Remove Architecture Remove Cloud Remove Webinar
article thumbnail

VPN vs. ZTNA: Cisco tackles pros and cons

Network World

Its no secret that more modern approaches to remote access have been usurping VPNs as organizations adapt to the realities of a more distributed workforce, increasingly cloud-based applications, and heightened security threats. The days of relying solely on traditional VPNs for remote access could be over.

article thumbnail

Sustainability, grid demands, AI workloads will challenge data center growth in 2025

Network World

Data centers this year will face several challenges as the demand for artificial intelligence introduces an evolution in AI hardware, on-premises and cloud-based strategies for training and inference, and innovations in power distributionsall while opposition to new data center developments continues to grow.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

23 April Webinar: Refreshing Your Data Strategy for the New Age of Hybrid Cloud Computing

CTOvision

On Thursday April 23 at 2pm Eastern/11am Pacific, I’ll be participating in a webinar I hope you will find of interest. This online discussion will provide insights into how data architectures can be improved in the age of hybrid cloud computing.

Cloud 239
article thumbnail

Live Data Breach Webinar Featuring Dave Shackleford

CTOvision

Widely known security practitioner Dave Schackleford is presenting a webinar on Thursday 15 may at 2pm Eastern that should be of high interest to any enterprise technologist seeking to understand the dynamics of the modern data breach. By Bob Gourley. The following is from the invitation: You’re a target for data breach.

article thumbnail

Partner Webinar: A Framework for Building Data Mesh Architecture

Speaker: Jeremiah Morrow, Nicolò Bidotti, and Achille Barbieri

Yet they are continually challenged with providing access to all of their data across business units, regions, and cloud environments. Leveraging Dremio for data governance and multi-cloud with Arrow Flight. Register now for the webinar on June 9, 2022 at 2:00 am PST, 5:00 am EST, and 11:00 am CEST.

article thumbnail

Zero Trust security, why it’s essential In today’s threat landscape

CIO Business Intelligence

As a networking and security strategy, zero trust stands in stark contrast to traditional, network-centric, perimeter-based architectures built with firewalls and VPNs, which involve excessive permissions and increase cyber risk. The main point is this: you cannot do zero trust with firewall- and VPN-centric architectures.

Security 216
article thumbnail

Zero Trust + AI: A match made in the clouds

Network World

Zero trust architecture with Zscaler Zero trust is not another point product to add to the perimeter-oriented status quo , with its firewalls, VPNs, castle-and-moat security, and the weaknesses of that methodology. Let’s discuss zero trust, AI, and how Zscaler brings the two together to fantastic effect. Let’s discuss a quick example of each.

Cloud 370
article thumbnail

Product Transformation: Adapting Your Solutions for Cloud Models

Speaker: Ahmad Jubran, Cloud Product Innovation Consultant

In order to maintain a competitive advantage, CTOs and product managers are shifting their products to the cloud. Many do this by simply replicating their current architectures in the cloud. Those previous architectures, which were optimized for transactional systems, aren't well-suited for the new age of AI.