Bridging the Digital Divide: Community Wireless Broadband

City-driven wireless broadband initiatives have the power to expand work and education opportunities for people in underserved communities. In this LinkedIn Live session, CDCT experts Jason Rader, Jeremy Nelson, and Rob Parsons join Collin Boyce from the City of Tucson to discuss how closing the digital divide improves the quality of life for residents and transforms municipalities.

Pay as you consume with As a Service

Data is the anchor across most organizations’ cloud strategies. When there are missteps in how companies align their data, they can increase their cloud costs and associated risk by 2-3x. Keystone provides a bridge between private, hybrid and public cloud, allowing organizations to align their data management strategy to overall business objectives.
Key takeaways include: 

  • How IT leaders focused on risk mitigation and cost management can accomplish their goals while continuing transformation efforts.
  • Options for subscribing to the amount of storage and compute hardware you need, while benefiting from on-premises cloud consumption services.
  • The expertise required to align Keystone with public cloud, networking, security and more, and develop a cohesive strategy.

Insight, MAXIMUS, and AWS: A cloud transformation journey

Digital transformation is a huge undertaking in the best of times. This COVID era adds even more challenges. Watch theCUBE’s coverage of AWS re:Invent 2020 and hear Insight’s Steve Zipperman joined by Kevan McCallum Jr. of MAXIMUS. They discuss how the two companies worked together for a successful cloud transformation that included moving 6,000 workloads and 160+ applications, why they chose AWS, and the importance of finding a trusted transformation partner — now more than ever.

Understanding Ransomware Immutability, Detection, and Remediation

As the saying goes with ransomware attacks, “It’s not a matter of if, but rather when.” In this LinkedIn Live video, CDCT experts Jason Rader, Mike Morgan, and Mike McLain extend that to examine the third part of the saying that companies and organizations need to address, which is, “Are we prepared when it does happen?” They look at a bit of the history behind these attacks and break down the importance of taking a full-stack approach to data and network protection.

Securing the Edge: Connectivity, Access, and Security in a Dispersed Environment

The remote work boom and increase in IoT has led to the expansion of the edge and ultimately opened enterprise up to attack. Recently, Jason Rader and Eron Reece of CDCT, and Larry Lunetta, VP of Wireless LAN and Security Solutions Marketing at Aruba, a Hewlett Packard Enterprise company, discussed the top challenges in edge security today. They explore the role of SD-WAN, Zero Trust, and remote access solutions in creating a strong security framework to control access at the edge and across today’s dispersed IT environments.

Bridging the Gap Between Private, Hybrid and Public Clouds

Data is the anchor across most organizations’ cloud strategies. When there are missteps in how companies align their data, they increase their risk and cost by 2-3x. Keystone provides a bridge between private, hybrid and public clouds, aligning objectives. Watch as Kent Christensen, Insight’s CDCT Practice Director, and Sunitha Rao, NetApp’s Sr Director Product Management, discuss the latest in NetApp’s data management story and where Keystone fits in.
Key takeaways:

  • How IT leaders focused on risk mitigation and cost management can accomplish their goals while continuing transformation efforts.
  • Options for subscribing to the amount of storage and computer hardware you need, while benefiting from on-premises cloud consumption services.
  • The expertise required to align Keystone with public cloud, networking, security and more, and develop a cohesive strategy.

Intelligence and Innovation at the Edge: Effective Compute for IoT

How do we work with data that doesn’t live in a data center or in the cloud? As IoT devices evolve to serve more data-rich applications at the edge (think oil rigs, self-driving cars, smart home devices, and more), the need to enable real-time, low-latency decisions demands more powerful compute capabilities. In this session, Principal Architect Andrew Nelson and Senior Consultant John O’Shaughnessy explain how to understand and implement compute solutions that leverage high-value data at the edge for effective decision-making.

Self Service Automation for Private and Public Clouds

Are you challenged by supporting rapidly changing needs across hybrid and multi-cloud environments? That is because infrastructure and application provision are semi-automated, with multiple tools and scripts, which leads to inefficiencies, low productivity, complexity, and security and compliance risks. Join Corey Carroz, Insight’s senior solutions architect for an overview and practical tips on how IT teams are getting the customized services they need where they need them. This webinar will cover how automation helps to:

  • Reduce operational costs through efficiency gains
  • Align IT priorities with business goals
  • Secure adoption of new technologies across the business

Care and Compliance Are at Risk: How To Improve Healthcare Security

Healthcare organizations face unprecedented risk of cyberattack, yet the dynamic needs and realities of these organizations can make it difficult to achieve an effective security posture that meets compliance and regulatory requirements. In this LinkedIn Live video, CDCT experts Jason Rader, Mark Walker, and Jeremy Nelson look at how healthcare leadership, IT security and networking teams, and compliance and regulatory professionals can work together to implement security best practices that protect the organization and ultimately support patient care.

Create Support for Modern IT Operations With SD-WAN

As the latest iteration of WAN, Software-Defined WAN (SD-WAN) offers increased visibility and efficiency. So why aren’t more organizations embracing it? In this recent LinkedIn Live video, CDCT experts Jason Rader, Phillip Little, and Mike Moore identify the benefits and best practices for deploying SD-WAN and discuss how the SASE model incorporates the best of cloud security and cloud networking for superior agility.

Displaying results 71-80 (of 140)
 |<  <  4 - 5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13  >  >| 

Webcasts