June 2022

Building a Robust Security Awareness Program

Featuring

KnowBe4, Gigamon, SimSpace, Nasuni, Rubrik

Min Leads

800

Open Slots

3

About This MegaCast

The front line of security is the human and organizations around the world realize it. Security awareness programs are a critical component in an information security framework and may include human training and tools to help organizations maintain awareness of their current security posture.

Vendor Fit

Any vendor with a product or service intended to help customers build or improve a security awareness program.

Learn More
July 2022

Zero Trust: What is it and How to Achieve it

Featuring

--

Min Leads

200

Open Slots

4

As remote users, BYOD and cloud-based assets overtake the enterprise, the traditional perimeter defenses no longer offer sufficient protection. Stepping into the breach is Zero Trust, with its focus on users, assets, and resources. This Tech Talk will cover everything from definitions of Zero Trust to various implementations of Zero Trust principles in different parts of the enterprise. ATM’s expert moderators will interview your SME on your view of the problems Zero Trust solves and how your solution implements Zero Trust for maximum effect. Reach our engaged audience of security-focused IT pros, who are on the lookout now for solutions that will improve the security posture of their organizations.

Supporting, Improving, and Securing Education and Government IT and Cloud

Featuring

Sophos, Gigamon, Rubrik, Progress Software, Synology, CrowdStrike

Min Leads

150

Open Slots

Contact Us

About This EcoCast

As with every vertical, education and government environments have unique use cases not faced by other industries. During this vertical-centric event, you will be able to share your solution and services with an audience constantly on the lookout for new ways to get more from IT and drive their organizations forward.

Vendor Fit

Any vendor with a solution for education or government, or that includes sales to such organizations as a part of its strategy. This includes, but is not limited to, storage, security, networking, cloud, data protection, disaster recovery, Microsoft-centric services, and more.

The Layers of Defense in a Comprehensive Security Strategy

Featuring

--

Min Leads

200

Open Slots

Contact Us

There is no silver bullet in IT security. Every solution has holes and edges that attackers can get through or around in certain circumstances. That makes layered defense an absolute necessity for a comprehensive security strategy. In this Expert Series session, a security expert provided by ActualTech Media will list the essential layers for security and explore each layer in a vendor-neutral fashion. As a sponsor, you’ll only need to provide a promotional slide, while ATM will handle all aspects of audience development, event production, and lead delivery.

Data Analytics and Business Intelligence Showcase

Featuring

--

Min Leads

200

Open Slots

4

It’s often said that data is the new oil. Just like oil doesn’t provide any power when it’s in the ground, data needs to be lifted out of storage and processed, analyzed, and engaged with by people or AI to reach its transformative potential. Show an engaged audience of IT professionals what your solution can do in this Democast. Whether your solution involves finding relevant data in data stores, cleaning the data, adding metadata, performing analysis or applying AI/ML, this is the perfect opportunity to reveal the power of your tools. After your demo, a short Q&A with our expert moderator helps you further position your innovative solution.

Start Now: Discovering the Critical Tools and Services That Will Define IT Through 2030

Featuring

SimSpace, Rubrik, strongDM, Zerto

Min Leads

1200

Open Slots

8

About This Virtual Summit

The one constant in technology is change, and ever accelerating change at that. Think about how different your infrastructure looked in 2010. Now imagine where we might be in 2030. That can be hard for IT decision makers. As a solution provider, you have insights into your own roadmaps and know your vision for the future of tech better than anyone. Help an audience of IT influencers envision how their infrastructure may look at the start of the next decade. Explain your company’s story about how the future could look and how some of your most advanced solutions – available now or on the near-term horizon -- fit into it. Don’t miss this one-of-a-kind Summit -- an opportunity to shape the next decade of IT.

Vendor Fit

Any vendor that sells an IT-centric product or service.

Ransomware Series: The Realities of Remote Workers and Ransomware Risk

Featuring

Keeper Security, CrowdStrike, Rubrik

Min Leads

200

Open Slots

Contact Us

Many factors contribute to the explosion of ransomware attacks, not least of which is the emergence of widespread remote work. We all know that remote workers present serious security challenges compared to in-office employees, but what can be done about it? In this Expert Series, a ransomware expert provided by ActualTech Media will cover the ransomware-related challenges of a remote workforce, as well as vendor-neutral best practices for securing the enterprise in a remote-work or hybrid-work setting. As a sponsor, you’ll only need to provide a promotional slide, while ATM will handle all aspects of audience development, event production, and lead delivery.

Choosing a Next Generation Data Protection & Disaster Recovery Solution

Featuring

Zerto, TierPoint, Rubrik, Micro Focus

Min Leads

800

Open Slots

4

About This MegaCast

Data protection and disaster recovery solutions are undergoing a revolution in capability, speed, and resiliency with the emergence of cloud. At the same time, ransomware is making disaster recovery and data protection more urgent than ever before. Participate in this MegaCast to show forward-thinking IT decision makers why your solution is a great fit for their next-generation data protection and disaster recovery needs.

Vendor Fit

Any vendor with a product or service for data protection, disaster recovery or backup and recovery.

Data Foundations: Choosing the Right Database (SQL, noSQL, etc.) and Operating Environment (on-prem vs. Cloud)

Featuring

--

Min Leads

200

Open Slots

4

Databases power the modern world, but what powers the database? This Tech Talk will cover the foundations of data. ATM’s expert moderators will interview your SME on fundamental questions about choosing the right database platform, covering elements of the debate that apply to your solution -- be it database type, such as SQL or noSQL; database location, such as public cloud versus hybrid or on-premises; operating environment platform; and much more. Your expert won’t need slides, demos, or a lot of prep. Get your innovative solution in front of an engaged audience of data-focused IT pros for this fast-paced event!

Wrangling Passwords, Authentication, and Identity: Keys to Success

Featuring

Okta, Ping Identity, 1Password

Min Leads

400

Open Slots

3

About This EcoCast

Few areas are as rife with conflicting advice as passwords. With recent changes in NIST guidance on passwords, it seems everyone is confused about what they should be doing. Which underscores a key problem with passwords. To paraphrase Ben Franklin, “Passwords are the worst form of protection, except for all the others.” What to do about passwords, authentication and identity? Take this opportunity to explain how your solution addresses the evolving guidance on passwords, augments passwords for identity and authentication, or bypasses passwords with an innovative approach.

Vendor Fit

Any company with an endpoint security story, ransomware story, phishing story, or identity management story.