vSphere 7 Best Practices

ntpro
This webinar is for VMware customers and partners, who sell, use, deploy, configure, and manage vSphere systems on a daily basis, and are interested to hear and learn about new features and best practices of using the rich feature set of VMware vSphere 7.X.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Market Snapshot Report Virtual & Cloud-based Labs

Virtualization Vmware storage virtualization

Voke analyst Theresa Lanowitz and her team recently conducted an independent survey of over 500 participants from both technology and non-technology companies of varying sizes to explore their use of virtual and cloud-based labs and the results they experience.
Watch Now

How to Increase the Probability of a VNF Working with Your Cloud, presented by Mirantis & Metaswitch

Mirantis

NFV experts discuss how to create a model for VNF validation that helps ensure compatibility with your specific cloud. for a webinar on VNF validation and how to make sure that that VNF you want to use will actually work with your cloud, and you can view the replay here.
Watch Now

Webinar: Container Security Shifts Left to Get it Right – Real-World Lessons

Sxcentral

Containers have become the preferred application development and deployment platform for new applications in both enterprises and service providers. In addition, companies are also looking to repackage and deploy existing applications within container environments. However, one of the most common concerns brought up by CIOs, CSOs and infrastructure technologists alike, is that of potentially reduced security – especially when compared to VM platforms. The reality is quite different. Containers can be a vehicle for improving data center and application security, but it does take putting in the right processes and laying the right foundation.
Watch Now

Security Hardening for Containerized Deployments across Multi-Clouds

In this webinar, we will examine how to add robust cryptography to the containerized applications that process sensitive data. Our expert speakers will describe how certified cryptographic capabilities -including key generation, digital signing, and data encryption - can be built-in within containerized applications, using hardware security modules (HSMs) to enhance security and facilitate auditing and regulatory compliance.
Watch Now