December 2021

Ringing in 2022 with an Overhauled Data Protection and Disaster Recovery Strategy

Featuring

Zerto, Rubrik, Pure Storage, Nasuni

Min Leads

800

Open Slots

4

Event Description

Our final event of 2021 is an important opportunity to help organizations improve their 2022 disaster recovery and data protection goals. Make sure your solution is front and center when it comes to developing new protection goals in 2022.

Vendor Fit

Any vendor with a service or solution that enables data protection and disaster recovery, including on-premises solutions, DRaaS services, cloud-centric solutions, and hybrid/multi-cloud solutions. Vendors that provide storage targets for data protection and disaster recovery solutions are also encouraged to attend, as are vendors adjacent to the data protection/disaster recovery market that help to augment these services.

Learn More
January 2022

IT Decisions Series: The Tools that Supercharge a Microsoft On-premises or M365/Azure Cloud Environment

Featuring

Duo Security

Min Leads

400

Open Slots

5

About This EcoCast

Microsoft continues to be a powerhouse in both on-premises environments as well as in the cloud with services such as Azure and Microsoft 365, among others.  The company's products and services power everything, from desktops to servers to enterprise applications to storage to cloud environments.  During this event, help a Microsoft-centric audience how to operate, enhance, and secure your company's IT environment.

Vendor Fit

Any vendor with a product or service that supports Microsoft environments in any form, including SQL Server tools, Active Directory tools, Azure or Office 365 tools, Windows Server or Desktop tools, Exchange tools, SharePoint tools, or any other Microsoft-centric service.

Transforming Education and Government IT and Cloud Environments

Featuring

Progress Software

Min Leads

150

Open Slots

5

About This EcoCast

As with every vertical, education and government environments have unique use cases not faced by other industries. During this vertical-centric event, you will be able to share your solution and services with an audience constantly on the lookout for new ways to get more from IT and drive their organizations forward.

Vendor Fit

Any vendor with a solution for education or government, or that includes sales to such organizations as a part of its strategy. This includes, but is not limited to, storage, security, networking, cloud, data protection, disaster recovery, Microsoft-centric services, and more.

In Cloud We Trust: Ensuring Trust and Security in Enterprise IT and the Cloud

Featuring

Progress Software, Metallic, Okta

Min Leads

800

Open Slots

5

About This MegaCast

As the cloud becomes foggier and even edge environments begin to resemble traditional cloud, it becomes increasingly more difficult to maintain a posture that reduces an organization's risk. As data is strewn to various geographic locales, the role of security also becomes one of compliance. During this event, vendors with a focus on information security, compliance, or governance have the opportunity to discuss with an audience how they can help organizations improve their security posture or achieve better data compliance outcomes even as data begins to exist in ever more locations.

Vendor Fit

Any vendor with a security story, whether that story is the entire mission of the company or is just one aspect of a broader product and services portfolio. Vendors that provide security awareness, security services, cloud security solutions, and more are encouraged to attend.

Defense in Depth: Exploring the Elements of a Layered Security Program

Featuring

KnowBe4, 1Password, SimSpace, Okta, AttackIQ

Min Leads

1200

Open Slots

7

About This Virtual Summit

Attackers are constantly looking for new opportunities to worm their way into organizations around the globe. No matter how good a security solution is, no single technology can be a panacea. A defense-in-depth approach is critical to have overlapping points of protection. Like a stack of slices of swiss cheese where no two holes line up, a defense in depth approach helps organizations keep the attackers out. In this Virtual Summit, ActualTech Media presents an IT audience with an extremely broad range of security solutions – from mobile to endpoint to remote to network to data center to cloud to physical. Don’t miss this opportunity to be sure your security solution is part of our audience members’ defense-in-depth plan.

Vendor Fit

Any vendor with a security story, whether that story is the entire mission of the company or is just one aspect of a broader product and services portfolio.

Supporting and Enabling Modern Applications

Featuring

Cequence

Min Leads

400

Open Slots

5

About This EcoCast

Modern application environments have been transformed thanks to containers, Kubernetes, and other services. Even as these services expand their reach, IT pros and decision makers are still figuring out how to think through these constructs. And those that have implemented them are working through integrating them into workflows. During this event, you'll talk directly to an audience comprised of IT pros and decision makers considering the next iteration of their modern application environment and working through how best to support them. If you provide any kind of containers or Kubernetes management offering, provide a software service that enables these environments, or have developed an application service that leverages them, join this event and share your innovation with IT pros and decision makers that need to understand about operation modern applications.

Vendor Fit

Any vendor that provides a Kubernetes platform, any kind of container platform, or provides software or hardware underlying support for these solutions, including storage, data protection, security, and any other support.

Understanding Your Cloud Native Data Protection and Disaster Recovery Options

Featuring

--

Min Leads

800

Open Slots

8

About This MegaCast

The cloud native trend has revolutionized the way applications are developed, managed, maintained, updated, and operated. Increasingly business-critical, these applications demand powerful and complete back up and recovery capabilities, as well as robust disaster recovery. In this MegaCast, get the opportunity to educate an audience of forward-thinking technology adopters about how your solution solves the novel problems of protecting data and/or providing disaster recovery options for modern applications and workloads.

Vendor Fit

Any vendor with a product or service for backup, recovery, data protection or disaster recovery, as well as vendors involved in developing tools for cloud-native applications

February 2022

From Infrastructure to Cloud to Applications: Comparing and Contrasting the Full Spectrum of Monitoring Needs and Tools

Featuring

--

Min Leads

400

Open Slots

6

About This EcoCast

Monitoring is the key to getting the most out of everything from infrastructure, databases, cloud, and applications. IT professionals are on the lookout for solutions that automate responses to commonly uncovered problems or that use artificial intelligence and machine learning to predict performance issues. In this Ecocast, an audience of IT professionals responsible for monitoring will be on hand to hear about solutions ranging from point solutions for individual packaged business applications to cloud provider uptime to data center performance to comprehensive solutions for tracking it all.

Vendor Fit

Any vendor with a tool or service that can help organizations monitor applications, data center systems, cloud applications or multi-cloud environments.

Power Up Your Databases: Surveying the Tools That Take Data, Analytics, Integration, AI/ML, and Intelligence to the Next Level

Featuring

--

Min Leads

400

Open Slots

6

About This EcoCast

No matter how much changes when it comes to applications, the Internet, user preferences or underlying platforms, the one constant is the software that sifts, sorts, tallies, groups and stores the data – the database. Yet the database itself can’t stand still either. Tools are constantly evolving to help database administrators deal with more data from a broader set of sources as they power ever-faster applications or reach more powerful conclusions. They’re also evolving to help analysts take all that data and reach better conclusions faster, be it through enabling human insight or augmenting those insights with hints garnered through artificial intelligence or machine learning. Get your latest database-enhancing tool in front of the right IT audience at this Ecocast.

Vendor Fit

Any vendor with a product or service that leverages AI/ML technologies to improve IT or business operations and outcomes. These can be IT-facing or business-facing products and services.

Ransomware: Best Practices for Preventation, Mitigation, and Recovery

Featuring

--

Min Leads

800

Open Slots

8

About This MegaCast

When things are a bit chaotic, opportunities arise for infiltrators to unleash malware as they seek cracks in your security armor. As organizations shift employees from offices to homes and back again, expect defenses to be less effective and watch for an increase in nefarious ransomware, the scourge of the internet. During this event, share with our audience your solution to the problem, whether it's a human-centric solution or a technology-driven one.

Vendor Type

Any vendor with a tool or service that can help organizations recover from ransomware or, better yet, avoid it in the first place. This can include human-centric security training tools and data protection/recovery/disaster recovery tools.