[DEMO] * DEV * Truth in IT | Channels | Search: Tag | security | 2

[DEMO] Channels | Search results for: Tag | security

[DEMO] ,Search, Channels, Results, security

Filters

Search results

Sort by:
Search mode:
Results/Page:
  • May
    10

    CISO Talks: Securing Hybrid Cloud Communications Without the IT Burden

    By: Ekovox
    05/10/2022
    Hybrid environments create a better work life balance for employees but for IT admins it means more responsibility than ever. This is especially true given potential security, data privacy and compliance blindspots between monitoring corporate-owned an...
    • Apr
      28

      360View: April 2022

      By: Ekovox
      04/28/2022
      In this 360View episode, we take you through 3 leading disruptive technologies you must know how can impact your enterprise IT infrastructure. In this episode, we'll cover:     * Storage IO bottlenecks traditionally occur between memory and storage. R....
      • Apr
        14

        Your Ransomware Hostage Rescue Guide

        By: Ekovox
        04/14/2022
        Ransomware attacks are on the rise — and they’re estimated to cost global organizations billions of dollars in damages and downtime. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can ha...
        • Apr
          13

          Cisco & Equinix Bring End to End Virtual Firewall Security

          By: Ekovox
          04/13/2022
          In this webcast, we'll explore how Equinix and Cisco deliver security for the enterprise hybrid, multicloud and unified communication infrastructures via Cisco Secure Firewall ASA Virtual and Firewall Threat Defense Virtual running on Network Edge fro....
          • Apr
            12

            Zero-trust Testing: A Brave New World for Distributed Networks

            By: Ekovox
            04/12/2022
            Keysight introduces CyPerf 2.0, the world’s first instantly scalable zero-trust network test solution. CyPerf delivers new heights in realism, creating a digital twin of users, applications and threats. Highly scalable, it supports millions of concurre...
            • Mar
              31

              Rapid7: A Guide to Extended Detection & Response: What to Expect Next

              By: Ekovox
              03/31/2022
              Extended Detection and Response (XDR) is a new buzzword in the security space, and getting to grips with what it means and the direction it will take in the coming year can set you apart from the crowd. But what sort of challenges can we expect when im...
              • Mar
                22

                How To Stay Ahead of the Curve in the Ransomware Crisis

                By: Ekovox
                03/22/2022
                Matt Warner, CTO and co-founder of Blumira, a threat detection and response provider, will discuss what security teams should arm themselves with to win the battle against ransomware. He’ll cover:     ~ An overview of the current ransomware threat land...
                • Mar
                  17

                  Incredible Email Hacks You'd Never Expect and How You Can Stop Them

                  By: Ekovox
                  03/17/2022
                  If you think the only way your network and devices can be compromised via email is phishing, think again!   A majority of data breaches are caused by attacks on the human layer, but email hacking is much more than phishing and launching malware. From c...
                  • Mar
                    09

                    CISO Talks: Securing Cloud Communications in 2022

                    By: Ekovox
                    03/09/2022
                    With UCaaS platforms accelerating innovation and sharing in productivity resources like chat, voice, and video collaboration, it’s crucial for organizations to scrutinize how their unified communications as a service (UCaaS) vendor-of-choice hand...
                    • Feb
                      24

                      360View: February 2022

                      By: Ekovox
                      02/24/2022
                      1) Hyperscale level storage you can download 2) Detect any M365 Threat 3) Cloud-native application security testing