Resources (16)

  1. Securing Your Organization’s Human Layer

    The intersection between technology and human security is a difficult challenge for any organization to tackle, and although detection technologies are advancing, criminals are rapidly evolving their techniques and tactics to even greater levels of sophistication. Their attacks are difficult to detect, and even security administrators themselves fall victim. Join Perry Carpenter, Chief Evang… Learn More

    • Data Protection
    • Ransomware
    • Security
  2. Prevention is your first line of Defense from Ransomware. But what if Prevention fails?

    A data protection strategy is something every organization has implemented. However, the crucial question is, can the information be recovered from an ever-evolving threat landscape? Over the past few years, ransomware has morphed from a broad-based attack vector to one that has become more sophisticated, targeted, and ruthless. Even with state-of-the-art prevention solutions, organizations mus… Learn More

    • Data Protection
    • Storage
  3. Ransomware Hostage Rescue Guide

    It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks. So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Secur… Learn More

    • Data Protection
    • Security
  4. Achieving Zero Trust with Zero Fuss

    Enterprises struggling with increasingly complex infrastructure are turning to Zero Trust as a common security model for ensuring consistent security across environments. In fact, Forrester recently concluded that organizations using Zero Trust can mitigate risk by 37% and reduce security costs by more than 30%, potentially saving millions in their overall IT security budgets. In this webinar,… Learn More

    • Data Protection
    • Networking
    • Security
  5. Hot vs Cold Data: Its Influence On Data Placement Decisions & What to Do About It

    The short half-life of data, quickly decaying from hot to warm to cold, governs how much you should spend on it throughout its stages. Humans are poorly equipped to track the rapid temperature changes, much less capable of reacting to it. Consequently, largely dormant data consumes precious space on expensive storage, blowing up disk capacity and spiraling up costs. Learn More

    • Data Protection
  6. Simulated Phishing and Awareness Training

    Old-school awareness training does not hack it anymore. Your email filters have an average 10-15% failure rate; you need a strong human firewall as your last line of defense. Join us for a live demonstration of how KnowBe4 introduces a new-school approach to Security Awareness Training and Simulated Phishing. See the latest product features and how easy it is to train and phish your users.… Learn More

    • Data Protection
    • Security
  7. Why Microsoft's Office 365 Latest Data Protection Enhancements Aren’t Enough

    Industry analysts and leaders agree that you need to add backup and recovery tools to Office 365 for more comprehensive data management and retention. The latest Microsoft data protection enhancements can restore a few emails or files, but if you’re looking for a large recovery, you’ll need to turn to a third-party solution. Learn More

    • Data Protection
    • Security
    • Storage
  8. Simplifying Data Protection Management in the Cloud

    From reducing costs to decreasing the time-to-market for the key applications that run the business, the cloud has forever changed how companies compete. But when it comes to protecting business data, using a combination of backup, disaster recovery, and archive strategies in multiple locations gets complicated. Veeam and iland have simplified data protection management, no matter where the dat… Learn More

    • Cloud
    • Data Protection
  9. Security Best Practices for the Modern Digital Workspace

    The stark reality is that enterprises face serious challenges due to the lack of Security Ops expertise. They need to improve how they govern their data while, at the same time, their workforce is increasingly mobile, introducing all sorts of risk. Employees use various devices to access company data and they often do so from less-than-secure locations. These are the very security challenges th… Learn More

    • Data Protection
    • DRaaS
    • Security
  10. Getting More Out of Your Backup Data: The New Standard for Secondary Storage

    The traditional practice of storing backup data on devices optimized only for ingress and compression has created data siloes with costly tradeoffs… slow restores, trapped information, the need for specialized expertise, and even lost data. But Gartner says that by 2020, 30% of organizations will leverage backup for more than just operational recovery. Join ActualTech Media's Scott D. Lowe, a… Learn More

    • Data Protection
    • Storage
  11. Harnessing the Power of Hybrid Cloud, Virtualization, And Integrated Backup Appliances

    Many IT pros see "cloud" and "appliance" as mutually exclusive objects. Analysts seem to have forgotten that we will always have local infrastructure that needs to be supported, maintained, and protected. Even for enterprises that have remained 100% on-premises, emerging data protection opportunities can make leveraging cloud seamless and affordable. Hybrid cloud--a combination of public and pr… Learn More

    • Cloud
    • Data Protection
  12. Surviving Social Engineering & Ransomware

    Attackers are moving their focus from attacking the hardened network perimeter to attacking your users. This has made Ransomware and CEO Fraud incidents skyrocket, costing billions of dollars in losses. Get insight into what your organization needs to know about these attack vectors. Join David Davis, Partner at ActualTech Media and Erich Kron, Technical Evangelist at KnowBe4 for a live webinar… Learn More

    • Data Protection
    • Security
  13. ENTERPRISE-GRADE DISASTER RECOVERY WITHOUT BREAKING THE BANK

    Until recently, enterprise-grade disaster recovery (DR) had been prohibitively expensive, leaving many organizations with unreliable solutions and high levels of risk. Now, organizations can enjoy top-of-the-line disaster recovery at a fraction of the price, thanks to the rapid development of cloud technology. So why do many organizations take the risk of having only a backup system, which can… Learn More

    • Data Protection
  14. Key Data Protection Best Practices

    If you’re like most organizations, keeping your data safe and available are critically important tasks to your business and you’re always looking for ways to make sure that you don’t succumb to a disaster. To help aid you in your data protection journey, Tintri and Veeam have come together in this virtual event to share with you best practices around data protection. Join industry veteran… Learn More

    • Data Protection
    • Virtualization
  15. Conquering Disaster Recovery Challenges

    More and more companies are leveraging the cloud for disaster recovery. After all, the limitless compute resources of the cloud are perfectly suited for disaster recovery. Still, too many companies have struggled with leveraging hybrid cloud for DR because of the lack of automation & orchestration as well as the struggle to easily connect corporate system-of-record data with cloud compute. Learn More

    • Cloud
    • Data Protection
  16. Disaster Recovery in a Box

    Is your Business Continuity / Disaster Recovery (BC/DR) plan complete, fully tested, and affordable? For the vast majority of companies out there, the answer is always NO. That’s because BC/DR plans are never complete (they’re constantly changing), disaster recovery is too hard to fully test, and a complete BC/DR solution is never affordable. Fortunately, Maxta and Zerto with their Disaster… Learn More

    • Data Protection