mike Mclain, field architect, as they discuss the value of a multilayered approach, modern platforms, and more.

Storage as a Service — Keystone

Cloud offers scalability and speed, while on-premises solutions provide better control and performance. Either choice requires investment and taking on some level of risk. So, how do you decide where you store your data?

Join Insight’s Kent Christensen, Practice Director, and Chris Collins, NetApp Keystone Engineering, to learn more about NetApp’s Keystone As a Service offering delivered through Insight.

Key takeaways include:

  • How to mitigate risk by eliminating or alleviating CapEx
  • Aligning costs with usage through consumption-based billing
  • Options for subscribing to storage and compute hardware
  • Ways to align your storage model with public cloud, networking, and security

Creating a Cloud-first Security Strategy with SASE

As IT environments become more complex, security challenges emerge, especially related to cloud. In this video, Insight experts explore how Secure Access Service Edge (SASE) creates a cloud-centric approach to security and unifies traditionally siloed networking and security services.

Community Wireless Broadband: Hidalgo County Is Bridging the Digital Divide

Situated in south Texas, Hidalgo County was one of many areas hit hard by the pandemic. A key concern was connectivity — with stay-at-home orders issued, how would students continue their education?

This conversation illuminates the use cases, considerations, and benefits for community wireless broadband. Hear from Insight experts and representatives from Hidalgo County on the real-world experience of planning, designing, and implementing a community Wi-Fi mesh network — from collaborating with school districts and leveraging CARES Act funding, to installing more than 3,000 access points to cover a broad geographic region.

Displaying results 21-30 (of 140)
 |<  <  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10  >  >|