Resources (175)

  1. 5 Ways to Simplify Cloud Data Protection with Azure

    As enterprises accelerate the adoption of a multi-cloud strategy, the need to ensure availability for any application and any data, across any cloud infrastructure, is more important than ever. In fact, 74% of Tech Chief Financial Officers say cloud computing had the most measurable impact on their business. Together, Microsoft and Veeam® provide a tightly integrated solutions for enterprises… Learn More

  2. Modernize Data Protection with HPE and Cohesity

    Join Hewlett Packard Enterprise and Cohesity to learn how you can optimize your data protection strategy across core, edge and cloud. With this joint solution customers are enabled to not only protect, store, and easily manage their backup and unstructured data with a single point of global control, but also repurpose it to unlock insights for business outcomes. Come learn from the experts… Learn More

  3. How to SaaS-ify Windows Applications with Desktop as a Service

    ‘I have spoken: I love my slow, badly managed and insecure workspace!’ said no one ever. Desktop as a Service (DaaS) is the engine of the digital workplace for today’s workspace, this is the way! DaaS is a powerful platform to leverage modern Nutanix powered datacenters and public clouds such as from Google, Microsoft or Amazon for end user computing with unmatched flexibility, manageabili… Learn More

  4. Securing Active Directory: Proactively Detecting Attacks & Attack Pathways

    Active Directory is seasoned and well known. Unfortunately, the security set at install 15 years ago has not been checked or fixed. However, the attackers are using these attack pathways to move laterally and gain privileged access in AD. In order to fix these misconfigurations, today and tomorrow, a different tactic is required! The fact is that misconfigurations and privileged attacks can byp… Learn More

  5. Addressing Public Sector Data Protection Challenges on a 'Back-to-School' Budget

    State and Local and Educational (SLED) institutions have leveraged Unitrends for over 30 years to achieve complete data protection while reducing unnecessary complexity. As Public Sector IT faces increased pressure to deliver data and application instantly, unplanned downtime and disaster present significant risk. Unitrends cloud-empowered solutions encompass local backup and recovery, long-ter… Learn More

  6. The 'Shared Responsibility' Model Means You Need Data Protection For Your SaaS Apps

    Organizations lose data every day, even from SaaS apps such as O365. In fact, 77% of O365 users suffered a data loss incident in the last year with an average time of compromise to detection of 140 days. Office 365’s recycle bin holds items for up to 30 days before hard deletion. Are you confident lost data will be recoverable when you need it most? SaaS vendors such as Microsoft operate base… Learn More

  7. NextGen Desktop-as-a-Service Solution Designed For Multi-Cloud

    ‘I have spoken: I love my slow, badly managed and insecure workspace!’ said no one ever. Desktop as a Service (DaaS) is the engine of the digital workplace for today’s workspace, this is the way! DaaS is a powerful platform to leverage modern Nutanix powered datacenters and public clouds such as from Google, Microsoft or Amazon for end user computing with unmatched flexibility, managea… Learn More

  8. Case Study: Why One Company Made the Switch to Hyperconverged Infrastructure

    Virtualization has evolved. What was a complex array of storage, compute, networking, virtualization, and disaster recovery solutions has now become software-defined, consolidated, and simplified in hyperconverged infrastructure (HCI). Whether you are already virtualized with software-defined components, virtualized with traditional physical infrastructure components, or yet to virtualize some… Learn More

  9. Improve Help Desk Satisfaction with SolarWinds Web Help Desk

    Improving both resolution time and end-user satisfaction are top goals for many IT professionals. And, if we can improve response time, end-user satisfaction has nowhere to go but up. But how? One easy way to improve response time is to streamline your ticket management process. Join this webinar to learn how SolarWinds Web Help Desk can help you achieve these goals. Your time is your mos… Learn More

  10. Visualizing Data on a Single Pane of Glass

    Troubleshooting complex network problems comes down to knowledge: who is interrupting normal business functions, what service is talking to what resource, why the network is running so hot. Learn how SolarWinds is intuitively aggregating and visualizing data that helps you quickly diagnose problems and get to the root cause. Flush out your environment, make a cohesive picture with correlated netwo… Learn More

  11. Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim?

    There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operation… Learn More

  12. Strategizing A Modern Approach For DR and Ransomware Protection

    Struggling to afford traditional disaster recovery (DR)? You’re not alone. Since it typically demands an expensive second data center, or co-location site, it’s not affordable to most. On the other hand, there is a more modern approach — virtualization and cloud technologies. Utilizing the cloud, Disaster-Recovery-as-a-Service (DRaaS) is accessible and affordable to all, and provides pr… Learn More

  13. AI Infrastructure: From Planning to Conquering

    Every organization wants to use AI to enhance their business practices and processes. Often, getting started and or scaling with the right AI environment and infrastructure can leave you stuck at the start line. Challenges include: • Cost of GPU-workloads becomes cost prohibitive at scale using the public cloud • On-prem or co-location offerings make a strong case finan… Learn More

  14. Database Performance Monitoring for Open-Source Databases

    As the popularity of open-source databases such as PostgreSQL, MongoDB and MySQL grow, so does the need for “enterprise class” performance monitoring and tuning solutions. Leading online, SaaS, and digital commerce companies now run these databases as the backbone of their applications—and they also use SolarWinds® Database Performance Monitor to ensure the health and performance of those… Learn More

    • Monitoring
  15. Solution Deep Dive – Expedient Push-Button DR powered by Zerto

    Uptime reliability and strategic deployment of IT resources are table-stakes in our digital economy. The widespread adoption of cloud-based disaster recovery as a service (DRaaS) solutions is a testament to this reality; businesses in every industry leverage DRaaS to optimize and automate an IT process that has long been viewed as a necessary evil. On February 25, join Expedient and Zerto for a… Learn More

  16. See Ridiculously Easy Security Awareness Training and Phishing in Action!

    Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense. Join KnowBe4's Erich Kron as he walks you through some of the features of our one-of-a-kind training platform and addresses some of the common challenges organizations like yours face. Check out our new assessment featur… Learn More

  17. Securing Your Organization’s Human Layer

    The intersection between technology and human security is a difficult challenge for any organization to tackle, and although detection technologies are advancing, criminals are rapidly evolving their techniques and tactics to even greater levels of sophistication. Their attacks are difficult to detect, and even security administrators themselves fall victim. Join Perry Carpenter, Chief Evang… Learn More

    • Data Protection
    • Ransomware
    • Security
  18. Improving Patching Efficiency with Automation

    You have a good process down when it comes to understanding risk in your environment, but how do you go about working with other teams and implementing processes to actually reduce the risk? This can be quite challenging, especially if you’re reducing all risk manually. Join us as we dive into the most common challenges faced when it comes to risk reduction, how to overcome these challenges i… Learn More

  19. Building Next-Gen Log Analytics for Scale and Performance

    Modern log analytics have enabled businesses to leverage machine data to proactively monitor infrastructure, track cybersecurity threats, and even build industrial automation. But current approaches to analyzing data across hot, warm, and slow tiers using distributed DAS aren’t enough. They don’t adequately address ever-changing business needs due to growing operational complexity and IT infra… Learn More

  20. Prevention is your first line of Defense from Ransomware. But what if Prevention fails?

    A data protection strategy is something every organization has implemented. However, the crucial question is, can the information be recovered from an ever-evolving threat landscape? Over the past few years, ransomware has morphed from a broad-based attack vector to one that has become more sophisticated, targeted, and ruthless. Even with state-of-the-art prevention solutions, organizations mus… Learn More

    • Data Protection
    • Storage