Archived Events
During this webinar, attendees learned how to:Collect logs, metrics, snapshots, and trace at scaleMonitor your attack surface with near real-time dashboardsDetect and respond to anomalies with machine learning detectionShare your alerts with your Security Operation Center or ...
This webinar covered:Overview of Pub/Sub, Apache BEAM, DataFlow, and BigQueryConnecting to existing Pub/Sub SystemsCreating Apache BEAM pipelines to move data into BigQueryViewing geospatial data in BigQuery
This webinar covered:Patterns for creating microservices from monolithsUsing Cloud Run to deploy serverless workloadsHow to use Istio to monitor and secure your microservices
This webinar covered:A high-level overview of what Google can offer to support remote work Google Meet and ChatGoogle Drive, show sharing and security, and MSFT compatibilityYouTube streaming and how to broadcast
Attendees of this webinar learned about:Google Cloud's easy to use machine learning tools to create and train models for predictive security analyticsGoogle's security first strategy - secure by design, secure by defaultNYC Cyber Command use case
During this webinar, attendees learned:Google Data Analytics Platform Overview - Benefits and Value PropositionOverview of Data Integration capabilities in Google Cloud PlatformGoogle Cloud Data Fusion for Data IngestionGoogle BigQuery for Data Analytics
During this webinar, attendees learned how Prisma Public Cloud can help you achieve the following: Visibility Compliance Assurance Security Governance Anomaly Detection and Remediation
During this webinar, attendees learned:Key reasons to modernize to GKEAn overview of Migrate for AnthosA walkthrough of the Lift and Modernize approach to a common workload
One of the widespread assumptions about G Suite is that it only includes Gmail, Calendar, and Drive, or considered not enterprise friendly for work. This webinar discussed breaking the fallacy around G Suite and exhibited the power of collaboration you can bring to improve employee ...
Government agencies continue to modernize by expanding their services and migrating workloads to hybrid and cloud environments. These actions create rapid growth in the volume of log data generated by devices and systems. Security professionals rely on these logs for audit information, forensic evidence, and to detect ...