On Demand
Join us for a deep dive into Azure Virtual Desktop (AVD) security, where we will explore essential strategies to safeguard your virtual desktop environment. Register now!
In this session, we'll discuss ransomware attacks in the context of a comprehensive program leveraging recovery strategies against attacks you can’t always prevent. Keep the data safe and keep the users working. Attend to learn how.
In today’s technological landscape, Active Directory (AD) is a constant attack point for attackers. A common vector of attack against Active Directory is via group policy. Group policy can be used as a very effective direct or indirect method of executing remote code, modifying security settings, changing user permissions, and much more.
In this 45-minute, on-demand webinar, learn how to (safely) manage and secure licenses and user access. Learn more!
Most enterprise ITOps organizations desire a state of self-healing systems capable of identifying and resolving issues without human intervention. While the allure of eliminating known, repeatable incident response workflows offers immense promise, these initiatives often fail to get off the ground. Learn how IT operations can jumpstart automation programs that tie together BigPanda Incident Intelligence with Red Hat® Ansible® Automation Platform – so you can go from knowledge to automated response.
This webinar aims to equip educational IT professionals, administrators, and decision-makers with the knowledge and strategies needed to protect student data, ensure uninterrupted learning, and navigate the cybersecurity landscape effectively using Datto's powerful tools. Join us to fortify your educational institution's cybersecurity defenses and ensure a safe learning environment for all.
Join some of the industry's top security experts for this three-hour crash course on how to foster a culture of cybersecurity vigilance in your organization.
Join this webinar for a new approach to building cyber resilience for the employees on the front lines of your organization.
Join some of the industry's top security experts for this three-hour crash course on how to foster a culture of cybersecurity vigilance in your organization.
Join us for this free, half-day summit where some of the industry’s top independent experts will share their tried-and-true methods for designing, implementing and managing a disaster-proof Microsoft 365 backup and recovery plan. Make sure your Microsoft 365 data doesn’t get lost to the ether if (or when) disaster strikes – register today!
If you are an IT professional or a business leader, and you use Exchange, SharePoint, Teams, or other Microsoft 365 applications, you will benefit from this session. This session will help you ensure the security and availability of your Microsoft 365 data and services.
Microsoft 365 creates a far more granular environment in which users and their resources are often far more isolated than before, potentially creating far greater resilience than ever if managed properly. In this session, Senior Resultant Howard M. Cohen looks forward to suggest how we can better prepare our networks, our data, our devices, and our people to survive and successfully recover from all these modern disasters and more.
Join Rosa Smothers, former CIA Cyber Threat Analyst and Technical Intelligence Officer, now KnowBe4’s SVP of Cyber Operations, as she reveals the OSINT techniques employed by cybercriminals that can help you protect your organization before disaster strikes.
Are you struggling to understand user complaints about application performance? Register Now to learn how monitoring end user experience can help you better optimize your applications and more! thank you
In today’s fast-changing technology landscape, businesses across all industries are reimagining the architecture for their branches, allowing them to be agile and better serve their customers. Join SDxCentral and Palo Alto Networks for this exclusive online event and see how next-gen SD-WAN and SASE can help you modernize and secure your branches.