Google Cloud Platform1.17 млн
Следующее
Опубликовано 6 августа 2018, 22:32
With security zones, org policies, and IAM, GCP has a rich blend of tools to help prevent the exfiltration of data. We discuss how to use them together in this session.
Event schedule → g.co/next18
Watch more Security sessions here → bit.ly/2zJTZml
Next ‘18 All Sessions playlist → bit.ly/Allsessions
Subscribe to the Google Cloud channel! → bit.ly/NextSub event: Google Cloud Next 2018; re_ty: Publish; product: Cloud - Security and Identity - Identity and Access Management; fullname: Grace Mollison;
Event schedule → g.co/next18
Watch more Security sessions here → bit.ly/2zJTZml
Next ‘18 All Sessions playlist → bit.ly/Allsessions
Subscribe to the Google Cloud channel! → bit.ly/NextSub event: Google Cloud Next 2018; re_ty: Publish; product: Cloud - Security and Identity - Identity and Access Management; fullname: Grace Mollison;
Свежие видео