View User Roles in Identity and Access Management
In this video, we'll show you how to view and modify user roles in Identity and Access Management and how to locate users in your organization who are assigned to a specific resource. We'll begin by introducing the new menu items in the left navigation—Identity and Access Management and Resource Management and explain the differences between the two. Next we'll show you how to navigate the Context Switcher at the top of the page to make sure you're selecting the proper resource. We'll demonstrate how to search for a specific user within your organization so you can assign a role to them.16Views0likes0CommentsWhat is Data Sovereignty?
In today's digital landscape, millions of terabytes of data are generated daily, all of which must be stored somewhere. But did you know that this data is also subject to the laws of the country where it's stored? This concept is known as data sovereignty. In this video, let’s learn about data sovereignty, including the General Data Protection Regulation (GDPR) in the EU and the California Consumer Privacy Act (CCPA) in the U.S, and how Equinix, with its extensive network of data centers across over 70 major metros, helps companies meet these regulatory requirements effortlessly.36Views0likes1CommentNetwork Edge Overview
In this video, we'll introduce you to Network Edge. We'll deep-dive into the product and our supported vendor services. We'll cover some of the obstacles customers face and how Network Edge can help solve those issues. Finally, we'll take you through a step-by-step guide for creating and provisioning a virtual device and then creating a Virtual Connection to that new device. In this case, connecting our newly created Firewall to the Google Cloud Platform.46Views0likes0CommentsSpotlight on Network Edge Release 2024.6
In this video, we'll cover the features that are included in the latest Network Edge release. With Cisco SolutionsPlus, customers can now order Network Edge products directly from Cisco. We are now offering Blue Cat Edge as part of our existing Blue Cat solution on Network Edge. See what's new with Network Edge today: https://fabric.equinix.com/119Views0likes0CommentsSIG Security with Tabitha Sable, Datadog
In this video, Chris Privitere interviews Tabitha Sable, one of the co-chairs of SIG Security, while at KubeCon EU 2024. They discuss the role of SIG Security in improving the security of Kubernetes, including coordinating third-party audits, conducting security assessments, and enhancing the security content of Kubernetes documentation. They also talk about the challenges of balancing security features with practicality and the importance of community involvement in improving Kubernetes security. Tabitha mentions that SIG Security is always open to new members and encourages interested individuals to join their Slack channel and participate in their regular meetings.138Views0likes0CommentsEquinix is proud to announce partnership with Quside
Quside, a quantum technology company, is working closely withEquinix, the world’s digital infrastructure company®, to enable easy access to the latest quantum random number generation technologies to help customers build the strongest cryptographic foundation to defend against increasingly sophisticated attacks. Read the press release147Views0likes0CommentsWhy is Secure Cab Express important?
Learn about how to streamline Equinix colocation deployments and increase customer satisfaction with Secure Cabinet Express. This short video covers why Secure Cabinet Express is important for customers, available sizes and power requirements, and metro availability.722Views1like1Comment