security
115 TopicsPowering the Future of Healthcare Through IT Solutions
In this insightful webinar, hosted by Xtelligent Healthcare and presented by Equinix, we explore the critical role of IT infrastructure in pioneering medical research involving genomics, clinical and other multimodal data. Learn how innovative technological solutions are transforming the biotech, pharma, and wider life sciences industries by improving data collection, analysis, and management processes. Key topics covered include: The impact of advanced technologies, such as burstable compute, on medical research and development in addition to GenAI and Quantum How data quality and infrastructure integration speed up scientific insights Supporting advanced computational workloads while ensuring privacy and security Learn more27Views0likes0CommentsView User Roles in Identity and Access Management
In this video, we'll show you how to view and modify user roles in Identity and Access Management and how to locate users in your organization who are assigned to a specific resource. We'll begin by introducing the new menu items in the left navigation—Identity and Access Management and Resource Management and explain the differences between the two. Next we'll show you how to navigate the Context Switcher at the top of the page to make sure you're selecting the proper resource. We'll demonstrate how to search for a specific user within your organization so you can assign a role to them.35Views0likes0CommentsWhat is Data Sovereignty?
In today's digital landscape, millions of terabytes of data are generated daily, all of which must be stored somewhere. But did you know that this data is also subject to the laws of the country where it's stored? This concept is known as data sovereignty. In this video, let’s learn about data sovereignty, including the General Data Protection Regulation (GDPR) in the EU and the California Consumer Privacy Act (CCPA) in the U.S, and how Equinix, with its extensive network of data centers across over 70 major metros, helps companies meet these regulatory requirements effortlessly.56Views0likes1CommentNetwork Edge Overview
In this video, we'll introduce you to Network Edge. We'll deep-dive into the product and our supported vendor services. We'll cover some of the obstacles customers face and how Network Edge can help solve those issues. Finally, we'll take you through a step-by-step guide for creating and provisioning a virtual device and then creating a Virtual Connection to that new device. In this case, connecting our newly created Firewall to the Google Cloud Platform.82Views0likes0CommentsSpotlight on Network Edge Release 2024.6
In this video, we'll cover the features that are included in the latest Network Edge release. With Cisco SolutionsPlus, customers can now order Network Edge products directly from Cisco. We are now offering Blue Cat Edge as part of our existing Blue Cat solution on Network Edge. See what's new with Network Edge today: https://fabric.equinix.com/135Views0likes0CommentsSIG Security with Tabitha Sable, Datadog
In this video, Chris Privitere interviews Tabitha Sable, one of the co-chairs of SIG Security, while at KubeCon EU 2024. They discuss the role of SIG Security in improving the security of Kubernetes, including coordinating third-party audits, conducting security assessments, and enhancing the security content of Kubernetes documentation. They also talk about the challenges of balancing security features with practicality and the importance of community involvement in improving Kubernetes security. Tabitha mentions that SIG Security is always open to new members and encourages interested individuals to join their Slack channel and participate in their regular meetings.156Views0likes0Comments