Resources (29)

  1. Enterprise Security & Networking EcoCast

    Data breaches are happening every day and are highlighted on the evening news. That's NOT the kind of notoriety that your company needs! In today's world, every organization has concerns about their data and network security, but the real question is - what steps should you take to protect yourself? On this fast-paced event you'll learn about the most innovative security and networking tools th… Learn More

    • Networking
    • Security
  2. Securing the Organization EcoCast

    Securing the organization in 2019 has to be top priority for companies of all sizes. With data breaches being reported almost daily in the news, IT organization must ensure that their data is safe, their networks are secure, and their end users are security-savvy. Once secured, you must continually audit and test your security posture and network configurations to ensure that they remain secure. I… Learn More

    • Security
  3. Ransomware Hostage Rescue Guide

    It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks. So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Secur… Learn More

    • Data Protection
    • Security
  4. Decoupling Security Segmentation from Networking for Effective PCI Compliance

    Maintaining your PCI compliance posture is hard. Are the changes in your environment leading to segmentation errors? Is your QSA questioning the correctness and completeness of your PCI scope and segmentation? Have you tried to deploy more VLANs and data center firewalls to segment your PCI environment, and FAILED? In this webinar, Illumio’s Vivian Tero will share how customers can use Illumi… Learn More

    • Security
  5. Architecting a Data Protection and Disaster Recovery Strategy Training Day

    Make no mistake - this isn’t your typical webinar! On this new educational Training Day event you’ll receive comprehensive training on how to build a comprehensive data protection and disaster recovery strategy for your business. Our expert presenter is a veteran consultant with many disaster recovery projects under his belt and will share with you the components of a data protection strat… Read More

    • Data Protection
    • Security
  6. Security MegaCast

    Every day, new exploits are discovered and organizations falls victim. Whether through social engineering, brute force, or exploit of a vulnerability, those wishing to harm an organization or steal its assets have more avenues than ever at their disposal. Today, information security has emerged as a risk with board-level scrutiny and companies are racing to adopt the best solutions to help them se… Learn More

    • Data Protection
    • Security
  7. Achieving Zero Trust with Zero Fuss

    Enterprises struggling with increasingly complex infrastructure are turning to Zero Trust as a common security model for ensuring consistent security across environments. In fact, Forrester recently concluded that organizations using Zero Trust can mitigate risk by 37% and reduce security costs by more than 30%, potentially saving millions in their overall IT security budgets. In this webinar,… Learn More

    • Data Protection
    • Networking
    • Security
  8. 360in180: Taking Microsegmentation to the Next Level

    Security is top of mind for many an organization today as new attack vectors are devised and executed on every day.  Keeping up with the sheer diversity of potential areas of vulnerability is a primary concern as companies seek to stay out of the news and in business. The security market itself has fragmented into dozens of submarkets with different companies seeking to help customers secure t… Read More

  9. Simulated Phishing and Awareness Training

    Old-school awareness training does not hack it anymore. Your email filters have an average 10-15% failure rate; you need a strong human firewall as your last line of defense. Join us for a live demonstration of how KnowBe4 introduces a new-school approach to Security Awareness Training and Simulated Phishing. See the latest product features and how easy it is to train and phish your users.… Learn More

    • Data Protection
    • Security
  10. Why Microsoft's Office 365 Latest Data Protection Enhancements Aren’t Enough

    Industry analysts and leaders agree that you need to add backup and recovery tools to Office 365 for more comprehensive data management and retention. The latest Microsoft data protection enhancements can restore a few emails or files, but if you’re looking for a large recovery, you’ll need to turn to a third-party solution. Learn More

    • Data Protection
    • Security
    • Storage
  11. Networking EcoCast

    In case you haven’t noticed, the enterprise network is changing, and changing fast. Traditional physical routers, switches, and firewalls are quickly being replaced by their software-defined counterparts, networks are moving to the cloud, and networks are spanning the world. How is the enterprise to not only leverage the latest network innovations but just try to keep pace? How will you manage,… Learn More

    • Networking
    • Security
  12. Emerging Enterprise IT Security Innovations EcoCast

    With the cost of a cyber-attack hitting over $5 million on average (per the Ponemon survey), most companies simply can’t afford a data breach yet, according to Cybersecurity Ventures, there is a ransomware attack on a business every 14 seconds. How can you keep your data safe and your company secure? For those in IT, question like those are a constant concern and they are looking for security so… Learn More

    • Enterprise
    • Security
  13. Paying the “Inaction Tax”: The Cost of Status Quo Security

    Securing the perimeter is no longer enough to prevent breaches. Numerous regulations, such as PCI and SWIFT, now deal with data security and mandate segmenting your applications. If you’re looking to build a business case for securing your high value applications, tune in and take notes. Learn More

    • Security
  14. PanelCast - Preventing and Recovering From Ransomware

    Ransomware is costing companies millions of dollars in downtime plus there's no way to account for the true cost of your company's name in the headlines as having been breached. There's no denying that ransomware is impacting every company, large and small. The question is - how can you protect yourself? And if you are hit with ransomware, how can you rapidly recover without business impact? On… Read More

    • Data Protection
    • Security
  15. Security Best Practices for the Modern Digital Workspace

    The stark reality is that enterprises face serious challenges due to the lack of Security Ops expertise. They need to improve how they govern their data while, at the same time, their workforce is increasingly mobile, introducing all sorts of risk. Employees use various devices to access company data and they often do so from less-than-secure locations. These are the very security challenges th… Learn More

    • Data Protection
    • DRaaS
    • Security
  16. Audience Q&A Event: Securing the Human Layer

    It’s common knowledge that humans are the leading cause of IT security incidents.  Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident. You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of securi… Learn More

    • Cloud
    • Security
  17. Enterprise Security Megacast

    With almost daily security breaches in the news, protecting your company’s data - on-premises and in the cloud - should be at the top of every IT organization’s priority list. However, with so many different facets to security, where do you even start? As part of a comprehensive security strategy, you’ll need end user security training, auditing, logging, encryption, data protection, disaste… Learn More

    • Security
  18. Enterprise Security Fundamentals

    In IT, there is an exception to every rule; even the most basic rule of IT, which states that the answer to every question is “it depends.” Security is no different, and because it touches on all aspects of IT from the physical out to the cloud, anything to do with security is going to be rife with exceptions, including this book. There is a lesson in the middle of this confusion, however… Download Now

    • Security
  19. Seamlessly Manage Your Hybrid Cloud Environment

    Across datacenters worldwide, cloud conversations have changed dramatically over the last few years. Five years ago, the only way organizations could start new projects quickly or instantly deploy applications was to leverage the public cloud. While this offered many benefits, it also created some new challenges. One of the biggest involved managing applications deployed in different locations. W… Read More

    • Data Protection
    • Security
  20. Interview with Peter Smails of Datos.IO on Data Protection for Big Data Applications at #ETS17

    The ActualTech Media RoadCast is an ongoing series of short videos wherein ActualTech Media technologists hit the road to discuss the current state of enterprise IT with industry experts around the world. In this video, the team attended the Emerging Technology Summit (2017) hosted by DeltaWare Data Solutions. David Davis, Partner at ActualTech Media, interviews Peter Smails from Datos IO. Watch Now

    • Cloud
    • Enterprise
    • Security
    • Storage