Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
RSS
Channel info
360View: January 2022
Channel

360View: January 2022

Truth in IT
01/20/2022

Our 360View event is designed to look at 3 disruptive, important and compelling technologies and use cases. This month we take a closer look at:

Containerized applications bring a tremendous amount of promise to a host of new applications throughout a variety of industries. Legacy storage technology is not necessarily optimized to handle containerized applications, especially NAS storage. We're profiling iXSystems and their new technology in which the open ZFS file system is leveraged to place the storage requirement as close to the container and edge as possible. This opens a whole new world of possibilities to minimize data gravity and latency.

We're also going to take a closer look at the importance of DNS security and how little we think about it and how few resources we apply to it. Most IT shops don't have the manpower to keep DNS bulletproof and are vulnerable because of it. In this segment, we'll cover how BlueCat Networks makes DNS security within the reach of any organization.

Lastly, we'll take a look at zero trust identity access in a way that accommodates a flexible, remotely located workforce. We'll review a new company, Elisity, who will review perimeter access control and how highly distributed organizations can increase the level of access to data and applications without sacrificing security regardless of the network they're on.

Categories:
  • » Small World Big Data
  • » Data Protection » Backup & Recovery
  • » Cybersecurity
  • » Cloud
  • » Events » 360View
  • » Cybersecurity » Network Security
Tags:
  • 360view
  • bluecat
  • elisity
  • ixsystems
  • matchett
  • storage
  • security
  • container
  • cloud

...

...
../../....
...
... (...%)
  • Share
    • Channel
    • Video
  • Comments
    • Channel
    • Video
  • Download
  • Transcript
Report Like Favorite

Channel

  • Share/Embed
Link
Embed

Video

  • Share/Embed
  • Email
Link
Embed

Current Video Transcript


...
Show more Show less

Playlist Video Transcriptions


Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

                Channel's Comments: 360View: January 2022

                Featuring:

                Upcoming Webinar Calendar

                • 03/17/2026
                  06:00 AM
                  03/17/2026
                  L'importance cruciale de l'ITDR pour 2026 et au-delà
                  https://www.truthinit.com/index.php/channel/1856/limportance-cruciale-de-litdr-pour-2026-et-au-delà/
                • 03/18/2026
                  01:00 PM
                  03/18/2026
                  Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk
                  https://www.truthinit.com/index.php/channel/1847/beyond-chatbots-agentic-ai-that-actually-fixes-identity-risk/
                • 03/19/2026
                  11:00 AM
                  03/19/2026
                  Risk in Real Time: Stopping Exploits Before the CVE Even Exists
                  https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
                • 03/19/2026
                  01:00 PM
                  03/19/2026
                  Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                  https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
                • 03/26/2026
                  01:00 AM
                  03/26/2026
                  Reclaim Network Clarity and Accountability with Netskope DEM
                  https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
                • 03/26/2026
                  05:00 AM
                  03/26/2026
                  ITDR as an Integral Component of Critical Security Architecture
                  https://www.truthinit.com/index.php/channel/1863/itdr-as-an-integral-component-of-critical-security-architecture/
                • 03/26/2026
                  01:00 PM
                  03/26/2026
                  HUMAN Dialogue: Transforming City-Scale Cyber Resilience through AI Innovations
                  https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-city-scale-cyber-resilience-through-ai-innovations/
                • 03/26/2026
                  01:00 PM
                  03/26/2026
                  Making GPUs Available On Demand (Without Breaking the Budget)
                  https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
                • 04/08/2026
                  01:00 PM
                  04/08/2026
                  Managing Configuration at Scale Across Group Policy and Intune
                  https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
                • 04/15/2026
                  01:00 PM
                  04/15/2026
                  Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                  https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/

                Upcoming Events

                • Mar
                  17

                  L'importance cruciale de l'ITDR pour 2026 et au-delà

                  03/17/202606:00 AM ET
                  • Mar
                    18

                    Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk

                    03/18/202601:00 PM ET
                    • Mar
                      19

                      Risk in Real Time: Stopping Exploits Before the CVE Even Exists

                      03/19/202611:00 AM ET
                      • Mar
                        19

                        Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes

                        03/19/202601:00 PM ET
                        • Mar
                          26

                          Reclaim Network Clarity and Accountability with Netskope DEM

                          03/26/202601:00 AM ET
                          More events
                          Truth in IT
                          • Sponsor
                          • About Us
                          • Terms of Service
                          • Privacy Policy
                          • Contact Us
                          • Preference Management
                          Desktop version
                          Standard version