Resources (12)

  1. Enterprise Security Fundamentals

    In IT, there is an exception to every rule; even the most basic rule of IT, which states that the answer to every question is “it depends.” Security is no different, and because it touches on all aspects of IT from the physical out to the cloud, anything to do with security is going to be rife with exceptions, including this book. There is a lesson in the middle of this confusion, however… Download Now

    • Security
  2. Seamlessly Manage Your Hybrid Cloud Environment

    Across datacenters worldwide, cloud conversations have changed dramatically over the last few years. Five years ago, the only way organizations could start new projects quickly or instantly deploy applications was to leverage the public cloud. While this offered many benefits, it also created some new challenges. One of the biggest involved managing applications deployed in different locations. W… Read More

    • Data Protection
    • Security
  3. Interview with Peter Smails of Datos.IO on Data Protection for Big Data Applications at #ETS17

    The ActualTech Media RoadCast is an ongoing series of short videos wherein ActualTech Media technologists hit the road to discuss the current state of enterprise IT with industry experts around the world. In this video, the team attended the Emerging Technology Summit (2017) hosted by DeltaWare Data Solutions. David Davis, Partner at ActualTech Media, interviews Peter Smails from Datos IO. Watch Now

    • Cloud
    • Enterprise
    • Security
    • Storage
  4. Interview with Andrew Miller of Rubrik on Ransomware and Modern Data Protection at #ETS17

    The ActualTech Media RoadCast is an ongoing series of short videos wherein ActualTech Media technologists hit the road to discuss the current state of enterprise IT with industry experts around the world. In this video, the team attended the Emerging Technology Summit (2017) hosted by DeltaWare Data Solutions. David Davis, Partner at ActualTech Media, interviews Andrew Miller from Rubrik at #ETS17… Watch Now

    • Data Protection
    • Security
  5. Transforming Datacenter Security with VMware NSX

    If you haven’t heard of it, VMware NSX is VMware’s network virtualization and security platform for the software-defined datacenter (SDDC). NSX enables the creation of entire networks in software and embeds them in the hypervisor layer, abstracted from the underlying physical hardware. With VMware NSX, you can provision network components in minutes, without the need to modify the application.… Learn More

    • Networking
    • Security
  6. 2017 Ransomware & DRaaS: Evaluate 8 Top Solutions Back-To-Back

    No matter who you are, whether it’s your company’s data or your personal data, your worse nightmare is that you wake up one day and your data is gone. Perhaps there was an unexpected disaster like a fire or electrical surge. Perhaps your data was corrupted due to some kind of upgrade. Or perhaps a malicious attacker stole your company’s data and posted it on the Internet. No matter what grou… Learn More

    • Data Protection
    • Security
  7. CEO Email Fraud - $5.3 Billion Mistake You Can’t Afford to Make!

    CEO fraud, also known as Business Email Compromise (BEC) has victimized more than 22,000 organizations and is responsible for over $5.3 billion in losses. Despite these statistics, CEO fraud remains a blind spot for many C-level executives who quickly learn the consequences of a weak cyber-risk assessment. Join David Davis and Erich Kron CISSP, Technical Evangelist at KnowBe4 for a live webinar… Learn More

    • Security
  8. Enterprise Security Ecocast

    As you look at IT spending in 2017, one area getting attention is security, and for good reason. Organizations across the globe are seeking ways that they can protect themselves from the bad guys while still allowing their staff to get their jobs done. However, this is an increasingly difficult balance. As the bad guys get badder, users become a weak link in the security chain. Moreover, lack of a… Learn More

    • Enterprise
    • Security
  9. Ransomware Hostage Rescue Guide - Continued

    2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017. In this webinar, we will cover the final 3 sections of the very popular KnowBe4 Ransomware Hostage Rescue Manual in depth. Join ActualTech Media's David Davis and Erich Kron… Learn More

    • Security
  10. Ransomware Hostage Rescue Guide

    2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017. Join ActualTech Media's David Davis and Erich Kron CISSP, Technical Evangelist at KnowBe4 for a live webinar “Ransomware Hostage Rescue Guide”. We will look at scary feature… Learn More

    • Security
  11. 2017 Data Protection Megacast: Evaluate 6 Top Solutions Back-To-Back

    Data protection – backup, replication, business continuity, monitoring – is not always considered an IT pro’s most exciting work, but it is one of the most critical services provided by the IT organization. As businesses increasingly rely on technology systems to get work done, the importance of data protection continues to grow. If disaster strikes, the business needs to be able to respond… Learn More

    • Data Protection
    • Security
  12. Surviving Social Engineering & Ransomware

    Attackers are moving their focus from attacking the hardened network perimeter to attacking your users. This has made Ransomware and CEO Fraud incidents skyrocket, costing billions of dollars in losses. Get insight into what your organization needs to know about these attack vectors. Join David Davis, Partner at ActualTech Media and Erich Kron, Technical Evangelist at KnowBe4 for a live webinar… Learn More

    • Data Protection
    • Security