- Presentations
- Documents
- Infographics
SID331_Architecting Security and Governance Across a Multi-Account Strategy
Amazon Web Services
•
6 years ago
AWS re:Invent 2016: Serverless Authentication and Authorization: Identity Management for Serverless Architectures (MBL306)
Amazon Web Services
•
7 years ago
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webinar Series
Amazon Web Services
•
7 years ago
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Customers (SEC305)
Amazon Web Services
•
7 years ago
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production (SAC318)
Amazon Web Services
•
7 years ago
AWS security monitoring and compliance validation from Adobe.
Splunk
•
7 years ago
How Netskope Mastered DevOps with Sumo Logic
Sumo Logic
•
9 years ago
How McGraw Hill Uses Sumo Logic and AWS for Operational and Security Intelligence
Sumo Logic
•
9 years ago
Enforcing Your Security Policy at Scale - Technical 301
Amazon Web Services
•
8 years ago
Lesson Learned from Using Docker Swarm at Pronto
Kan Ouivirach, Ph.D.
•
7 years ago
OpenStack Ansible for private cloud at Kaidee
Jirayut Nimsaeng
•
7 years ago
(BDT313) Amazon DynamoDB For Big Data
Amazon Web Services
•
8 years ago
(DAT401) Amazon DynamoDB Deep Dive
Amazon Web Services
•
8 years ago
(SEC301) Strategies for Protecting Data Using Encryption in AWS
Amazon Web Services
•
8 years ago
(SEC302) IAM Best Practices To Live By
Amazon Web Services
•
8 years ago
(SEC307) A Progressive Journey Through AWS IAM Federation Options
Amazon Web Services
•
8 years ago
10 Things your Audience Hates About your Presentation
Stinson
•
7 years ago
AWS CodeDeploy Getting Started
Amazon Web Services
•
8 years ago
Microsoft to Acquire LinkedIn: Overview for Investors
Microsoft
•
7 years ago
Getting Started with AWS Security
Amazon Web Services
•
7 years ago