Resources (176)

  1. PanelCast - Migrating to the Cloud

    You're not alone. IT pros consistently tell us they're interested in migrating to the cloud but very concerned about the challenges and gotchas they could face. On this brand-new ActualTech Media PanelCast, we're bringing together leading experts on cloud migration to answer your pre-submitted and live questions about migrating to the cloud and how you can protect yourself from unwelcome surpri… Read More

    • Cloud
  2. Data Management EcoCast

    The term "Data Management" is taking on a much broader definition as visionary vendors look for ways to help their customers operate more effectively and efficiently. Today's data management encompasses features that help organizations better understand their data, its purpose, its location, and more. As data management becomes more sophisticated, additional capabilities are being introduced. A… Learn More

    • Big Data
    • Storage
  3. Implementing a Full-Spectrum Internet of Things Environment

    The datacenter as we know it is fracturing. What was once a single entity inside four walls now spans the cloud, our own datacenters, and the edge. As organizations transition from private datacenters to full-spectrum hybrid and multi-cloud entities, IT organizations are struggling to manage, rein in, and protect a tsunami of data. To top it off, companies are also adopting more devices than ever… Learn More

  4. Taking Control of Your Datacenter Destiny Part 4

    No CIO approaches the end of the year and says, “I can’t wait for my annual software audit!” But enterprise licensing agreements often make this an unavoidable pain. But what if it didn’t have to be that way? What if you could discover the secret tactics employed by vendors like IBM and Cisco and discover how to avoid contract lock in? Learn More

  5. Enterprise Security Megacast

    With almost daily security breaches in the news, protecting your company’s data - on-premises and in the cloud - should be at the top of every IT organization’s priority list. However, with so many different facets to security, where do you even start? As part of a comprehensive security strategy, you’ll need end user security training, auditing, logging, encryption, data protection, disaste… Learn More

    • Security
  6. Data Protection, Disaster Recovery & DRaaS Megacast

    The “new normal” is an expectation of 100% uptime of applications and long-term retention of data. Coupled with massively growing data sets, IT organizations are struggling to meet these expectations. As an IT professional, you are looking for innovative data protection and disaster recovery solutions to overcome these hurdles, but where do you start? You simply don’t have time to researc… Learn More

    • Data Protection
    • DRaaS
  7. Taking Control of Your Datacenter Destiny Part 3

    Is your datacenter support team facing 'tickets or crickets'? As you think about your datacenter support team, you need to consider both your internal resources as well as those of the vendors you’ve selected to operate your datacenter day-to-day. Not all vendors are created equal! And, the more vendors you have, the more likely it is that they’ll start blaming each other if things go wrong. I… Learn More

  8. Storage, Flash, NVMe and Storage Optimization EcoCast

    More today than ever before in history, IT organizations are facing growing challenges around storage optimization, performance, capacity, and availability. With the dramatic growth of storage consumption, it’s a constant challenge to keep pace with storage demands. The answer is smarter, more efficient, enterprise storage solutions that help you optimize your storage, make management easier and… Learn More

  9. Taking Control of Your Datacenter Destiny Part 2

    For most businesses, data center operations are not a strategic initiative. It’s overhead. By minimizing what it takes to operate these environment and accelerating administrative activities, businesses can become far more efficient and reduce costly administration-induced overhead. Even better for you, with improved datacenter efficiency comes less interruption. Maybe you can finally take that… Learn More

  10. Disaster Recovery-as-a-Service (DRaaS)

    Is your company prepared for disaster? How quickly can you recover your critical applications? With so many different disaster recovery solutions available, what’s the best technological approach? How do you get started with disaster recovery as a service? In this expert-led discussion, viewers will watch a lively discussion about the latest and most innovative disaster recovery options and D… Read More

  11. Securing the Organization EcoCast

    Securing the organization in 2019 has to be top priority for companies of all sizes. With data breaches being reported almost daily in the news, IT organization must ensure that their data is safe, their networks are secure, and their end users are security-savvy. Once secured, you must continually audit and test your security posture and network configurations to ensure that they remain secure. I… Learn More

  12. Taking Control of Your Datacenter Destiny

    The modern data center is the heart of the modern enterprise. Too often, however, the datacenter becomes a hindrance rather than helping propel the organization forward. Inherent legacy challenges plague efficiency and increase costs. For example, what if you could eliminate dreaded end of year licensing “true-ups” while eliminating lock-in? What if you could implement license-free virtuali… Learn More

  13. Cloud Solutions Megacast

    The cloud is a huge topic, which makes it a perfect fit for ActualTech Media's very first MegaCast of 2019!  All across the land, companies are adopting cloud in different forms, from wholesale migrations to public cloud, to hybrid cloud, to private cloud all in an attempt to move faster, be more scalable, and enhance economic models. During our MegaCast, you'll learn about the most innovative… Learn More

  14. Preventing Cyberattacks Before They Happen

    $7.6 million.  The average cost of a data breach. 196 days.  The average number of days it takes to identify a breach. Yikes!  It’s no wonder that security and breach-prevention is top-of-mind for the C-suite! The unfortunate reality is that the devices that your staff rely on day in and day out are one of the most common entry points for cyber-attackers, which is why they must be pr… Learn More

  15. The Role of Hyperconvergence in Retail Environments

    With 41% of consumers worldwide reporting that they use two or more channels during their purchase process, 90% of retailers are already implementing or planning to invest in omnichannel.  Most retailers recognize the importance of providing a seamless consumer experience, but many organizations are struggling to define their path to success. To achieve omnichannel success, retailers need to m… Learn More

  16. Converged, Hyperconverged, Composable Infrastructure, Integrated Platforms EcoCast

    The one thing that all businesses have in common is that they want and need IT solutions to make their lives easier, more efficient, and more affordable, particularly as digital transformation efforts take center stage. Converged, hyperconverged, composable, and other integrated platforms (collectively, integrated systems) all have the potential to accomplish these goals which can allow the IT or… Learn More

  17. Levers of Human Deception: The Science and Methodology Behind Social Engineering

    No matter how much security technology we purchase and chuck into the data center, we still face the most fundamental of security problems, which is the hardest to overcome: people.  People are susceptible every day to charismatic tricksters seeking to separate organizations from their data and their money. This webinar will explore the different levers that social engineers a… Learn More

  18. You’re PCI Compliant. But Are You Secure?

    According to the 2018 Verizon Data Breach & Incident Report, there were 2236 confirmed breaches in 2017. In many instances, these organizations passed their PCI audits prior to the discovery of the breach.  But PCI audits are just one part of an overall PCI security strategy. Too often, organizations fall back to a "checkbox-based" compliance mentality that relies on prescriptive, outdated tec… Learn More

  19. The Security-First Approach to the Modern Datacenter

    More than three-quarters of organizations have been victims of one or more successful cyber attacks. What about your business? Will you be next? The infrastructure you choose impacts your ability to protect your business from cyber threats. When looking to modernize your datacenter, it's important to not only consider removing complexity, increasing efficiency, enabling cloud use cases, and cut… Learn More

  20. Future Proof Your Data Protection

    The future of data protection is scalable, efficient, affordable, and easy to use. Unfortunately, most IT organizations are still using an aging data protection solution. These solutions are becoming unreliable, are slow to backup, recovery and protect your data and come with large annual contracts. What most IT organizations don't know, is that data protection of the future is available today!… Learn More