Resources (230)

  1. Vertical Event: Solutions for Healthcare EcoCast

    If you’re working in a technology role in the healthcare field, whether you’re in a hospital or clinic, working in a company producing the latest breakthrough treatment or working in an organization helping patients on the financial side of their health, you know that you have unique technology needs that many other companies may not. You also know that you need technology that enables rather… Learn More

  2. Security MegaCast

    Every day, new exploits are discovered and organizations falls victim. Whether through social engineering, brute force, or exploit of a vulnerability, those wishing to harm an organization or steal its assets have more avenues than ever at their disposal. Today, information security has emerged as a risk with board-level scrutiny and companies are racing to adopt the best solutions to help them se… Learn More

    • Data Protection
    • Security
  3. End User Computing and VDI EcoCast

    There's no disputing the multitude of reasons that companies are moving to VDI. The increase in security, the management efficiency, and cost savings are real but they don't come without the right architecture, software, and storage in the datacenter. On this VDI EcoCast from ActualTech Media we'll be deep diving into new solutions that boost performance, increase reliability and optimize VDI e… Learn More

    • VDI
  4. Data Protection, Disaster Recovery, DRaaS Megacast

    Just about every IT organization is now being expected to provide 100% uptime of applications (just like Facebook and Google) and seemingly infinite retention of your company's data. If you couple that with massively growing data sets and an increasing number of applications, most IT organizations are struggling to meet such high expectations. As an IT professional, you are looking for innovat… Learn More

    • Data Protection
    • DRaaS
  5. Achieving Zero Trust with Zero Fuss

    Enterprises struggling with increasingly complex infrastructure are turning to Zero Trust as a common security model for ensuring consistent security across environments. In fact, Forrester recently concluded that organizations using Zero Trust can mitigate risk by 37% and reduce security costs by more than 30%, potentially saving millions in their overall IT security budgets. In this webinar,… Learn More

    • Data Protection
    • Networking
    • Security
  6. Networks Aren't “Set It and Forget It” Anymore

    The network is the infrastructure on which all your data rides. Frequently, network devices fall into the "if it ain't broke, don't fix it" category. Although the devices feel static, they are a living, evolving part of your infrastructure. Every day, vulnerabilities are uncovered, and your devices may become new attack vectors. Many people fear making changes to network devices like they are a… Learn More

  7. Cloud Solutions EcoCast

    Cloud-based solutions are enabling companies small and large to do things they never thought technologically possible or thought they could never afford to do. If you think that leveraging the cloud isn't right for your company because you aren't the ""Facebook's of the world"" - think again. On this special webinar event you'll hear from enterprise technology innovators who will present their lat… Learn More

    • Cloud
  8. PanelCast - Migrating to Hyperconverged Infrastructure

    Chances are that you have heard of hyperconvergence but what's it really like to migrate to it and use it on a daily basis? What are the gotchas along the way? How does it change availability and performance? How hard is it to get off of (and out from under) your aging storage area network (SAN) and was it worth the effort? Does it really save real IT organizations time and money? We'll be answ… Read More

    • Hyperconvergence
  9. Agile Backup and Disaster Recovery for On-Premises and Cloud Applications

    Hyperconverged infrastructure has transformed the data center and brought with it new technologies intended to help drive organizational success. Once thought sacrosanct, Nutanix busted the hypervisor world wide open with the introduction of AHV.  And now, Arcserve is bringing comprehensive disaster recovery and backup capability to AHV. Modern disaster recovery and data protection solutions r… Learn More

  10. Maximizing Your Hybrid Cloud Investment

    Over the past decade, “the cloud” has evolved from a thorn in the side of the CIO to become a clear enabler of business, with incredible opportunity to help organizations change the economic landscape of IT, transform application development and deployment, and kickstart languishing digital transformation efforts. Along with all the good, however, have come some challenges. Some organizations… Learn More

  11. Live Demo: SaltStack Continuous Compliance and IT Security - at Scale!

    Security and IT teams must to work together to keep digital business safe and compliant. But conflicting priorities, toolsets, increasing complexity and make it easier said than done. Join SaltStack Sr. Product Manager Mehul Revankar as he demonstrates how SaltStack SecOps allows IT and security teams to work together to define compliance policies, scan complex systems against them, and remedia… Learn More

  12. Building Your Private Cloud with Hyperconverged Infrastructure

    Businesses are increasingly relying on IT to deliver digital capabilities that will drive productivity and growth. Traditional infrastructure is not agile, does not foster innovation, and is burdensome to setup, manage and upgrade. See how IT professionals like you can rapidly deploy agile, software-defined infrastructure to rapidly serve applications that support demanding business needs and digi… Learn More

    • Cloud
  13. Stay Out of the Net: Your Ultimate Guide to Phishing Mitigation

    Spear phishing emails remain the most popular attack avenue for the bad guys, yet most companies still don’t have an effective strategy to stop them. This enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more. Don’t get caught in a phishing net! Learn how to avoid having your end users take the bait. This webinar, hosted by Roger… Learn More

  14. Breaking Down the Relentless Risk of Ransomware

    More than half of enterprises report that they've experienced at least one ransomware attack during the previous 12 months* and most were attacked more than once. So what's the impact? Lost productivity, loss or exposure of sensitive data, loss of current revenue and even the risk to future profitability. How do you quantify the risk? And more importantly, how do you address it? Please join… Learn More

  15. Solutions for State and Local Government and Education EcoCast

    The IT organizations that make up state, local government, and educational institutions have unique requirements and regulations that traditional commercial organizations aren't hampered by. From unique IT budgeting to strict compliance, ""SLED"" organizations are constantly forced to maximize every IT resource in their complex IT environments. On Wednesday, June 12th we're covering what you ne… Learn More

    • Other
    • Special Webinars
  16. Don’t Let Digital Transformation Wreak Havoc on Your Network!

    Yes, digital apps are hyper-agile, but they’re also incredibly complex making it difficult to get visibility into traffic. But without that visibility, how can you truly ensure a great experience? Help is at hand. During this webinar, you’ll learn how to build an efficient network architecture to provide an engaging digital experience. See how pioneering technology Gigamon Application Intel… Learn More

  17. Battling Cybercrime with Unified Endpoint Management

    Cyberattacks are increasing across all industries, and cybercriminals are savvier than ever. While the total number of IT vulnerabilities is decreasing, the number considered critical is on the rise; and so are the number of actual security exploits. Every organization is at risk of being hit with a devastating attack. Once attacked, many businesses suffer downtime, data loss, and large financial… Learn More

    • Cloud
  18. Storage, Flash, NVMe and Storage Optimization Megacast

    The storage market has transformed in recent years, with the standalone storage array being attacked from all sides by ambitious rivals vying for customer attention in a world demanding more and more from beleaguered IT departments. Today, storage comes in many shapes and sizes - flash, hybrid, NVMe, cloud, and more. With so many solutions in this burgeoning space, and more jumping in every day… Learn More

    • Flash
    • Storage
  19. Hot vs Cold Data: Its Influence On Data Placement Decisions & What to Do About It

    The short half-life of data, quickly decaying from hot to warm to cold, governs how much you should spend on it throughout its stages. Humans are poorly equipped to track the rapid temperature changes, much less capable of reacting to it. Consequently, largely dormant data consumes precious space on expensive storage, blowing up disk capacity and spiraling up costs. Learn More

    • Data Protection
  20. Simulated Phishing and Awareness Training

    Old-school awareness training does not hack it anymore. Your email filters have an average 10-15% failure rate; you need a strong human firewall as your last line of defense. Join us for a live demonstration of how KnowBe4 introduces a new-school approach to Security Awareness Training and Simulated Phishing. See the latest product features and how easy it is to train and phish your users.… Learn More

    • Data Protection
    • Security