-
25.4.2022
Securely to the clouds and beyond: Secure SD-WAN as a Service
Author: Johan Camps
Learn how to combine the best of security and connectivity in a single managed service to deliver a great user experience and compliance and agility for the business.
-
20.4.2022
SD-WAN and SASE – The journey to a more secure network
Author: Martin Holm
Learn how to provide high-performance, scalable and secure network to all employees, no matter where they are, using SD-WAN and SASE approach.
-
21.12.2021
Log4j - one week in
Author: Jan Bervar
What you need to know now about Log4j and how to be better prepared for the similar threats in the future.
-
16.4.2020
Securing diverse IT environments with Cisco Tetration
Author: Luka Dolenec, Jakob Jozelj
Modern applications and workloads are dynamic and distributed, but the majority of data centers are secured with traditional perimeter-only mechanisms. Learn how Cisco Tetration can help you protect multicloud and dynamic data center environments.
-
13.2.2020
Microsoft Managed Security Services
Author: Eugen Rusen
Envisioning workshop for Managed Security as a Service that empowers organizations on their Cloud and Zero Trust journeys.
-
30.3.2017
Dude, where's my (cloud) firewall?
Author: Jan Bervar
Using the public cloud securely requires some rethinking of your security architecture. Cloud security is not about the trust you have in a cloud provider, but rather about building appropriate security controls.
-
01.12.2016
Cloud Application Security
Author: Jan Češčut
Learn how to allow secure cloud app usage that doesn't threaten your system security or your productivity. Watch a practical demo of how to discover cloud applications used in your environment, how to control their usage, and protect your organization.
-
07.7.2016
Azure Rights Management
Author: Jan Češčut
How can you ensure, that your documents are only read by the persons they were intended for? Watch the video and learn how to use Azure Rights Management Services (RMS) to protect your organization from intentional or accidental data leaks.
-
18.4.2016
The Soft, Warm Underbelly of the Cloud
Author: Jan Bervar
Cloud automation is a complex collection of software, prone to cascading failures, and exposed to an untrusted population of users. How can it be exploited, what are the consequences, and how can we control the risks involved?
-
17.12.2015
Security is not the Issue, Trust is
Author: Robert Turnšek
Data centers of global IT cloud providers are built to last and can and will withstand just about anything – hardware, software and security wise. The only notable issue remaining with them is therefore trust related.