Hi [[ session.user.profile.firstName ]]

Accudata Systems

  • Date
  • Rating
  • Views
  • Securing Privilege and Containing Attacks on Endpoints
    Securing Privilege and Containing Attacks on Endpoints
    Todd Moseley, Endpoint Privilege Manager; Brance Spradlin, Sales Engineer Recorded: Jul 11 2019 30 mins
    Join CyberArk's Endpoint Privilege Manager (EPM) Business Lead Todd Moseley and Sales Engineer Brance Spradlin as they discuss CyberArk's Endpoint Privilege Manager - the endpoint security solution that effectively enables privilege management, credential theft protection, and application control. When all it takes is one email getting through your perimeter defenses, securing your endpoints is more crucial than ever. Learn how CyberArk can help you:

    - Reduce the attack surface and mitigate critical vulnerabilities
    - Contain attackers at the endpoint and limit lateral movement
    - Stay on top of the latest threats
    - Save time, stabilize configurations, and reduce helpdesk tickets
    - Automatically block malicious applications
  • ServiceNow A Day with an Expert
    ServiceNow A Day with an Expert
    Arnie Erazo Recorded: Jun 6 2019 10 mins
    ServiceNow is not a ticketing system; the Information Technology Service Management (ITSM) module is a true service and support force multiplier, enabling the automation of many tasks every service desk manager encounters on a daily basis. One common concern every organization encounters is leveraging the full capabilities of the ServiceNow platform. Watch as Arnie Erazo, Accudata Solutions Architect and ServiceNow Expert, walks you through the platform's dashboards and uses.
  • Cisco Enterprise Wireless | Critical Considerations
    Cisco Enterprise Wireless | Critical Considerations
    Jason Fackrell, Practice Manager, Network Recorded: Jun 6 2019 16 mins
    Digital network technology is transforming the backbone of IT. Join Accudata Practice Manager Jason Fackrell as he discusses Cisco's Enterprise Campus Wireless. Over 15 minutes, Jason will define enterprise wireless, talk through the critical considerations when looking at enterprise wireless, and discuss DNA Spaces.
  • Micro-segmentation is achievable. What's stopping you?
    Micro-segmentation is achievable. What's stopping you?
    Joe Onisick, CTO, Xentaurs Recorded: Mar 20 2019 20 mins
    Yes, micro-segmentation (uSeg) is complex and seems expensive. But, the barriers are finally breaking down. True uSeg is now achievable, and we’ll tell you how. In 30 minutes, we’ll define:

    1. The scope of uSeg
    2. uSeg models that really work
    3. Requirements for successful implementation
    4. Why this approach is defining modern cybersecurity strategies

    Join us Wednesday, March 20, at 11 a.m. for our webinar, Micro-segmentation is achievable. What's stopping you?
  • Why IT Pros Want Digital Network Architecture
    Why IT Pros Want Digital Network Architecture
    Alejandro Rodriguez, Solutions Architect Recorded: Feb 26 2019 16 mins
    Learn the basics of Cisco's Digital Network Architecture (DNA) with Accudata Systems’ resident expert Alejandro Rodriguez. In 15 minutes we'll define Cisco's DNA, identify how your network can benefit, and we'll showcase some use cases to help validate DNA's business impact. Digital network technology is transforming the backbone of IT, so whether you're a CIO or Network Engineer, you will find value in this content.

    Join us February 26 at 11 a.m. for Why IT Pros Want Digital Network Architecture.
  • White-Hat Files | February Edition
    White-Hat Files | February Edition
    Russell Moore, Security Solutions Architect Recorded: Feb 14 2019 16 mins
    Welcome back to the White-Hat Files, Accudata’s monthly hacker-centric webinar series! For our first White-Hat File of 2019, we are looking into the Marriott breach.

    Join us on February 14 at 11 a.m. as Accudata Security Solutions Architect Russell Moore discusses how Marriott’s security was breached, how to reduce attacker dwell time, and the best practices that can keep your company’s name out of the news.
  • White-Hat Files | 2018 Recap Edition
    White-Hat Files | 2018 Recap Edition
    Accudata Systems Risk and Compliance Team Recorded: Nov 1 2018 24 mins
    For 2018’s last White-Hat File, we’re focusing on the future. With the new year on the horizon, there’s never been a better time to update and fine-tune your security strategy.

    In this 30-minute webinar, Accudata’s Risk and Compliance Professional Services Manager Ismael Alfaro will focus on how to monitor, implement, and iterate on IT security best practices.
  • Expert Panel: Managing Risk and Compliance in a Secure Cloud
    Expert Panel: Managing Risk and Compliance in a Secure Cloud
    Bruce Beam (ISC)², Dimitri McKay (Splunk), and Tim Sills (Accudata) Recorded: Oct 26 2018 37 mins
    Securing cloud infrastructure is no simple task, and when lines of business adopt cloud applications for daily administration, the layers of complexity are compounded. In this 45-minute webcam panel, (ISC)², Splunk, and Accudata Systems will tackle some of the toughest questions on managing risk and compliance in the cloud, including:

    - How organizations are fighting cloud sprawl
    - Best practices for securing data in the cloud
    - Cloud data-loss prevention
    - How to apply a risk-based approach to reduce exposure in the cloud

    Panel:
    - Bruce Beam, Director of Infrastructure and Security, (ISC)²
    - Dimitri McKay, Security Architect, Splunk
    - Tim Sills, Senior Risk Consultant, Accudata Systems
  • Residual Cloud Benefits: A New Way To License
    Residual Cloud Benefits: A New Way To License
    Cindy Burns, Cloud Specialist Recorded: Oct 18 2018 16 mins
    Cloud infrastructure’s residual benefits are significant! Namely, anyone who buys corporate IT knows licensing is a nightmare. Different pricing structures, unclear benefits, and complex licensing server setups are all too common. That’s why F5 is changing the game.

    Join us on October 18 for a 15-minute webinar led by F5’s Cindy Burns to learn why licensing isn’t what it used to be!
  • Why Accudata Relies on Citrix Cloud
    Why Accudata Relies on Citrix Cloud
    Vid Sista, Director of Technology Solutions Recorded: Oct 16 2018 24 mins
    Accudata Systems isn’t just a Citrix Platinum Partner—we rely on Citrix Cloud internally to provide the agility and depth of service we need to compete in today’s business landscape. Join Accudata’s director of technology, Vid Sista, for a 30-minute webinar on October 16 at 11 a.m. CST to learn how Accudata uses Citrix Cloud to:

    •Protect sensitive data outside our corporate network.
    •Leverage Citrix’s Virtual Apps and Desktop environments to reduce resource needs.
    •Provide a consistent experience for all Accudata team members, regardless of location.

Embed in website or blog