Webcasts


On Demand

Ransomware Protection Backup Verification

Testing is a requirement to cyber‑insurance that many organizations struggle to meet on a regular basis. SureBackup® is the Veeam technology that allows you to run multiple tests on your backups to confirm the data is malware‑free and that the data can be recovered. The process can be as simple or in‑depth as you need. It can be run manually or be scheduled as part of your disaster recovery preparations.


Ransomware Protection Disaster Recovery

Automation and orchestration have become critical to cybersecurity defense and recovery. Cyber‑insurance policies require tested, well‑documented plans. Rapid, reliable recovery is an integral part of the overall cybersecurity incident‑response process and must be thoughtfully planned out — just like the rest of the security architecture. Automation allows testing to be done on a regular basis and alerts administrators to changes to the environment, such that data cannot be damaged during a cyberattack.


Ransomware Protection Secure Restore

Veeam was first to market with the Secure Restore capability, which scans machine data with existing anti‑malware software before restoring to a production environment. By using existing tools, Secure Restore reduces the complexity of the security stack and speeds the investigation process to ensure threats will not be re‑introduced to the network.


Ransomware Protection Instant Recovery

Veeam has multiple recovery options which allow you to optimize your recovery processes, and quickly and simultaneously restore multiple machines. Granular options allow the recovery of a single file to applications, entire volumes or servers, reducing the costs of downtime and mitigating the risk associated with a cyber‑attack.


Ransomware Protection 3-2-1-1-0 Rule

The 3‑2‑1‑1‑0 Rule is a guiding principle to create air‑gapped, redundant and resilient data security programs that defeat ransomware. Air gaps work by storing data in isolated environments without online access. That way, there is zero possibility of data access or destruction.


Ransomware Protection Trusted Immutability

Immutability protects data from being deleted or modified, ensuring the data will be available after an incident. Having multiple layers of immutable storage based on your network design — both in the cloud or on premises — creates a redundancy and reduces risk of data loss by providing end‑to‑end protection of the data.


NIST SP 800-171 for Protecting Controlled Unclassified Information in Non Federal Systems and Organizations

In this webinar, we'll share how ManageEngine AD360 helps you be compliant. Learn how NIST has evolved to keep up with the changing cybersecurity landscape, the cost of non-compliance while dealing with federal data, and more.


Keys to Successful Application Modernization

Want to accelerate digital transformation and bring the benefits of application modernization to your organization? This webinar lays out practical steps to unlock new opportunities and meet top business objectives by modernizing your application estate.


Turning to technology to respond to a huge rise in high profile breaches

Join George Gerchow, CISO, Sumo Logic, and Stefan Tapp Senior Solutions Engineer APJ, Sumo Logic as they discuss how Australian organisations are using technology to combat attacks, strengthen their security postures and alleviate the additional burdens such attacks place on their security teams.


Coffee Talk: Digital Transformation & Enterprise Security: Why Managed Detection Response Is the Future

Don't let the security of your enterprise become collateral damage! Register for this free Coffee Talk to learn from top experts how a managed security model can be the best method for locking down your data, protecting your infrastructure from potential attacks, and growing your business worry-free. Sign up today!


MoneyTree Achieves Compliance and Speeds Innovation with AWS and Sumo Logic

Learn how MoneyTree uses AWS and Sumo Logic to help financial institutions better connect with consumers through real-time machine data analytics for operational and security insights.


Best Practices for AWS Monitoring

For many organizations, AWS is central to their ability to compete effectively in today’s digital world. Ensuring the reliability of the applications that power their business can be an important competitive differentiator that requires a robust observability strategy. Learn more.


Coffee Talk: Mobile Compliance 101: What IT Leaders Need to Know

Join this session, we'll dive deeper into this constant challenge, explore the hazards and potential penalties, and introduce some strong solutions to keep you safely within compliance. Register Now!


Group Policy Objects: Active Directory’s Hidden Security Trap

In this Webcast, you will learn various strategies for keeping your group policy objects secure and for adopting a change management system for group policy. Join in to learn more!


Cloud Data Protection Summit

Join the editors of Virtualization & Cloud Review along with independent data and infosec experts who do this work day-in and day out who will walk you through all the modern tips, tricks and best practices you need to know to truly keep your data secure, no matter your cloud setup.