Channel Avatar

Cloud Direct @UC4eQDTHTlyITvLqpkQ5jcuQ@youtube.com

210 subscribers - no pronouns :c

Since 2003, Cloud Direct has helped 4,000 organisations move


01:41
What is FinOps
10:51
Stages of FinOps
03:38
How FinOps compares to a non cloud approach
02:06
FinOps maturity model
03:19
Understanding the role of IT in compliance
08:04
How to monitor and manage compliance of your Azure environment for MiFID ii, PCI, SO and more
07:56
How to innovate your IT whilst meeting audit requirements
02:58
How to ensure your IT team is meeting the compliance demands of your business
11:51
How Microsoft helps to chieve and support compliance activities
18:34
Scaling your SaaS Application: Introduction to DevOps, DevSecOps and FinOps.
34:25
Reviewing your security with Zero Trust | The 6 pillars of Zero Trust
08:15
Reviewing your security with Zero Trust | What is the Zero Trust Framework?
11:34
Reviewing your security with Zero Trust | Security update from Microsoft
06:47
Cloud Direct X Edit | How to modernise your business data strategy | Aligning your data
06:10
Cloud Direct X Edit | How to modernise your business data strategy | Ask questions of your data
06:31
Cloud Direct X Edit | How to modernise your business data strategy | Implementing best practice
10:28
Cloud Direct X Edit | How to modernise your business data strategy | Bringing your data together
07:14
Cloud Direct X Edit | How to modernise your business data strategy | Current Data State
01:28
An Introduction to the Azure Well-Architected Framework
01:19
An Introduction to Sentinel
26:12
Security week | Friday, 20th May 2022 - Microsoft Sentinel
05:19
Security week | Friday, 20th May 2022 - Managed Services
21:33
Security week | Friday, 20th May 2022 - Considerations to deploying and managing your security
06:03
Security week | Friday, 20th May 2022 | Changing landscape and Zero Trust
02:19
Security week | Thursday, 19th May 2022 | Next Steps
20:22
Security week | Thursday, 19th May 2022 | Securing the development lifecycle
09:37
Security week | Thursday, 19th May 2022 | Tooling to layer security control
17:34
Security week | Thursday, 19th May 2022 | The changing landscape and introduction to DevSecOps
26:49
Software and App Innovation Summit | Making your application run effectively in the cloud
27:05
Software and App Innovation Summit | Growing your application in the cloud
31:33
Software and App Innovation Summit | Developing solutions in the cloud
25:07
Software and App Innovation Summit | Ensuring you offer world-class customer support
24:48
Software and App Innovation Summit | Security and governance considerations for your application
24:21
Software and App Innovation Summit | How moving to the cloud will impact your application
07:30
Security Week | Wednesday, 18th May 2022 | Azure Security Benchmarks
12:43
Security Week | Wednesday, 18th May 2022 | Azure Workloads
08:37
Security Week | Wednesday, 18th May 2022 | Before you build on Azure
20:26
Security Week | Wednesday, 18th May 2022 | Why Microsoft Security?
11:13
Security Week | Tuesday, 17th May 2022 | New Developments in Zero Trust
01:59
Security Week | Tuesday, 17th May 2022 | Next Steps
13:10
Security Week | Tuesday, 17th May 2022 | What do we need to consider when Hybrid Working?
05:54
Security Week | Tuesday, 17th May 2022 | What do we want to achieve through Hybrid Working?
04:01
Security Week | Tuesday, 17th May 2022 | What is Hybrid Working and why do we need it?
21:21
Security Week | Monday, 16th May 2022 | Microsoft and Security
09:03
Security Week | Monday, 16th May 2022 | Current Security Landscape
08:25
Security Week | Monday, 16th May 2022 | Common Best Practice.
03:05
Cloud Direct and The ai Corporation: A transformative journey
00:50
Next Steps
01:18
Leveraging WAF
06:28
Pillar Four | Security
05:28
Pillar Three | Reliability
07:59
Pillar Five | Operational Excellence
17:44
Pillar Two | Performance Reliability
15:31
Pillar One | Cost Optimisation
02:08
The 5 Pillars of WAF
02:29
What is WAF?
00:48
Introduction to WAF
00:58
Azure Well Architected Framework Recommendations Video Trailer
06:14
Zero Trust in the remote world
08:51
Why to adopt a Zero Trust Security approach for remote working