Resources (18)

  1. Emerging Enterprise IT Security Innovations EcoCast

    With the cost of a cyber-attack hitting over $5 million on average (per the Ponemon survey), most companies simply can’t afford a data breach yet, according to Cybersecurity Ventures, there is a ransomware attack on a business every 14 seconds. How can you keep your data safe and your company secure? For those in IT, question like those are a constant concern and they are looking for security so… Learn More

    • Enterprise
    • Security
  2. Paying the “Inaction Tax”: The Cost of Status Quo Security

    Securing the perimeter is no longer enough to prevent breaches. Numerous regulations, such as PCI and SWIFT, now deal with data security and mandate segmenting your applications. If you’re looking to build a business case for securing your high value applications, tune in and take notes. Learn More

    • Security
  3. PanelCast - Preventing and Recovering From Ransomware

    Ransomware is costing companies millions of dollars in downtime plus there's no way to account for the true cost of your company's name in the headlines as having been breached. There's no denying that ransomware is impacting every company, large and small. The question is - how can you protect yourself? And if you are hit with ransomware, how can you rapidly recover without business impact? On… Read More

    • Data Protection
    • Security
  4. Security Best Practices for the Modern Digital Workspace

    The stark reality is that enterprises face serious challenges due to the lack of Security Ops expertise. They need to improve how they govern their data while, at the same time, their workforce is increasingly mobile, introducing all sorts of risk. Employees use various devices to access company data and they often do so from less-than-secure locations. These are the very security challenges th… Learn More

    • Data Protection
    • DRaaS
    • Security
  5. Audience Q&A Event: Securing the Human Layer

    It’s common knowledge that humans are the leading cause of IT security incidents.  Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident. You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of securi… Learn More

    • Cloud
    • Security
  6. Enterprise Security Megacast

    With almost daily security breaches in the news, protecting your company’s data - on-premises and in the cloud - should be at the top of every IT organization’s priority list. However, with so many different facets to security, where do you even start? As part of a comprehensive security strategy, you’ll need end user security training, auditing, logging, encryption, data protection, disaste… Learn More

    • Security
  7. Enterprise Security Fundamentals

    In IT, there is an exception to every rule; even the most basic rule of IT, which states that the answer to every question is “it depends.” Security is no different, and because it touches on all aspects of IT from the physical out to the cloud, anything to do with security is going to be rife with exceptions, including this book. There is a lesson in the middle of this confusion, however… Download Now

    • Security
  8. Seamlessly Manage Your Hybrid Cloud Environment

    Across datacenters worldwide, cloud conversations have changed dramatically over the last few years. Five years ago, the only way organizations could start new projects quickly or instantly deploy applications was to leverage the public cloud. While this offered many benefits, it also created some new challenges. One of the biggest involved managing applications deployed in different locations. W… Read More

    • Data Protection
    • Security
  9. Interview with Peter Smails of Datos.IO on Data Protection for Big Data Applications at #ETS17

    The ActualTech Media RoadCast is an ongoing series of short videos wherein ActualTech Media technologists hit the road to discuss the current state of enterprise IT with industry experts around the world. In this video, the team attended the Emerging Technology Summit (2017) hosted by DeltaWare Data Solutions. David Davis, Partner at ActualTech Media, interviews Peter Smails from Datos IO. Watch Now

    • Cloud
    • Enterprise
    • Security
    • Storage
  10. Interview with Andrew Miller of Rubrik on Ransomware and Modern Data Protection at #ETS17

    The ActualTech Media RoadCast is an ongoing series of short videos wherein ActualTech Media technologists hit the road to discuss the current state of enterprise IT with industry experts around the world. In this video, the team attended the Emerging Technology Summit (2017) hosted by DeltaWare Data Solutions. David Davis, Partner at ActualTech Media, interviews Andrew Miller from Rubrik at #ETS17… Watch Now

    • Data Protection
    • Security
  11. Transforming Datacenter Security with VMware NSX

    If you haven’t heard of it, VMware NSX is VMware’s network virtualization and security platform for the software-defined datacenter (SDDC). NSX enables the creation of entire networks in software and embeds them in the hypervisor layer, abstracted from the underlying physical hardware. With VMware NSX, you can provision network components in minutes, without the need to modify the application.… Learn More

    • Networking
    • Security
  12. 2017 Ransomware & DRaaS: Evaluate 8 Top Solutions Back-To-Back

    No matter who you are, whether it’s your company’s data or your personal data, your worse nightmare is that you wake up one day and your data is gone. Perhaps there was an unexpected disaster like a fire or electrical surge. Perhaps your data was corrupted due to some kind of upgrade. Or perhaps a malicious attacker stole your company’s data and posted it on the Internet. No matter what grou… Learn More

    • Data Protection
    • Security
  13. CEO Email Fraud - $5.3 Billion Mistake You Can’t Afford to Make!

    CEO fraud, also known as Business Email Compromise (BEC) has victimized more than 22,000 organizations and is responsible for over $5.3 billion in losses. Despite these statistics, CEO fraud remains a blind spot for many C-level executives who quickly learn the consequences of a weak cyber-risk assessment. Join David Davis and Erich Kron CISSP, Technical Evangelist at KnowBe4 for a live webinar… Learn More

    • Security
  14. Enterprise Security Ecocast

    As you look at IT spending in 2017, one area getting attention is security, and for good reason. Organizations across the globe are seeking ways that they can protect themselves from the bad guys while still allowing their staff to get their jobs done. However, this is an increasingly difficult balance. As the bad guys get badder, users become a weak link in the security chain. Moreover, lack of a… Learn More

    • Enterprise
    • Security
  15. Ransomware Hostage Rescue Guide - Continued

    2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017. In this webinar, we will cover the final 3 sections of the very popular KnowBe4 Ransomware Hostage Rescue Manual in depth. Join ActualTech Media's David Davis and Erich Kron… Learn More

    • Security
  16. Ransomware Hostage Rescue Guide

    2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017. Join ActualTech Media's David Davis and Erich Kron CISSP, Technical Evangelist at KnowBe4 for a live webinar “Ransomware Hostage Rescue Guide”. We will look at scary feature… Learn More

    • Security
  17. 2017 Data Protection Megacast: Evaluate 6 Top Solutions Back-To-Back

    Data protection – backup, replication, business continuity, monitoring – is not always considered an IT pro’s most exciting work, but it is one of the most critical services provided by the IT organization. As businesses increasingly rely on technology systems to get work done, the importance of data protection continues to grow. If disaster strikes, the business needs to be able to respond… Learn More

    • Data Protection
    • Security
  18. Surviving Social Engineering & Ransomware

    Attackers are moving their focus from attacking the hardened network perimeter to attacking your users. This has made Ransomware and CEO Fraud incidents skyrocket, costing billions of dollars in losses. Get insight into what your organization needs to know about these attack vectors. Join David Davis, Partner at ActualTech Media and Erich Kron, Technical Evangelist at KnowBe4 for a live webinar… Learn More

    • Data Protection
    • Security