Join Ian Thornton-Trump CD, CISO of Cyjax who has recent experience with a global deployment of Cloud based firewall technology and learn from his successes and challenges.
In this webinar, you will learn observability best practices that can help you best leverage your AWS data. Learn more!
This phase of the hybrid cloud evolution demands is a strategic approach to the tools and services that provide a critical level of digital resilience. In this Tech Talk, Paul Nicholson, Sr. Director of Product Marketing at A10 Networks, breaks down the increasingly complex challenge of providing digital resilience for modern hybrid cloud application deployments. Don't miss it!
This webinar will help you understand how to leverage ITDR to detect and mitigate identity-based cybercrime. Don't miss it!
This webinar will help attendees understand today’s newly exclusive cyber insurance market, the current universe of cyber threats, and the basics of constructing a DR plan: practical advice you can use to ensure you qualify for cyberinsurance and protect your business against cyberthreats to your uptime and sensitive data.
Join this webcast where Dave Russell, Veeam’s Vice President of Enterprise Strategy, and Misha Rangel, Veeam's Director of Enterprise Product Marketing will help you navigate through different questions that as decision maker you should ask yourself and your team when evaluating company’s specific data needs.
Make sure you're ready for all things cloud data protection with this free half-day summit from the editors of Virtualization & Cloud Review and Redmondmag.com.
Endpoint Credentials remain High-Value Targets for cybercriminals. The 2022 Verizon Data Breach Investigations Report found that nearly 50% of all data breaches are caused by stolen credentials and cost an average 4M dollars per attack. Regardless of the credential type or stored location, A myriad of tools make it possible to access these high-value targets, providing cybercriminals with a potentially clear path for exposure.
Join this session, to discuss how new features like Direct-to-object storage and the expanded options for application-consistent cloud backups will provide even more security protection.
In this session, Nathan O’Bryan (MCSM: Messaging, MVPr Office 365) will explore Best Practices for Securing, Administering & Recovering M365 to ensure security, and compliance while maintaining the appropriate levels of access for end-users.
Whether you need to encrypt your emails, secure user logins, secure endpoints, prevent data loss, detect and respond to attacks, or even run attack simulations, Microsoft 365 has you covered. In this session, we'll dive into some of those security features and how you can take advantage of them in your own environment!
There's so much IT leaders need to know about keeping their M365 installations secure in 2023 that the editors of Redmondmag.com have created this free, half-day summit where you'll hear from independent Microsoft 365 and security experts on the best ways to keep your M365 (and your enterprise) secure. Don't miss it!
Register for this Coffee Talk to learn exactly what’s falling out of support and when, the security and licensing implications, and how to find the least-painful upgrade paths for your organization.
In this Tech Talk, John K. Waters, editor in chief in the Converge360 Group of 1105 Media, talks with entrepreneur and thought leader Bob Friday, Chief AI Officer at Juniper Networks, about ChatGPT and the future AIOps, which organizations are implementing to automate infrastructure operations and DevOps.