Resources (179)

  1. Securing Your Organization’s Human Layer

    The intersection between technology and human security is a difficult challenge for any organization to tackle, and although detection technologies are advancing, criminals are rapidly evolving their techniques and tactics to even greater levels of sophistication. Their attacks are difficult to detect, and even security administrators themselves fall victim. Join Perry Carpenter, Chief Evang… Learn More

    • Data Protection
    • Ransomware
    • Security
  2. Improving Patching Efficiency with Automation

    You have a good process down when it comes to understanding risk in your environment, but how do you go about working with other teams and implementing processes to actually reduce the risk? This can be quite challenging, especially if you’re reducing all risk manually. Join us as we dive into the most common challenges faced when it comes to risk reduction, how to overcome these challenges i… Learn More

  3. Building Next-Gen Log Analytics for Scale and Performance

    Modern log analytics have enabled businesses to leverage machine data to proactively monitor infrastructure, track cybersecurity threats, and even build industrial automation. But current approaches to analyzing data across hot, warm, and slow tiers using distributed DAS aren’t enough. They don’t adequately address ever-changing business needs due to growing operational complexity and IT infra… Learn More

  4. Prevention is your first line of Defense from Ransomware. But what if Prevention fails?

    A data protection strategy is something every organization has implemented. However, the crucial question is, can the information be recovered from an ever-evolving threat landscape? Over the past few years, ransomware has morphed from a broad-based attack vector to one that has become more sophisticated, targeted, and ruthless. Even with state-of-the-art prevention solutions, organizations mus… Learn More

    • Data Protection
    • Storage
  5. How Persistent Memory Delivers Superior ROI for Data Intensive Workloads

    In today’s information-driven economy, quickly processing ever-increasing volumes of data into actionable information to win customers and edge out the competition have become table stakes.  Unfortunately, the statistics for converting data into information is DISMAL. “Though about 90 percent of the digital data ever created in the world has been generated in just the past two years, o… Learn More

  6. A.I. from the Front Lines

    By now, you may have heard about numerous use cases of companies across a variety of industries using Artificial Intelligence (A.I.) to drive their business decisions or perhaps introduce new business models. In fact, according to a recent study completed by 451 Research, at least 50% of the organizations today are either using A.I. within their organization or have an active POC/pilot currentl… Learn More

    • A.I.
  7. On-Demand Disaster Recovery for Virtual Desktop Infrastructure Environments

    Managing a robust and growing VDI environment, such as VMware Horizon, is already onerous without mishaps. With the increase in ransomware attacks, it's much more challenging for IT teams to protect their data centers and also prepare for natural disasters. Disaster Recovery has never been more critical, and until now, it’s been out of reach for many companies due to the cost and complexity o… Learn More

  8. Microsoft Office 365 and Mimecast: Reaping the Benefits of Cloud Without Increasing Risk

    Remember when Microsoft Exchange on-premises was the default option? Great email solution, a lot of gaps from a security and resilience standpoint. As migrations to Office 365 continue to grow, the hosting method may have changed, but the security challenges remain. Join this session for a deep-dive into how to reap the benefits of cloud without increasing your cybersecurity risk. We’ll discu… Learn More

    • Cloud
  9. IT Operations Management and Your Move to Azure

    Hybrid, cloud, on-premises, all-of-the-above? The name of the game is availability, and modern enterprises are evolving quickly to adapt to both new technologies and new economics to achieve it. Whether you’re moving more workloads to the cloud, increasing the number of databases running in the cloud (such as Azure® SQL Database), or migrating to SaaS applications, IT headcount isn’t increasi… Learn More

  10. How to Prevent 81% of Phishing Attacks from Sailing Right into Your Inbox with DMARC

    Only ~20% of companies use DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which could significantly cut down on phishing attacks. But even when they are enabled and your domain is more secure, 81% of phishing attacks still continue to sail right through to the end-user. In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will teach you how to enable DMARC, S… Learn More

  11. Applying an ROI framework to your Vulnerability Management Program

    Join this webcast to learn how to quantify the value of switching to InsightVM, and also how to quantify the value of a vulnerability management solution in general. Learn more about the benefits of InsightVM from a security, financial, and business perspective. We’ll deep dive into the cost, benefit, flexibility, and risk factors that go into purchasing InsightVM. These will provide you with… Learn More

  12. Top Five Criteria For Evaluating a Modern Data Warehouse

    Many organizations face a two-fold challenge with changing business requirements and massively growing datasets. Before selecting a modern data warehouse solution, organizations should first understand the use cases, potential pitfalls, and what to look for in evaluating the best modern data warehouse solution to meet their specific needs. Don't select a modern data warehouse until you've atten… Learn More

  13. Modernizing Data Protection with Pure Storage

    Increasing Data Volumes? Aggressive recovery SLA’s? Running scared of Ransomware attacks?  Sitting around waiting for restores? Are you modernizing your data protection architecture to solve some of these technology issues? Confused about the many options that are available? Just as Flash revolutionized the primary storage market, learn how Flash is now disrupting the data protection market… Learn More

  14. Security Segmentation for the Modern, Agile, Innovative Data Center

    The modern data center is agile, shouldn’t your segmentation be as well? Traditional segmentation solutions such as internal firewalls or SDN segmentation are cumbersome, costly, and complex. These legacy approaches tie security segmentation to network infrastructure, meaning the segmentation policy cannot move at the speed of the business. Join our webcast, led by experts from Illumio, to di… Learn More

  15. Do You Really Know What’s Running on Your Network?

    Everyone thinks they know what applications and data are on their network, but is that really the case? Find out November 14 when we partner with ActualTech Media for an information-packed webinar devoted to network and application visibility. For network architects and SecOps alike, you’ll learn invaluable information from our industry-leading Gigamon expert. Be sure to join and win in th… Learn More

  16. Transform Your Database into an Engine of Innovation

    Do you have critical databases with a high cost of ownership, dedicated infrastructure, and management nightmares? What if you could eliminate dedicated database storage arrays and migrate to a simplified platform that consolidates all of your databases while providing optimized workload performance, integrated security and availability across the entire database estate, and operational efficiency… Learn More

  17. Data Resiliency Moves to the Cloud, Featuring Forrester

    Why should your business adopt a modern data-resiliency mindset? Data is becoming increasingly distributed across on-premises and multi-cloud environments and according to Forrester “this scattering of data requires infrastructure and operations leaders to take a fresh approach to data resiliency.”* To address today’s IT challenges, companies are looking for innovative data-resiliency sol… Learn More

  18. Modernize Your Data Protection Infrastructure with PureStorage and Veeam to Recover from Cyber Attacks

    Organizations are facing ransomware more and more frequently today. Without proper protection, the only option is to pay the ransom and hope cybercriminals unlock your data. Simple data backup is no longer enough with ransomware even targeting backups, rendering entire environments unavailable with valuable services interrupted in the meantime. A new approach to Data Protection from Pure Storag… Learn More

  19. Ransomware is Not Going Away: Protect Yourself with Cyber Insurer-Endorsed Solutions

    Across all sectors, ransomware incidents increased by 118 percent during the first quarter of 2019 alone and can cost $4M+ in lost information [1]. Marsh, the world’s leading insurance broker and risk adviser, just announced the 2019 class of Cyber Catalyst designated cybersecurity solutions. This is the first-of-its-kind evaluation program designed to bring organizations greater clarity in the… Learn More

  20. Pure on AWS – Enabling an Enterprise Hybrid Cloud Experience

    Join AWS and Pure Storage on this interactive session to explore how you can leverage the power of the AWS cloud and Pure's Cloud Data Services to deliver solutions for enterprise use cases and address critical business requirements. Learn how you can realize your cloud strategy by unlocking new hybrid cloud use cases and enabling mission-critical applications to run on AWS cloud with enhanced… Learn More

    • Cloud