Hi [[ session.user.profile.firstName ]]

Accudata Systems

  • Date
  • Rating
  • Views
  • Micro-segmentation is achievable. What's stopping you?
    Micro-segmentation is achievable. What's stopping you?
    Joe Onisick, CTO, Xentaurs Recorded: Mar 20 2019 20 mins
    Yes, micro-segmentation (uSeg) is complex and seems expensive. But, the barriers are finally breaking down. True uSeg is now achievable, and we’ll tell you how. In 30 minutes, we’ll define:

    1. The scope of uSeg
    2. uSeg models that really work
    3. Requirements for successful implementation
    4. Why this approach is defining modern cybersecurity strategies

    Join us Wednesday, March 20, at 11 a.m. for our webinar, Micro-segmentation is achievable. What's stopping you?
  • Why IT Pros Want Digital Network Architecture
    Why IT Pros Want Digital Network Architecture
    Alejandro Rodriguez, Solutions Architect Recorded: Feb 26 2019 16 mins
    Learn the basics of Cisco's Digital Network Architecture (DNA) with Accudata Systems’ resident expert Alejandro Rodriguez. In 15 minutes we'll define Cisco's DNA, identify how your network can benefit, and we'll showcase some use cases to help validate DNA's business impact. Digital network technology is transforming the backbone of IT, so whether you're a CIO or Network Engineer, you will find value in this content.

    Join us February 26 at 11 a.m. for Why IT Pros Want Digital Network Architecture.
  • White-Hat Files | February Edition
    White-Hat Files | February Edition
    Russell Moore, Security Solutions Architect Recorded: Feb 14 2019 16 mins
    Welcome back to the White-Hat Files, Accudata’s monthly hacker-centric webinar series! For our first White-Hat File of 2019, we are looking into the Marriott breach.

    Join us on February 14 at 11 a.m. as Accudata Security Solutions Architect Russell Moore discusses how Marriott’s security was breached, how to reduce attacker dwell time, and the best practices that can keep your company’s name out of the news.
  • White-Hat Files | 2018 Recap Edition
    White-Hat Files | 2018 Recap Edition
    Accudata Systems Risk and Compliance Team Recorded: Nov 1 2018 24 mins
    For 2018’s last White-Hat File, we’re focusing on the future. With the new year on the horizon, there’s never been a better time to update and fine-tune your security strategy.

    In this 30-minute webinar, Accudata’s Risk and Compliance Professional Services Manager Ismael Alfaro will focus on how to monitor, implement, and iterate on IT security best practices.
  • Expert Panel: Managing Risk and Compliance in a Secure Cloud
    Expert Panel: Managing Risk and Compliance in a Secure Cloud
    Bruce Beam (ISC)², Dimitri McKay (Splunk), and Tim Sills (Accudata) Recorded: Oct 26 2018 37 mins
    Securing cloud infrastructure is no simple task, and when lines of business adopt cloud applications for daily administration, the layers of complexity are compounded. In this 45-minute webcam panel, (ISC)², Splunk, and Accudata Systems will tackle some of the toughest questions on managing risk and compliance in the cloud, including:

    - How organizations are fighting cloud sprawl
    - Best practices for securing data in the cloud
    - Cloud data-loss prevention
    - How to apply a risk-based approach to reduce exposure in the cloud

    Panel:
    - Bruce Beam, Director of Infrastructure and Security, (ISC)²
    - Dimitri McKay, Security Architect, Splunk
    - Tim Sills, Senior Risk Consultant, Accudata Systems
  • Residual Cloud Benefits: A New Way To License
    Residual Cloud Benefits: A New Way To License
    Cindy Burns, Cloud Specialist Recorded: Oct 18 2018 16 mins
    Cloud infrastructure’s residual benefits are significant! Namely, anyone who buys corporate IT knows licensing is a nightmare. Different pricing structures, unclear benefits, and complex licensing server setups are all too common. That’s why F5 is changing the game.

    Join us on October 18 for a 15-minute webinar led by F5’s Cindy Burns to learn why licensing isn’t what it used to be!
  • Why Accudata Relies on Citrix Cloud
    Why Accudata Relies on Citrix Cloud
    Vid Sista, Director of Technology Solutions Recorded: Oct 16 2018 24 mins
    Accudata Systems isn’t just a Citrix Platinum Partner—we rely on Citrix Cloud internally to provide the agility and depth of service we need to compete in today’s business landscape. Join Accudata’s director of technology, Vid Sista, for a 30-minute webinar on October 16 at 11 a.m. CST to learn how Accudata uses Citrix Cloud to:

    •Protect sensitive data outside our corporate network.
    •Leverage Citrix’s Virtual Apps and Desktop environments to reduce resource needs.
    •Provide a consistent experience for all Accudata team members, regardless of location.
  • [Webcam Panel] Perspectives on the Digital Transformation
    [Webcam Panel] Perspectives on the Digital Transformation
    Patrick Vardeman, CEO; Rick Snyder, Sr. VP; Anoj Willy, CEO; Vid Sista, Director of Technology Solutions Recorded: Sep 19 2018 47 mins
    Join moderator Patrick Vardeman, CEO of Accudata Systems, for a dynamic digital-first webcam panel discussion with Rick Snyder, Senior Vice President of Cisco’s Partner America’s Organization; Anoj Willy, CEO of Xentaurs, a leading Digital Transformation Systems Integrator; and Vid Sista, Director of Technology Solutions at Accudata Systems.

    They’ll cover it all—from what to consider in your DevOps strategy to hybrid cloud solutions and industry-leading technologies to build an effective data intelligence program. The digital business is far more complex than ever imagined, and we’ll do our part to help you understand where your investment can have the greatest payoff.
  • Accudata's White-Hat Files | September 2018 Edition
    Accudata's White-Hat Files | September 2018 Edition
    John Sharp, Senior Consultant Recorded: Sep 13 2018 15 mins
    September’s White-Hat File comes from licensed attorney and Risk and Compliance Senior Consultant John Sharp.

    In this 15-minute webinar, you’ll learn how cybersecurity compliance regulations aren’t the catchall you need to make sure your network is secure—as well as the most common pitfalls organizations face when trying to stay compliant.
  • Secure Web Apps from Attacks with Advanced WAF
    Secure Web Apps from Attacks with Advanced WAF
    Byron McNaught, F5 Product Marketing Recorded: Sep 11 2018 15 mins
    Organizations use an average of 765 web applications. Based on research from F5 Labs, these web apps were the initial target in 53% of data breaches. Bad actors commonly target web apps to steal credentials or use previously stolen credentials to gain widespread access to user accounts. Often these attacks leverage automation and/or bots for the heavy lifting.

    Learn how F5 and Accudata can help secure your web apps from attack with the new capabilities in F5's Advanced Web Application Firewall (WAF):

    - Detect and mitigate automated attacks and bots that target web and mobile apps.
    - Secure credentials from theft and protect apps from credential abuse.
    - Protect against sophisticated application Denial of Service (DoS) attacks.

Embed in website or blog