October 2022

Fixing Your Broken Data Protection, DRaaS, & Disaster Recovery

Featuring

Zerto, TierPoint, Rubrik, HYCU, Metallic, A Commvault Venture, OVHcloud, Unitrends

Min Leads

800

Open Slots

1

About This MegaCast

Cloud infrastructure and SaaS applications have made everything about client infrastructure different. Yet many organizations are backing up their data like it's 2002, when all their mission critical applications sat securely behind a firewall in an on-premises data center or server closet. In this special MegaCast, forward-thinking vendors will share their innovative solutions for data protection, DRaaS, and Disaster Recovery. It's an opportunity to highlight solutions that protect and back up data in the public cloud, in SaaS services, in hybrid environments, in containers, and in Kubernetes. It's also a chance to showcase how leveraging cloud capabilities can make backup, recovery, and data protection more flexible, resilient, air-gapped, and cost effective than ever before. Whether your company backs up data or whether it helps organizations improve existing data protection strategies or protects customers from ransomware attacks, our audience is ready to listen.

Vendor Fit

Any vendor with a service or solution that enables data protection and disaster recovery, including on-premises solutions, DRaaS services, cloud-centric solutions, and hybrid/multi-cloud solutions. Vendors that provide storage targets for data protection and disaster recovery solutions are also encouraged to attend, as are vendors adjacent to the data protection/disaster recovery market that help to augment these services.

Learn More

Endpoint Management and Protection Tools

Featuring

Sophos, Huntress Labs, CyberArk

Min Leads

400

Open Slots

3

About This EcoCast

Endpoints - desktops, laptops, printers, mobile devices, etc. - are a significant point of entry into corporate computing environments and when they're attacked, things go bad. Moreover, when they're unavailable due to a security issue, productivity suffers. When they are compromised, data can be lost. During this event, we encourage endpoint protection vendors to share their wares with an audience looking for ways to make their endpoints more secure.

Vendor Fit

Any vendor with a product or service that provide, enables, integrates with, protects, or supports endpoints, including VDI/DaaS vendors, endpoint protection providers, endpoint backup providers, application deployment tools, print management tools, VPNs, and any other supporting tools.

Learn More

Ransomware D-Day: Every Minute Counts When the Org is Hit

Featuring

Guest Speaker, Rubrik, Duo Security, CrowdStrike, Delinea, Palo Alto Networks Unit 42

Min Leads

200

Open Slots

Contact Us

Defenses are up, preparations are in place and ... the organization’s systems get encrypted behind a ransom demand anyway. This Expert Series session answers the questions of what to do minute-by-minute on a dreaded ransomware D-Day. An ATM-provided expert will provide vendor-neutral and detailed guidance of what calls to make and what steps to take in what order. Drawing on real-world experience and actual examples from the headlines, this session will show attendees how organizations put their ransomware plans into action, while highlighting what usually works and what can still go wrong. As a sponsor, you’ll only need to provide a promotional slide, while ATM will handle all aspects of audience development, event production, and lead delivery.

Learn More

Supporting a Remote Workforce

Featuring

Synology, strongDM, Axis Security, Catchpoint Systems, Okta, Duo Security, Glean, OutSystems

Min Leads

400

Open Slots

Contact Us

About This EcoCast

The world of work remains utterly transformed by the events of the last few years. The temporary measure of working remote gained a permanent foothold in many organizations, after employees in home offices put to rest many doubts about their productivity out of the office. Along with advantages, remote work does pose a number of novel challenges, including security, collaboration, IT support, and software/service licensing, to name just a few. Take part in this EcoCast to show an audience of IT decision makers how your technology can help them support the remote workforce.

Vendor Fit

Any vendor with a product or service that supports a remote or hybrid workforce, including VDI/DaaS, backup and recovery, security, collaboration, help desk, remote monitoring and management (RMM), and videoconferencing.

Learn More

Defense in Depth: Exploring the Elements of a Layered Security Program

Featuring

Rubrik, KnowBe4, Cequence, Tanium, Snyk

Min Leads

1200

Open Slots

7

About This Virtual Summit

Security threats evolve constantly to exploit holes in, and between, layers of defense. Attackers adapt quickly to new technologies, and they instantly exploit changes in user and organizational behavior as well as newly discovered flaws in existing tech. That fast attacker development demands constant vigilance from the IT department. Yet organizations' mix of defense technologies routinely falls behind without regular attention. Security controls that were once finely calibrated to the threat landscape can become weighted too heavily toward older attack methods, while leaving the door open to new attack vectors. Participate in this Virtual Summit to educate an audience of engaged IT decisionmakers and influencers on how your solution addresses evolving security threats and helps them shore up their defenses for the security realities of 2023.

Vendor Fit

Any vendor with a security tool or service.

Learn More

Ransomware Recovery Options: Best Practices Post-Attack

Featuring

CrowdStrike, Quantum, Rubrik, Duo Security, Palo Alto Networks Unit 42

Min Leads

200

Open Slots

1

After a ransomware attack, some organizations spring back into business with barely a hiccup, while others languish for weeks or months in a limbo of half-recovered systems and hamstrung operations. In this Expert Series session, an ATM-provided expert will show an engaged audience of IT decisionmakers how to be part of the former group and not the latter. Much depends on preparation and on the immediate actions an organization takes once ransomware hits. But there are critical moves and decisions organizations make after the fact that can help them recover quickly – or not. Additionally, the session will offer a primer on the legal, regulatory, public relations, financial, security infrastructure investment, and other decisions that organizations must grapple with post-ransomware. As a sponsor, you’ll only need to provide a promotional slide, while ATM will handle all aspects of audience development, event production, and lead delivery.

Learn More

Battling the Ransomware Scourge: Prevention and Recovery

Featuring

Gigamon, KnowBe4, Sophos, Rubrik, Red Canary, HYCU, ReliaQuest, FireMon, Zerto, Unitrends, Cohesity, Commvault, Palo Alto Networks Unit 42, Pure Storage

Min Leads

800

Open Slots

Contact Us

About This MegaCast

When things are a bit chaotic, opportunities arise for infiltrators to unleash malware as they seek cracks in your security armor. As organizations shift employees from offices to homes and back again, expect defenses to be less effective and watch for an increase in nefarious ransomware, the scourge of the internet. During this event, share with our audience your solution to the problem, whether it's a human-centric solution or a technology-driven one.

Vendor Fit

Any vendor with a tool or service that can help organizations recover from ransomware or, better yet, avoid it in the first place. This can include human-centric security training tools and data protection/recovery/disaster recovery tools.

Learn More

Cloud Migration Strategies: Avoiding Risk While Transforming IT

Featuring

Progress Software, Rubrik, Zerto, Nutanix, OVHcloud

Min Leads

400

Open Slots

1

About This EcoCast

The benefits of the cloud are massive, once organizations get there. The in-between stage of cloud migrations can pose major challenges for an IT department. Downtime, data loss, security misconfigurations, unanticipated cloud fees, lock-ins, and rollbacks are just a few of the issues organizations can face during a migration. Participate in this EcoCast to present your cloud migration tools and solutions for an audience of organizations wrestling with the challenges.

Vendor Fit

Any vendor with a tool or service that can help organizations with cloud migrations.

Learn More
November 2022

Streamlining, Securing, and Protecting Cloud, IT, and Business Operations

Featuring

BetterCloud, Gigamon, Rubrik

Min Leads

800

Open Slots

5

About This MegaCast

Continuous improvement is on the minds of IT pros and decision makers every day.  They are ever vigilant for new opportunities to make their IT environments more efficient, more secure, and serving the needs of the business. From on-premises hardware to cloud infrastructure to software services, it's all up for grabs in this MegaCast. This special event is your chance to get in front of an audience eager to learn what you have to offer when it comes to helping them radically improve their technical and business operations.

Vendor Fit

Any vendor that sells an IT-centric product or service.

Preventing Phishing Attacks

Featuring

KnowBe4, Zscaler, CyberArk

Min Leads

400

Open Slots

3

About This EcoCast

With so many employees working remotely, employees at home have become the new network perimeter. As such, phishing is elevated to one of the most effective ways for attackers to get into the network. This EcoCast provides an opportunity to put your phishing protection solution, be it technology or training, in front of the IT audience that needs this information the most. Don’t miss this chance to demo your tools or services to organizations looking for their next layer of defense.

Vendor Fit

Any vendor with a security story, whether that story is the entire mission of the company or is just one aspect of a broader product and services portfolio. Vendors that provide security awareness, security services, cloud security solutions, and more are encouraged to participate.