Industrial iOt applications

IIoT is the Industrial Internet of Things. IIoT enhances industrial efficiencies through the application of IoT in the manufacturing industry, such as a connected factory solution accelerator.

HYBRID Cloud Compliance

Managing risk across private, public, hybrid and multi clouds makes IT security/compliance very complex and time-consuming. Learn how to address these issues, in a world of cloud sprawl and multiple regulations.

Actionable cloud Security

Merritt Baer, AWS Principal Security Architect & Harvard Law School Grad, offers technical and strategic guidance on scaling cloud security. From tagging to executive sponsorship, she guides participants through reviewing then improving their security position.

Disaster Recovery Services

Business continuity depends on the efficient, uninterrupted flow of data across an organization. Learn how AWS can prevent even a brief lapse in workload continuity

IoT & Smart Building

Though a variety of building automation and management systems have been deployed, facility managers need a single unified view of the data generated by various disparate closed systems in their facilities, with comprehensive building analytics.

Cloud migration Cost Savings

Cloud migrations are increasing exponentially as organizations reduce their reliance on on-prem computing. Learn from Steve how to accomplish these migrations cost-effectively and save money.

Cloud Compute Cost Savings

Learn how to select and configure your AWS cloud compute platforms, for cost optimization and financial savings, without sacrificing performance.

Cloud storage Cost Savings

Learn how to select and configure your AWS storage architecture, for cost optimization and financial savings, without sacrificing performance.

Cloud-Native Exploits

Cloud misconfigurations allow bad actors to access environments, discover sensitive data, and steal it – without detection⁠. Learn from Fugue how to stop them using policy-as-code tools, while identifying and securing vulnerabilities.

SSH keys/IT Audit Compliance

Secure Shell grants access (with an SSH key) to, from and between servers, in the cloud and on-prem. These keys never expire however. Learn from SSH.COM how to prevent a single key (out of millions) from causing a failed IT Audit, if not a compromised network.

Cloud-Driven Enterprise Network

Digital Transformation is the coveted yet elusive prize that businesses are chasing. Learn how a cloud-driven enterprise network can help you achieve digital transformation’s potential.

SaaS Security

Software-as-a-Service applications like Confluence, Jira, and Salesforce are indispensable tools. As the Next-Gen Cloud Access Security Broker, Bitglass is perfectly positioned to help organizations protect their data in these and other SaaS apps.

AI/Cloud-Powered Bots

Microsoft AI-powered and Cloud-based Cognitive Services automate human interactions. A simple API call – no machine-learning expertise needed – embeds BoTs in your apps, that see, hear, speak, search, understand, and accelerate your decision-making.

Industrial iOt applications

IIoT is the Industrial Internet of Things. IIoT enhances industrial efficiencies through the application of IoT in the manufacturing industry, such as a connected factory solution accelerator.

Landing Zone Account Mgt

Before deploying/migrating applications to AWS, you need to configure the account structure, security rules, default network settings, and other foundational services. Learn from Logicworks how to set up this base environment, or landing zone.

Infrastructure-as-Code

AWS CloudFormation uses programming to model app resources and infrastructure (Infrastructure-as-Code). AWS partner LogicWorks discusses how CloudFormation creates a modular architecture and central hub for security/governance standards.

Zero Trust Security

Security spending up 11% yet cyberattacks rose 50%. How can organizations safely deliver digital transformation? Check Point discusses how Zero Trust  plus other techniques can improve outcomes in Cloud, Advanced Threats and Mobility.

IT Security automation

As IT environments become more complex, so do your security challenges. Learn how Check Point automation and orchestration helps you assess risk, remediate issues and ensure compliance by programmatically addressing security tasks and processes.

Robotic Process Automation

RPA automates, secures and scales business processes, from legacy to modern, across the enterprise, to eliminate error-prone manual tasks. Learn from Micro Focus about new robo workers, that liberate human brainpower and ignite productivity.

Network Access Control

Network access control supports visibility and access management through policy enforcement on devices and users. Learn from PKA to support home workers, stop insecure nodes from infecting your network/data, and restrict non-compliant access.

Data Analytics

Google’s track record in innovation – there are nine platforms with more than one billion users – allows Google Cloud Platform customers access to the tools and capabilities built for these platforms, to drive value in their own Data, ML, and AI applications.

Scaling Telemedicine

Learn to Quickly Deploy Telemedicine Applications, Given COVID-19 and CMS Regulatory Changes/Relaxation. With so many healthcare organizations providing treatment via your smartphone, this content is very timely and relevant.

Ransomware/DRaaS

DR has never been more critical with the rampant rise in ransomware attacks. Learn how to prepare for and recover from a ransomware attack and other disasters, what are the most common DR events, and integrating DR plans with public cloud services.

DRAas with VMWare & AWS

Traditional DR is expensive, complex and unreliable. With its cloud native design, built-in backups, instant RTO and on-demand model, Datrium DRaaS converts the complex DR/backup process into an easy-to-use SaaS solution based on VMware and AWS.

Cloud PErformance

Bitglass considers how cloud security architectures and business models affect scalability, uptime & performance. They explain why some security architectures are robust, with high performance, while others are sluggish.

Healthcare Cloud Security with CASB’s May 6

In its Healthcare Breach Report, Bitglass uncovered many security concerns. Cloud access security brokers (CASBs) are well equipped to ensure security & compliance for healthcare firms in the cloud. May 6, 1 pm ET

Ransomware Recovery with Instant RTO May 6

When ransomware hits, you can either pay or fight. Learn the steps to fight back effectively and recover your data. Find out why traditional backup solutions are no longer sufficient to recover from attacks, plus how to leverage the public cloud for DR.  May 6, 1:00 ET

DRaaS for vdi

Managing exponential VDI growth is very challenging by itself. With ransomware attacks increasing, use Disaster Recovery-as-a-Service (DRaaS) to protect your apps,  endpoints and data center from natural and man-made disasters.

Spectra StorCycle

Join our webinar to hear about exciting Spectra StorCycle updates, including its newest features, functionality and how any environment can benefit from its cost-savings migration capabilities.

Second Decade of Cloud Computing May 20

The Cloud is not new, but the realization that the resilience and potential of the cloud to respond to global events is. In this dynamic panel with Nasuni, AWS & former NetApp leadership gain a comprehensive insight into future IT strategies. May 20 2 PM ET.

Security Operations Center

It is difficult for IT staff to stay ahead of hackers; plus are you confident that you can immediately respond to an attack? Learn from Arctic Wolf about its 24x7x365 Security Operations Center, that monitors and protects organizations of all sizes.

Ransomware/DRaaS May 7

DR has never been more critical with the rampant rise in ransomware attacks. Learn how to prepare for and recover from a ransomware attack and other disasters, what are the most common DR events, and integrating DR plans with public cloud services. May 7, 1:00 ET

Remote Worker Productivity

Teneo discusses the pros and cons of remote working becoming the ‘New Normal’. Topics include the stress on IT departments, and how organizations can best utilize their existing technology and control costs while optimizing remote worker productivity.

SSL TRAFFIC Firewall Impact

With 70+% of network traffic encrypted, security appliances are overloaded as they decrypt and inspect that traffic for malware without impacting performance. Learn from Corsa how virtualization and horizontal scaling can solve this problem.

Cloud Storage-as-a-Service

Cloud-based Storage-as-a-Service (STaaS) integrates on-prem and cloud data, offers multi-tenancy for security plus performance, and stores block, file, and object data. Learn from Zadara how to expand storage with flexibility but no up-front capital expense.