SlideShare a Scribd company logo
Confidential │ ©2019VMware,Inc.
VMware as a Security Vendor
Point of view of end-user computing
FOOD FOR THOUGHT
November 2019
Frederiek Van Hoornick
End User Computing – Specialist BeLux
@EndPointMan
vMusketeers
Confidential │ ©2019VMware,Inc. 2
NETWORK
Ex. Encryption, Micro-segmentation…
ENDPOINTS
Ex. Desired state assurance,Device Trust…
zzzz
APPS
Ex. Remoting, Containerization,DLP…
Treating Security as a First-Class Citizen
z
USERS
Ex. Identity, Behavior…
Digital
Workspace
WORKSPACE ONE
TRUST NETWORK
INSIGHTS and AUTOMATION
Workspace ONE
Confidential │ ©2019VMware,Inc. 3
HOW CAN WE KNOW
WHO SHE IS?
USERNAME and PASSWORD
IS THAT ENOUGH?
CAN WE VERIFY IT IS HER?
BIOMETRIC?
BEHAVIOUR?
PS: I know who she is!
Confidential │ ©2019VMware,Inc. 4
Passwords are terrible
troyhunt: https://www.troyhunt.com/86-of-passwords-are-terrible-and-
other-statistics/
86%
Confidential │ ©2019VMware,Inc. 5
Passwords are like underwear
My personal tips & tricks
The longer the better (when it’s cold)
Don’t share them with everybody
Keep it original
Change them regularly (especially when they’re
dirty)
Confidential │ ©2019VMware,Inc. 6
ALL ABOUT
TRUST
Confidential │ ©2019VMware,Inc. 7
SOMETHING
YOU KNOW
YOU HAVE
YOU ARE
Confidential │ ©2019VMware,Inc. 8
DO IT
YOURSELF
Confidential │ ©2019VMware,Inc. 9
What about your data?
Cut, Copy, Paste?
Tag as
CONFIDENTIAL?
BYOD
COBO
COPE
OFFLINE
AVAILABILITY?
What about your APPS?
Confidential │ ©2019VMware,Inc. 10
The Data Loss is related to
Human Error
2018 Costof a Data Breach Study – Ponemon Institute
27%
Confidential │ ©2019VMware,Inc. 11
Who worries about Data Loss?
Losing data
by accident
!=
Losing data
intentionally
Confidential │ ©2019VMware,Inc. 12
Find the balance between security and simplicity (user experience)
My Personal Tips & Tricks
Productivity is directly aligned with Simplicity
Productivity is directly aligned with Security
FIND THE RIGHT BALANCE
Confidential │ ©2019VMware,Inc. 13
CONTAINER
your applications
Confidential │ ©2019VMware,Inc. 14
Keep your data
SECURE
But
ACCESSIBLE
Confidential │ ©2019VMware,Inc. 15
Who has 1 device?Who has 2 devices?Who has more than
2 devices?
IOS?
ANDROID?
WINDOWS MOBILE?
ARK OS ???
WHAT ABOUT SECURITY?
Confidential │ ©2019VMware,Inc. 16
88.50%
90.00%
91.50%
93.00%
94.50%
96.00%
Windows usage worldwide
Confidential │ ©2019VMware,Inc. 17
Confidential │ ©2019VMware,Inc. 18
Confidential │ ©2019VMware,Inc. 19
Confidential │ ©2019VMware,Inc. 20
Confidential │ ©2019VMware,Inc.
ONE CONCLUSION
BE READY FOR A
MULTI DEVICE
APPROACH
BE READY FOR A
MULTI OS
APPROACH
Confidential │ ©2019VMware,Inc. 22
Manage
ANY DEVICE
Via
ONE PLATFORM
Confidential │ ©2019VMware,Inc.
WHAT DOES
OUT OF OFFICE
MEAN FOR YOU?
IS VPN SECURE?
OFFLINE ACCESS?
ACCESS ANYWHERE?
WHAT ABOUT
PRODUCTIVITY?
Confidential │ ©2019VMware,Inc. 24
People globally work remotely at
least once a week
CNBC https://www.cnbc.com/2018/05/30/70-percent-of-people-globally-work-remotely-
at-least-once-a-week-iwg-study.html
70%
Confidential │ ©2019VMware,Inc.
ENCRYPT
wherepossible
Confidential │ ©2019VMware,Inc.
Every
APPLICATION
his own
TUNNEL
Confidential │ ©2019VMware,Inc.
HOW MANY TOOLS
DO YOU USE?
What about
security vendors?
Do you correlate
your data?
Are you FAST enough
to react?What if you are
too late?
Do you get the
RIGHT INSIGHTS?
Confidential │ ©2019VMware,Inc. 28
Days it takes to contain data
breach incidents.
2018 Costof a Data Breach Study – Ponemon Institute
65
Confidential │ ©2019VMware,Inc. 29
CVE’s were already detected
in 2019 for Microsoft
CVE - https://www.cvedetails.com/vulnerability-list/vendor_id-
26/Microsoft.html
272
Confidential │ ©2019VMware,Inc. 30
Confidential │ ©2019VMware,Inc. 31
Use
INSIGHTS
Confidential │ ©2019VMware,Inc. 32
Use
INSIGHTS
To create
AUTOMATION
Confidential │ ©2019VMware,Inc.
WHAT IF?YOU COMBINE
EVERYTHING
Confidential │ ©2019VMware,Inc. 34
Experience | Heterogeneity | Cost | Security
The only Platform that you need
Consumer
Simple
Enterprise
Secure
VMware Workspace ONE™
Intelligence-Driven Platform
Employee Experience Unified EndpointManagement
AutomationInsightsVirtualization
Confidential │ ©2019VMware,Inc. 35
NETWORK
Ex. Encryption, Micro-segmentation…
ENDPOINTS
Ex. Desired state assurance,Device Trust…
zzzz
APPS
Ex. Remoting, Containerization,DLP…
Treating Security as a First-Class Citizen
z
USERS
Ex. Identity, Behavior…
WORKSPACE ONE
TRUST NETWORK
INSIGHTS and AUTOMATION

More Related Content

What's hot

Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronDejan Jeremic
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyTripwire
 
secureIoT Presentation #1
secureIoT Presentation #1secureIoT Presentation #1
secureIoT Presentation #1Mel Savich
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookCyren, Inc
 
Mobile Apps The Essentials
Mobile Apps  The EssentialsMobile Apps  The Essentials
Mobile Apps The EssentialsGlenn McKnight
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 PresentationCyren, Inc
 
Re solution - corona virus cyber security infographic
Re solution - corona virus cyber security infographicRe solution - corona virus cyber security infographic
Re solution - corona virus cyber security infographicJacob Tranter
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR SessionFelipe Lamus
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsDarraghCommsec
 
The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017Saumil Shah
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseNowSecure
 
D3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveD3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveImperva Incapsula
 
Venkasure Total Security + Presentation
Venkasure Total Security + PresentationVenkasure Total Security + Presentation
Venkasure Total Security + Presentationvenkasureantivirus
 

What's hot (15)

Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian Aron
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
secureIoT Presentation #1
secureIoT Presentation #1secureIoT Presentation #1
secureIoT Presentation #1
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
Mobile Apps The Essentials
Mobile Apps  The EssentialsMobile Apps  The Essentials
Mobile Apps The Essentials
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Re solution - corona virus cyber security infographic
Re solution - corona virus cyber security infographicRe solution - corona virus cyber security infographic
Re solution - corona virus cyber security infographic
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
01 Cyber Safe Malaysia Website Fundamentals
01 Cyber Safe Malaysia Website Fundamentals 01 Cyber Safe Malaysia Website Fundamentals
01 Cyber Safe Malaysia Website Fundamentals
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEs
 
02. R U Sure U R Secure
02. R U Sure U R Secure02. R U Sure U R Secure
02. R U Sure U R Secure
 
The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017The Seven Axioms of Security - ITWeb 2017
The Seven Axioms of Security - ITWeb 2017
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
D3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveD3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the Curve
 
Venkasure Total Security + Presentation
Venkasure Total Security + PresentationVenkasure Total Security + Presentation
Venkasure Total Security + Presentation
 

Similar to At the table with security solution provider VMware

WatchGuard Corporate Presentation.pptx
WatchGuard  Corporate Presentation.pptxWatchGuard  Corporate Presentation.pptx
WatchGuard Corporate Presentation.pptxRachatrinTongrungroj1
 
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCrowdStrike
 
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORMDEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORMCrowdStrike
 
Everything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepEverything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepIvanti
 
Virtualization & Security
Virtualization & SecurityVirtualization & Security
Virtualization & Securitymorisson
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityCentrify Corporation
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroSkycure
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR
 
Take the Ransom Out of Ransomware
Take the Ransom Out of RansomwareTake the Ransom Out of Ransomware
Take the Ransom Out of RansomwareUnitrends
 
VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?
VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?
VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?Craig Newell
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcomescoopnewsgroup
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Rangescoopnewsgroup
 
Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020VMware Tanzu
 
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyondLessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyondAPNIC
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
 

Similar to At the table with security solution provider VMware (20)

WatchGuard Corporate Presentation.pptx
WatchGuard  Corporate Presentation.pptxWatchGuard  Corporate Presentation.pptx
WatchGuard Corporate Presentation.pptx
 
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint Security
 
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORMDEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
 
Everything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepEverything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeep
 
Virtualization & Security
Virtualization & SecurityVirtualization & Security
Virtualization & Security
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
 
SolarWinds Attack
SolarWinds AttackSolarWinds Attack
SolarWinds Attack
 
SolarWinds Attack
SolarWinds AttackSolarWinds Attack
SolarWinds Attack
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®
 
Take the Ransom Out of Ransomware
Take the Ransom Out of RansomwareTake the Ransom Out of Ransomware
Take the Ransom Out of Ransomware
 
Check Point Infinity
Check Point Infinity Check Point Infinity
Check Point Infinity
 
Sholove cyren web security presentation2
Sholove cyren web security presentation2Sholove cyren web security presentation2
Sholove cyren web security presentation2
 
VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?
VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?
VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?
 
Pat Gelsinger - Welcome
Pat Gelsinger - WelcomePat Gelsinger - Welcome
Pat Gelsinger - Welcome
 
Threat Landscape Lessons from IoTs and Honeynets
Threat Landscape Lessons from IoTs and Honeynets Threat Landscape Lessons from IoTs and Honeynets
Threat Landscape Lessons from IoTs and Honeynets
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020Governance for your Modern Application Platform - November 4, 2020
Governance for your Modern Application Platform - November 4, 2020
 
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyondLessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 

More from Xylos

Connecting & Sensing | Software AG
Connecting & Sensing | Software AGConnecting & Sensing | Software AG
Connecting & Sensing | Software AGXylos
 
Webinar: Connecting & Sensing
Webinar: Connecting & SensingWebinar: Connecting & Sensing
Webinar: Connecting & SensingXylos
 
Webinar Mitel MiCloud Flex: an introduction
Webinar Mitel MiCloud Flex: an introductionWebinar Mitel MiCloud Flex: an introduction
Webinar Mitel MiCloud Flex: an introductionXylos
 
Innovation that sticks
Innovation that sticksInnovation that sticks
Innovation that sticksXylos
 
Everything will be technology (or die)
Everything will be technology (or die)Everything will be technology (or die)
Everything will be technology (or die)Xylos
 
The CEO’s office: Satya Nadella’s Teams tips
The CEO’s office: Satya Nadella’s Teams tipsThe CEO’s office: Satya Nadella’s Teams tips
The CEO’s office: Satya Nadella’s Teams tipsXylos
 
Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...Xylos
 
v10 of Backup & Replication: a sneak peek
v10 of Backup & Replication: a sneak peekv10 of Backup & Replication: a sneak peek
v10 of Backup & Replication: a sneak peekXylos
 
Operational information processing: lightning-fast, delightfully simple
Operational information processing: lightning-fast, delightfully simpleOperational information processing: lightning-fast, delightfully simple
Operational information processing: lightning-fast, delightfully simpleXylos
 
A closer look at your data management
A closer look at your data managementA closer look at your data management
A closer look at your data managementXylos
 
How does Quest Software fit into a Microsoft hybrid environment?
How does Quest Software fit into a Microsoft hybrid environment?How does Quest Software fit into a Microsoft hybrid environment?
How does Quest Software fit into a Microsoft hybrid environment?Xylos
 
Keep your user experience under control
Keep your user experience under controlKeep your user experience under control
Keep your user experience under controlXylos
 
OMP saves 10 times more storage capacity with Nimble and Cohesity
OMP saves 10 times more storage capacity with Nimble and CohesityOMP saves 10 times more storage capacity with Nimble and Cohesity
OMP saves 10 times more storage capacity with Nimble and CohesityXylos
 
Innovation powered by Do-Days
Innovation powered by Do-DaysInnovation powered by Do-Days
Innovation powered by Do-DaysXylos
 
What if absolutely everything could be connected?
What if absolutely everything could be connected?What if absolutely everything could be connected?
What if absolutely everything could be connected?Xylos
 
The ultimate Microsoft Teams experience: AI and mobile first
The ultimate Microsoft Teams experience: AI and mobile firstThe ultimate Microsoft Teams experience: AI and mobile first
The ultimate Microsoft Teams experience: AI and mobile firstXylos
 
There’s no I in team: your HR team’s starter plan
There’s no I in team: your HR team’s starter planThere’s no I in team: your HR team’s starter plan
There’s no I in team: your HR team’s starter planXylos
 
Mobile-oriented networking is the new black
Mobile-oriented networking is the new blackMobile-oriented networking is the new black
Mobile-oriented networking is the new blackXylos
 
Don’t let hackers near your privileged accounts
Don’t let hackers near your privileged accountsDon’t let hackers near your privileged accounts
Don’t let hackers near your privileged accountsXylos
 
E-learning and data: two peas in a pod
E-learning and data: two peas in a podE-learning and data: two peas in a pod
E-learning and data: two peas in a podXylos
 

More from Xylos (20)

Connecting & Sensing | Software AG
Connecting & Sensing | Software AGConnecting & Sensing | Software AG
Connecting & Sensing | Software AG
 
Webinar: Connecting & Sensing
Webinar: Connecting & SensingWebinar: Connecting & Sensing
Webinar: Connecting & Sensing
 
Webinar Mitel MiCloud Flex: an introduction
Webinar Mitel MiCloud Flex: an introductionWebinar Mitel MiCloud Flex: an introduction
Webinar Mitel MiCloud Flex: an introduction
 
Innovation that sticks
Innovation that sticksInnovation that sticks
Innovation that sticks
 
Everything will be technology (or die)
Everything will be technology (or die)Everything will be technology (or die)
Everything will be technology (or die)
 
The CEO’s office: Satya Nadella’s Teams tips
The CEO’s office: Satya Nadella’s Teams tipsThe CEO’s office: Satya Nadella’s Teams tips
The CEO’s office: Satya Nadella’s Teams tips
 
Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...
 
v10 of Backup & Replication: a sneak peek
v10 of Backup & Replication: a sneak peekv10 of Backup & Replication: a sneak peek
v10 of Backup & Replication: a sneak peek
 
Operational information processing: lightning-fast, delightfully simple
Operational information processing: lightning-fast, delightfully simpleOperational information processing: lightning-fast, delightfully simple
Operational information processing: lightning-fast, delightfully simple
 
A closer look at your data management
A closer look at your data managementA closer look at your data management
A closer look at your data management
 
How does Quest Software fit into a Microsoft hybrid environment?
How does Quest Software fit into a Microsoft hybrid environment?How does Quest Software fit into a Microsoft hybrid environment?
How does Quest Software fit into a Microsoft hybrid environment?
 
Keep your user experience under control
Keep your user experience under controlKeep your user experience under control
Keep your user experience under control
 
OMP saves 10 times more storage capacity with Nimble and Cohesity
OMP saves 10 times more storage capacity with Nimble and CohesityOMP saves 10 times more storage capacity with Nimble and Cohesity
OMP saves 10 times more storage capacity with Nimble and Cohesity
 
Innovation powered by Do-Days
Innovation powered by Do-DaysInnovation powered by Do-Days
Innovation powered by Do-Days
 
What if absolutely everything could be connected?
What if absolutely everything could be connected?What if absolutely everything could be connected?
What if absolutely everything could be connected?
 
The ultimate Microsoft Teams experience: AI and mobile first
The ultimate Microsoft Teams experience: AI and mobile firstThe ultimate Microsoft Teams experience: AI and mobile first
The ultimate Microsoft Teams experience: AI and mobile first
 
There’s no I in team: your HR team’s starter plan
There’s no I in team: your HR team’s starter planThere’s no I in team: your HR team’s starter plan
There’s no I in team: your HR team’s starter plan
 
Mobile-oriented networking is the new black
Mobile-oriented networking is the new blackMobile-oriented networking is the new black
Mobile-oriented networking is the new black
 
Don’t let hackers near your privileged accounts
Don’t let hackers near your privileged accountsDon’t let hackers near your privileged accounts
Don’t let hackers near your privileged accounts
 
E-learning and data: two peas in a pod
E-learning and data: two peas in a podE-learning and data: two peas in a pod
E-learning and data: two peas in a pod
 

Recently uploaded

123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptx123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptxgargh1099
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
 
05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community Networking05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community NetworkingMichael Orias
 
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22LHelferty
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerVladimir Samoylov
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationAccess Innovations, Inc.
 
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdfOracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdfSkillCertProExams
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Orkestra
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesIP ServerOne
 
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...Rahsaan L. Browne
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOMatjaž Lipuš
 
527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdf527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdfrajpreetkaur75080
 
Hi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptxHi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptxShivamM16
 
The Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDFThe Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDFRahsaan L. Browne
 

Recently uploaded (15)

123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptx123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptx
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community Networking05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community Networking
 
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdfOracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdf527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdf
 
Hi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptxHi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptx
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
The Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDFThe Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDF
 

At the table with security solution provider VMware