July 2022

Zero Trust: What it is and How to Achieve it

Featuring

ActualTech Media, Rubrik

Min Leads

200

Open Slots

2

As remote users, BYOD and cloud-based assets overtake the enterprise, the traditional perimeter defenses no longer offer sufficient protection. Stepping into the breach is Zero Trust, with its focus on users, assets, and resources. This Tech Talk will cover everything from definitions of Zero Trust to various implementations of Zero Trust principles in different parts of the enterprise. ATM’s expert moderators will interview your SME on your view of the problems Zero Trust solves and how your solution implements Zero Trust for maximum effect. Reach our engaged audience of security-focused IT pros, who are on the lookout now for solutions that will improve the security posture of their organizations.

Learn More

Supporting, Improving, and Securing Education and Government IT and Cloud

Featuring

Sophos, Gigamon, Rubrik, Progress Software, Synology, CrowdStrike

Min Leads

150

Open Slots

Contact Us

About This EcoCast

As with every vertical, education and government environments have unique use cases not faced by other industries. During this vertical-centric event, you will be able to share your solution and services with an audience constantly on the lookout for new ways to get more from IT and drive their organizations forward.

Vendor Fit

Any vendor with a solution for education or government, or that includes sales to such organizations as a part of its strategy. This includes, but is not limited to, storage, security, networking, cloud, data protection, disaster recovery, Microsoft-centric services, and more.

Learn More

The Layers of Defense in a Comprehensive Security Strategy

Featuring

CrowdStrike, Rubrik, AttackIQ, Duo Security, Cequence

Min Leads

200

Open Slots

Contact Us

There is no silver bullet in IT security. Every solution has holes and edges that attackers can get through or around in certain circumstances. That makes layered defense an absolute necessity for a comprehensive security strategy. In this Expert Series session, a security expert provided by ActualTech Media will list the essential layers for security and explore each layer in a vendor-neutral fashion. As a sponsor, you’ll only need to provide a promotional slide, while ATM will handle all aspects of audience development, event production, and lead delivery.

Learn More

Start Now: Discovering the Critical Tools and Services That Will Define IT Through 2030

Featuring

SimSpace, strongDM, Zerto, Rubrik, IBM, Duo Security, Delinea, RAPID7, Quantum

Min Leads

1200

Open Slots

3

About This Virtual Summit

The one constant in technology is change, and ever accelerating change at that. Think about how different your infrastructure looked in 2010. Now imagine where we might be in 2030. That can be hard for IT decision makers. As a solution provider, you have insights into your own roadmaps and know your vision for the future of tech better than anyone. Help an audience of IT influencers envision how their infrastructure may look at the start of the next decade. Explain your company’s story about how the future could look and how some of your most advanced solutions – available now or on the near-term horizon -- fit into it. Don’t miss this one-of-a-kind Summit -- an opportunity to shape the next decade of IT.

Vendor Fit

Any vendor that sells an IT-centric product or service.

Learn More

Ransomware Series: The Realities of Remote Workers and Ransomware Risk

Featuring

Recorded Future, Keeper Security, CrowdStrike, Rubrik, Duo Security

Min Leads

200

Open Slots

Contact Us

Many factors contribute to the explosion of ransomware attacks, not least of which is the emergence of widespread remote work. We all know that remote workers present serious security challenges compared to in-office employees, but what can be done about it? In this Expert Series, a ransomware expert provided by ActualTech Media will cover the ransomware-related challenges of a remote workforce, as well as vendor-neutral best practices for securing the enterprise in a remote-work or hybrid-work setting. As a sponsor, you’ll only need to provide a promotional slide, while ATM will handle all aspects of audience development, event production, and lead delivery.

Learn More

Choosing a Next Generation Data Protection & Disaster Recovery Solution

Featuring

Zerto, TierPoint, Rubrik, Micro Focus/HPE, Nasuni

Min Leads

800

Open Slots

3

About This MegaCast

Data protection and disaster recovery solutions are undergoing a revolution in capability, speed, and resiliency with the emergence of cloud. At the same time, ransomware is making disaster recovery and data protection more urgent than ever before. Participate in this MegaCast to show forward-thinking IT decision makers why your solution is a great fit for their next-generation data protection and disaster recovery needs.

Vendor Fit

Any vendor with a product or service for data protection, disaster recovery or backup and recovery.

Learn More

Data Foundations: Choosing the Right Database (SQL, noSQL, etc.) and Operating Environment (on-prem vs. Cloud)

Featuring

DataStax, Pure Storage

Min Leads

200

Open Slots

2

Databases power the modern world, but what powers the database? This Tech Talk will cover the foundations of data. ATM’s expert moderators will interview your SME on fundamental questions about choosing the right database platform, covering elements of the debate that apply to your solution -- be it database type, such as SQL or noSQL; database location, such as public cloud versus hybrid or on-premises; operating environment platform; and much more. Your expert won’t need slides, demos, or a lot of prep. Get your innovative solution in front of an engaged audience of data-focused IT pros for this fast-paced event!

Learn More

Wrangling Passwords, Authentication, and Identity: Keys to Success

Featuring

Ping Identity, Okta, 1Password, CyberArk

Min Leads

400

Open Slots

2

About This EcoCast

Few areas are as rife with conflicting advice as passwords. With recent changes in NIST guidance on passwords, it seems everyone is confused about what they should be doing. Which underscores a key problem with passwords. To paraphrase Ben Franklin, “Passwords are the worst form of protection, except for all the others.” What to do about passwords, authentication and identity? Take this opportunity to explain how your solution addresses the evolving guidance on passwords, augments passwords for identity and authentication, or bypasses passwords with an innovative approach.

Vendor Fit

Any company with an endpoint security story, ransomware story, phishing story, or identity management story.

Learn More
August 2022

Zero Trust Security

Featuring

CrowdStrike, Keeper Security, Hewlett Packard Enterprise, Axis Security, Rubrik

Min Leads

800

Open Slots

3

About this MegaCast

The security winds are rapidly shifting from ‘trust but verify’ models to ones that assume that every activity is insecure until proven otherwise. In an age of high-profile security attacks, increasingly sophisticated phishing schemes, and ransomware threats run amok, organizations of all shapes and sizes are urgently seeking new ways to protect their finances, their reputations, and their business operations. Enter Zero Trust. Participate in our MegaCast to show organizations striving to embrace Zero Trust methodologies how your solution can help them achieve their goals.

Vendor Fit

Any vendor Zero Trust security tools or solutions.

Learn More

Choosing Your Next Firewall: Key Features and Decision Points

Featuring

CrowdStrike

Min Leads

200

Open Slots

Contact Us

With malicious attacks impacting companies of all sizes, technologists are constantly looking for security solutions to better protect and defend their network, data, and livelihood. A cornerstone of any defense-in-depth strategy is firewalls, and today's Next Generation Firewalls (NGFW) offer surprising and impressive innovation.

In this Expert Series, a security expert provided by ActualTech Media will cover the key features and decision points that network and security experts need to know when shopping for new firewall solutions. As a sponsor, you’ll only need to provide a promotional slide, while ATM will handle all aspects of audience development, event production, and lead delivery.

Learn More