[DEMO] * DEV * Truth in IT | Channels | Search: Tag | a | 1

[DEMO] Channels | Search results for: Tag | a

[DEMO] ,Search, Channels, Results, a

Filters

Search results

Sort by:
Search mode:
Results/Page:
  • May
    10

    CISO Talks: Securing Hybrid Cloud Communications Without the IT Burden

    By: Ekovox
    05/10/2022
    Hybrid environments create a better work life balance for employees but for IT admins it means more responsibility than ever. This is especially true given potential security, data privacy and compliance blindspots between monitoring corporate-owned an...
    • Apr
      28

      360View: April 2022

      By: Ekovox
      04/28/2022
      In this 360View episode, we take you through 3 leading disruptive technologies you must know how can impact your enterprise IT infrastructure. In this episode, we'll cover:     * Storage IO bottlenecks traditionally occur between memory and storage. R....
      • Apr
        14

        Your Ransomware Hostage Rescue Guide

        By: Ekovox
        04/14/2022
        Ransomware attacks are on the rise — and they’re estimated to cost global organizations billions of dollars in damages and downtime. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can ha...
        • Apr
          13

          Cisco & Equinix Bring End to End Virtual Firewall Security

          By: Ekovox
          04/13/2022
          In this webcast, we'll explore how Equinix and Cisco deliver security for the enterprise hybrid, multicloud and unified communication infrastructures via Cisco Secure Firewall ASA Virtual and Firewall Threat Defense Virtual running on Network Edge fro....
          • Mar
            31

            Rapid7: A Guide to Extended Detection & Response: What to Expect Next

            By: Ekovox
            03/31/2022
            Extended Detection and Response (XDR) is a new buzzword in the security space, and getting to grips with what it means and the direction it will take in the coming year can set you apart from the crowd. But what sort of challenges can we expect when im...
            • Mar
              29

              Rapid7: You Can't Protect Without Knowing What You Have

              By: Ekovox
              03/29/2022
              How do you leverage asset management to focus simply on your management of vulnerability risk within the organization?   Justin Prince, Technical Advisor, Vulnerability Management at Rapid7 will take a look at the core concepts and underlying...
              • Mar
                24

                360View: March 2022

                By: Ekovox
                03/24/2022
                In this 360View episode, we're covering security readiness training; production-ready AI and prescriptive GRC.
                • Mar
                  22

                  How To Stay Ahead of the Curve in the Ransomware Crisis

                  By: Ekovox
                  03/22/2022
                  Matt Warner, CTO and co-founder of Blumira, a threat detection and response provider, will discuss what security teams should arm themselves with to win the battle against ransomware. He’ll cover:     ~ An overview of the current ransomware threat land...
                  • Mar
                    17

                    Incredible Email Hacks You'd Never Expect and How You Can Stop Them

                    By: Ekovox
                    03/17/2022
                    If you think the only way your network and devices can be compromised via email is phishing, think again!   A majority of data breaches are caused by attacks on the human layer, but email hacking is much more than phishing and launching malware. From c...
                    • Mar
                      09

                      CISO Talks: Securing Cloud Communications in 2022

                      By: Ekovox
                      03/09/2022
                      With UCaaS platforms accelerating innovation and sharing in productivity resources like chat, voice, and video collaboration, it’s crucial for organizations to scrutinize how their unified communications as a service (UCaaS) vendor-of-choice hand...