CR-T IT Services
CR-T IT Services
  • 86
  • 45 443
Tech Talk with Ken Knapton, Author of Unveiling Tech Debt
Join Tim Aguilar, CEO of CR-T, as he interviews Ken Knapton, author of Unveiling Tech Debt. In this 30-minute conversation, they explore how technical debt impacts businesses, strategies for managing it, and actionable insights for IT leaders.
-- Connect with Ken on LinkedIn here:
www.linkedin.com/in/kenknapton/,
-- Get Ken's book on Amazon here: www.amazon.com/Unveiling-Tech-Debt-Measuring-Enterprise/dp/146214828X#:~:text=Knapton's%20%E2%80%9CUnveiling%20Tech%20Debt%E2%80%9D%20where,long%2Dterm%20agility%20and%20efficiency.,
-- Follow CR-T on LinkedIn here: www.linkedin.com/company/67584/
มุมมอง: 122

วีดีโอ

Wonka Movie Event 2023
มุมมอง 459ปีที่แล้ว
Wonka Movie Event 2023
The Benefits of Using CyberArk: Simplifying Account and Credential Management
มุมมอง 126ปีที่แล้ว
In this video, the speaker discusses the benefits of using CyberArk, a platform designed to manage and secure user accounts and credentials. Trevor compares the difference between individual efforts and utilizing CyberArk, emphasizing the challenges that arise when dealing with a large number of accounts per employee, especially in organizations with hundreds or thousands of servers. They expla...
CyberArk's Technology Integrations and Partnerships
มุมมอง 44ปีที่แล้ว
Welcome to our latest video featuring an exclusive interview with Trevor Crawford from CyberArk, a renowned cybersecurity solution provider. In this discussion, they delve into CyberArk's approach to third-party platform integration and their role as a responsible technological citizen within secure environments. CyberArk's C-cubed alliance takes center stage in the conversation. With nearly a ...
Unveiling the Power of Risk and Compliance: Are You Prepared?
มุมมอง 12ปีที่แล้ว
In this video, we delve into the importance of not only claiming to protect the environment but also being able to withstand the scrutiny of others. Risk and Compliance play a vital role in this process, encompassing the adherence to policies and measurements that can hold up against the scrutiny of specific disciplines like PCI for credit cards, HIPAA for medical data, Sarbanes-Oxley, GDPR, CC...
Why Choose Extreme Networks?
มุมมอง 334ปีที่แล้ว
In this video, we answer the question of why you should choose Extreme Networking over other options like Cisco when considering a product for your networking needs. The key factor that sets Extreme apart is simplicity. Extreme Networking is focused on the future, offering a comprehensive customer experience that goes beyond just hardware. Extreme Networking brings together the power of its man...
Unlocking Zero Trust: Redefining Security
มุมมอง 105ปีที่แล้ว
Get ready to dive into the captivating world of zero trust with CyberArk, the leading name in secure identity management. In this eye-opening interview, we unravel the mysteries surrounding zero trust and how CyberArk takes it to a whole new level. Our CyberArk expert introduces a groundbreaking concept-a mindset that accepts the reality that something, somewhere is already compromised. They re...
What is CyberArk?
มุมมอง 14Kปีที่แล้ว
In this video, we explore CyberArk, a leading identity security company that has redefined the privileged access management space. With over 8-9000 customers, including Fortune 105 hundred companies, CyberArk specializes in managing and authenticating credentials to ensure that who someone says they are, they really are. As the landscape of identity management changes, with employees now having...
The Future of Networking: Moving Towards Cloud-Based Solutions
มุมมอง 66ปีที่แล้ว
#ExtremeNetworks #cloudcomputing #CloudSecurity #CloudIQ In this video, Extreme Networks discusses how the industry is moving towards software-bound and cloud-based distribution methodologies, which has been a trend for the last decade, not just because of the current chip shortage. The focus is now on building a customer experience that is accessible from anywhere, with unlimited data storage ...
Extreme Networks' Proactive Approach to the Chip Shortages
มุมมอง 36ปีที่แล้ว
Extreme Networks' Proactive Approach to the Chip Shortages
The Evolution of Barracuda: From Email Protection to Cloud Security
มุมมอง 69ปีที่แล้ว
The Evolution of Barracuda: From Email Protection to Cloud Security
The Power of Next-Gen Firewalls: Protecting Your Network in the Modern World
มุมมอง 27ปีที่แล้ว
The Power of Next-Gen Firewalls: Protecting Your Network in the Modern World
Simplifying IT Management with Barracuda: Intuitive Solutions for Complex Networks
มุมมอง 22ปีที่แล้ว
Simplifying IT Management with Barracuda: Intuitive Solutions for Complex Networks
Top Benefits of Extreme Networks
มุมมอง 104ปีที่แล้ว
Top Benefits of Extreme Networks
Your Business Has Already Been Hacked? Now What?
มุมมอง 22ปีที่แล้ว
Your Business Has Already Been Hacked? Now What?
How Does Tanium Manage Remote Assets?
มุมมอง 76ปีที่แล้ว
How Does Tanium Manage Remote Assets?
What is Tanium?
มุมมอง 11Kปีที่แล้ว
What is Tanium?
Web Security | What You NEED to Know
มุมมอง 14ปีที่แล้ว
Web Security | What You NEED to Know
What's Next for Barracuda in 2023?
มุมมอง 349ปีที่แล้ว
What's Next for Barracuda in 2023?
Extreme vs the Competition
มุมมอง 50ปีที่แล้ว
Extreme vs the Competition
Inside Barracuda and Microsoft's Partnership
มุมมอง 23ปีที่แล้ว
Inside Barracuda and Microsoft's Partnership
What is Endpoint Security?
มุมมอง 1.6Kปีที่แล้ว
What is Endpoint Security?
Who is Extreme Networks?
มุมมอง 322ปีที่แล้ว
Who is Extreme Networks?
What are MSSP Services?
มุมมอง 5802 ปีที่แล้ว
What are MSSP Services?
What's intel's Plans for Their Future Technology?
มุมมอง 222 ปีที่แล้ว
What's intel's Plans for Their Future Technology?
Are You Protected from Web Application Security Holes?
มุมมอง 132 ปีที่แล้ว
Are You Protected from Web Application Security Holes?
Web Application Firewall (What is WAF?)
มุมมอง 752 ปีที่แล้ว
Web Application Firewall (What is WAF?)
What is SIEM? (Security Information Event Management Explained)
มุมมอง 882 ปีที่แล้ว
What is SIEM? (Security Information Event Management Explained)
Meet Our Managed IT Services Team | CR-T
มุมมอง 912 ปีที่แล้ว
Meet Our Managed IT Services Team | CR-T
Managed IT Services Case Study: FatCats
มุมมอง 382 ปีที่แล้ว
Managed IT Services Case Study: FatCats

ความคิดเห็น

  • @jpewanderer1959
    @jpewanderer1959 2 หลายเดือนก่อน

    Cool way to explain CyberArk. Love it!

  • @antoniomontana9430
    @antoniomontana9430 11 หลายเดือนก่อน

    So this product is basically centered around the concept of "role based administration and access control" from what I gather?

  • @alexlupi3108
    @alexlupi3108 ปีที่แล้ว

    I didn`t know Joaquin Phoenix was an IT expert

    • @nuraqifyusaini4460
      @nuraqifyusaini4460 11 หลายเดือนก่อน

      my thoughts exactly hahahhahahahahaha

  • @vladimirrushkin4815
    @vladimirrushkin4815 2 ปีที่แล้ว

    Shutdown on a computer may reset the pc but not the memory, that's why it says to do a system restart after windows performs an update and not to shutdown.

  • @tebogonkosi3997
    @tebogonkosi3997 2 ปีที่แล้ว

    What makes sailpoint different form active directory?

    • @dipendrakhatiwada4644
      @dipendrakhatiwada4644 2 ปีที่แล้ว

      Active directory is a cluster of services and as itself, it is a database where there are critical information of varieties of information to connect users with the network resources in that environment, and that has ability to check what are there in it and what things are being done. They are somewhat similar on rendering a sense of security to its environment, however, SailPoint, on the other hand, a software company to ensure that the right users have the appropriate access to technology resources.