On Demand
This webinar describes how setting a foundation on Red Hat Enterprise Linux for both on-site datacenter and AWS environments can help you improve productivity, security, and operations as you move to the cloud and adapt to an increasingly digital world. Join in to learn more!
Join our cybersecurity experts Mark Harris and Brette Petersen for practical guidance on enhancing native Microsoft 365 email security to learn how to assess existing gaps in your current email security posture, when your organization should consider implementing additional security controls, and more.
Join this three-hour, expert-led summit where you’ll learn the most common Microsoft 365 weak spots, the newest emerging attack vectors and methods, the best ways to mitigate these threats, and much more. Don’t wait – register today!
In this webinar, we’ll take you through how to get the most out of open source AI, introduce you to OpenShift Data Science, and provide a roadmap for planned future investments by Red Hat for AI on Red Hat OpenShift. Join to learn more!
Join Greg Schulz, Author and senior analyst at Server StorageIO and Microsoft MVP Cloud Data Center Management, as he discusses trends, issues, and challenges around remote device threats in Q4 and beyond and how to protect them.
As more companies engage partners to help them achieve real digital transformation, SaaS will be a more and more frequent component of the IT solutions that help them realize their goals. In this session, Senior Resultant Howard M. Cohen will discuss several SaaS-based strategies that accelerate and enable powerful digital transformation for your clients. Learn more!
Join security expert Ian Thornton-Trump CD as walks you through the realities of endpoint security, from protecting legacy systems, business services and even ephemeral workloads such as Elastic Beanstalk, so you can know how to thwart cyberattacks and keep your business afloat.
Deception technology has been around since the 1960s, well before Lance Spitzer created The Honeynet Project. Security professionals are very familiar with early forms of deception technology (honeypots, honeynets, honeytokens) and while the techniques are the same, modern deception has moved well beyond these early technologies.
MITRE Engenuity conducts independent evaluations of cybersecurity products to help institutions make better decisions to combat security threats and improve their threat detection capabilities. MITRE recently released results from the latest Engenuity ATT&CK Evaluation covering the adversary Turla, and SentinelOne will be breaking down the results during a special webcast. Join our product experts as we discuss what the ATT&CK Evaluation means for enterprises, what the Turla adversary is about, and how the Singularity Platform combats sophisticated threat actors.
During part one of our two-part webinar series, we’ll explore how to operationalize Microsoft Sentinel’s SIEM (Security Information and Event Management) and SOAR (Security Orchestration Automation and Response) capabilities combined with Security Operation Center analysis and response to rapidly detect, triage, and respond to actionable threats to your organization.
Join Ian Thornton-Trump CD for his latest analysis on threat actor’s motivations, the macro and micro trends to watch out for in 2023. The double edge sword of AI is leading the charge for the forces of good against the forces of evil. Both sides are gearing up for massive cyber battles with your cloud (and on premise) infrastructure in the way.
In this webinar you will learn best practices that have been learned through many successful cloud migrations, as well some unsuccessful efforts. Sign up today!
Register for this free, three-hour summit to learn everything you need to know today about the biggest cloud data management trends and challenges. From modern best practices to the biggest emerging threats, our panel of cloud experts will share their most actionable real-world insights and effective tips so your organization’s data doesn’t fall through the cracks. Sign up today!
Safeguarding Microsoft 365 data is your responsibility. In this webinar, we’ll explore how to keep your valuable Microsoft 365 data safe, compliant, and recoverable.
Join us to learn Microsoft’s newly introduced tools and features can help with data protection and security efforts. Don't miss out!