Resources (59)

  1. Evaluating Endpoint Protection Platforms

    Endpoints - desktops, laptops, printers, mobile devices, etc. - are a significant point of entry into corporate computing environments and when they're attacked, things go bad. Moreover, when they're unavailable due to a security issue, productivity suffers. When they are compromised, data can be lost. During this event, you'll learn about some of the most innovative endpoint protection solutio… Learn More

    • Data Protection
    • Security
  2. Assessing and Improving Data Protection, DRaaS, & Disaster Recovery Capabilities

    For years, the data protection and disaster recovery markets have undergone both evolution and revolution as new products jump onto the scene while others mature and grow. This rapid pace of innovation has resulted in more end user choice than ever before. At the same time, companies of all sizes are being attacked with ransomware and we need data protection more than ever before! Is your current… Learn More

    • Data Protection
    • DRaaS
    • Security
  3. Exploring Transformational Technologies

    Achieving IT and business success in today's challenging environment is tougher than ever but will be practically impossible without a thorough understanding of the latest technology solutions available on the market. Staying current with the new products, tools, and services to support IT is increasingly a tall order as vendors innovate and technologies evolve. On the ActualTech Media Discover… Read More

    • A.I.
    • AL/ML
    • Big Data
    • Cloud
    • Cloud Native
    • Containers
    • Convergence
    • Data and Analytics
    • Data Protection
    • Data Protection/DR/DRaaS
    • DevOps
    • DRaaS
    • Edge
    • Enterprise
    • Featured
    • Flash
    • Healthcare
    • Hyperconvergence
    • Machine Learning
    • Microsoft-centric
    • Monitoring
    • Monitoring and Management
    • Networking
    • Public Sector
    • Ransomware
    • Remote Workforce
    • SDDC
    • Security
    • Special Webinars
    • Storage
    • Trophy Assets
    • VDI
    • Virtualization
  4. Securing and Protecting Email Services

    Even in 2021, email remains a key vector by which attacks are carried out on organizations—in fact, more than two-thirds of all ransomware infections still come from email phishing attacks. At the same time, as cloud email services continue to dominate the industry, there remains a stubborn refusal to back these services up, often due to a misunderstanding of what cloud service providers include… Learn More

    • Data Protection
    • Security
  5. Ransomware Recovery: Best Practices and Products

    Ransomware. The very word raises hackles on the necks of IT admins, security admins, and everyone with responsibility for safeguarding a company’s data. And it’s a threat that seems to grow by the minute, especially in this age of uber-distributed computing that includes the cloud, the edge, the Internet of Things, and so on. With a new ransomware infection happening every 11 seconds, you c… Learn More

    • Data Protection
    • Ransomware
    • Security
  6. Spring Summit: Supercharging IT

    The world is constantly changing and now more than ever, already pushed-to-the-brink IT departments are being called upon to help their organizations continue their transformation efforts, to reshape the end user computing experience, and to ensure that IT is secure, compliant, and financially sustainable. Legacy approaches to modern problems may still have a place, but as IT leaders and professio… Learn More

    • A.I.
    • AL/ML
    • Big Data
    • Cloud
    • Cloud Native
    • Containers
    • Convergence
    • Data and Analytics
    • Data Protection
    • Data Protection/DR/DRaaS
    • DevOps
    • DRaaS
    • Edge
    • Enterprise
    • Featured
    • Flash
    • Healthcare
    • Hyperconvergence
    • Machine Learning
    • Microsoft-centric
    • Monitoring
    • Monitoring and Management
    • Networking
    • Public Sector
    • Ransomware
    • Remote Workforce
    • SDDC
    • Security
    • Special Webinars
    • Storage
    • Trophy Assets
    • VDI
    • Virtualization
  7. Enhancing Data Protection, DRaaS, & Disaster Recovery Capabilities

    Just about every IT organization is now being expected to provide 100% uptime of applications (just like Facebook and Google) and seemingly infinite retention of your company's data. If you couple that with massively growing data sets and an increasing number of applications, most IT organizations are struggling to meet such high expectations. As an IT professional, you are looking for innovati… Learn More

    • Data Protection
    • DRaaS
    • Security
  8. Ensuring Zero Trade-off Between Security and Customer Experience

    Maintaining the right balance between security and customer experience is always challenging for online businesses. This challenge becomes even more relevant during this crisis as businesses face unprecedented levels of traffic and attacks. Tune in to learn how LendingTree leverages Cloudflare to strengthen their security posture while ensuring a superior online experience for their customers. Learn More

    • Data Protection
    • Security
  9. Creating and Implementing a Data Protection Strategy and Disaster Recovery Plan

    Are you struggling to meet the “new normal” expectation of 100% uptime of applications and long-term retention of data? Coupled with massively growing data sets, IT organizations are finding it tough to match up with the availability of the web-scale Facebooks of the world. To meet this challenge, companies are looking for innovative data protection and disaster recovery solutions but, where d… Learn More

    • Data Protection
    • DRaaS
    • Security
  10. Malicious Browser Notifications:

    Cybercriminals have added a devious weapon to their attack arsenals - malicious browser notifications. And the worst part is they’re not blocked by any current cyber defense. These innocuous looking pop ups can wreak havoc on your network while remaining completely undetected. They look more realistic than traditional phishing methods and are designed to trick your unsuspecting… Learn More

    • Data Protection
    • Ransomware
    • Security
  11. Secure Data and Infrastructure:

    Every day, the news has stories of yet more victims that have fallen to ransomware foes. Most can recover whether by paying an exorbitant Bitcoin ransom or spending weeks pulling data from hopefully uncompromised backups, but many simply cease to exist and countless more suffer massive reputational, financial, and operational impact. The stark reality is that you need both a ransomware avoidanc… Learn More

    • Data Protection
    • Data Protection/DR/DRaaS
  12. Microsoft Teams Backup:

    Microsoft Teams is now the center of our productivity universe — but should you back it up? Although Teams has its own basic retention, it does not fully protect against user error or security threats, nor does it enable long-term retention for compliance or regulatory purposes. With the rush to deploy Teams, many organizations still do not understand the what, why and how of protecting this cri… Learn More

    • Data Protection
    • Data Protection/DR/DRaaS
    • Remote Workforce
  13. A Data Protection and Disaster Recovery Primer

    Data Protection and Disaster Recovery are critical but traditionally too much time and money are wasted building and maintaining the DP/DR infrastructure when you should instead be investing in technology that makes a real difference for the bottom line. Thankfully, innovative data protection and disaster recovery solutions are making DP/DR easier than ever before. Join the latest Gorilla Guide… Read More

    • Data Protection
    • DRaaS
    • Security
  14. How To Simplify Data Protection For Workloads On AWS

    The explosive growth of cloud workloads has created a decentralized environment, leaving IT teams vulnerable to data protection gaps. Therefore Cloud Architects are tasked to address issues such as unmanaged data, mitigating data loss, compliance, and rising storage costs. In this webinar, we will explore powerful tips to achieving comprehensive data protection for AWS native workloads, includi… Learn More

    • Data Protection
    • Data Protection/DR/DRaaS
  15. Phish Stories:

    Second generation phishing attacks are moving faster than defenses. Automation and AI are increasing the speed and success of these phishing attacks. Leveraging legitimate infrastructure and matching data to build detailed lists of targets increases their success. What was once spray and pray bulk phishing attacks are now mass quantities of highly target spear-phishing attacks. Learn More

    • Data Protection
    • Data Protection/DR/DRaaS
    • Ransomware
  16. Enhancing Data Protection, DRaaS, & Disaster Recovery Capabilities

    If you have data protection and disaster recovery challenges - this is the perfect event for you! Don't have time to compare many different solutions? (who does!) On the data protection, disaster recovery, and disaster recovery as a service (DRaaS) MegaCast you'll hear from the leaders innovators and challengers in the space, see their products in action, and get all your questions answered. Let t… Learn More

    • Data Protection
    • DRaaS
    • Security
  17. Enabling Backup & Recovery Best Practices in 2021

    No longer is data protection a service relegated to the back room. Today, conversations about recoverability take place everywhere, from employee desks to IT to the C-suite and even the board room. Each year, as backup and recovery gains additional prominence and capability, it also become more operationalized and permeates every aspect of the organization. With the rise In prominence, permeati… Learn More

    • Data Protection
    • Data Protection/DR/DRaaS
  18. Data Protection, DRaaS, & Disaster Recovery

    In a recent survey, 51% of IT Pros said that their greatest fear when it comes to data protection is that they can't recover their data when they need to. In that same survey, 84% said that their data protection and disaster recovery solution needed improvement or would have to be replaced. And sadly, 71% indicated that they weren't confident that they were adequately protected from ransomware. Ar… Learn More

    • Data Protection
    • DRaaS
  19. Data Protection, DRaaS, & Disaster Recovery

    With massively growing data sets and expectations of 100% uptime with long term retention, companies are struggling to meet data protection and disaster recovery demands. These problems are prevalent, no matter the size of the organization. To compound that, IT organizations simply don’t have time to research and compare the latest software and hardware solutions available for enterprise data pr… Learn More

    • Data Protection
    • DRaaS
    • Security
  20. Data Protection, DRaaS, & Disaster Recovery

    In a recent survey, 51% of IT Pros said that their greatest fear when it comes to data protection is that they can't recover their data when they need to. In that same survey, 84% said that their data protection and disaster recovery solution needed improvement or would have to be replaced. And sadly, 71% indicated that they weren't confident that they were adequately protected from ransomware. Ar… Learn More

    • Data Protection
    • DRaaS
    • Security
    • Storage