Hi [[ session.user.profile.firstName ]]

Accudata Systems

  • Date
  • Rating
  • Views
  • [Webcam Panel] Perspectives on the Digital Transformation
    [Webcam Panel] Perspectives on the Digital Transformation Patrick Vardeman, CEO; Rick Snyder, Sr. VP; Anoj Willy, CEO; Vid Sista, Director of Technology Solutions Recorded: Sep 19 2018 47 mins
    Join moderator Patrick Vardeman, CEO of Accudata Systems, for a dynamic digital-first webcam panel discussion with Rick Snyder, Senior Vice President of Cisco’s Partner America’s Organization; Anoj Willy, CEO of Xentaurs, a leading Digital Transformation Systems Integrator; and Vid Sista, Director of Technology Solutions at Accudata Systems.

    They’ll cover it all—from what to consider in your DevOps strategy to hybrid cloud solutions and industry-leading technologies to build an effective data intelligence program. The digital business is far more complex than ever imagined, and we’ll do our part to help you understand where your investment can have the greatest payoff.
  • Accudata's White-Hat Files | September 2018 Edition
    Accudata's White-Hat Files | September 2018 Edition John Sharp, Senior Consultant Recorded: Sep 13 2018 15 mins
    September’s White-Hat File comes from licensed attorney and Risk and Compliance Senior Consultant John Sharp.

    In this 15-minute webinar, you’ll learn how cybersecurity compliance regulations aren’t the catchall you need to make sure your network is secure—as well as the most common pitfalls organizations face when trying to stay compliant.
  • Secure Web Apps from Attacks with Advanced WAF
    Secure Web Apps from Attacks with Advanced WAF Byron McNaught, F5 Product Marketing Recorded: Sep 11 2018 15 mins
    Organizations use an average of 765 web applications. Based on research from F5 Labs, these web apps were the initial target in 53% of data breaches. Bad actors commonly target web apps to steal credentials or use previously stolen credentials to gain widespread access to user accounts. Often these attacks leverage automation and/or bots for the heavy lifting.

    Learn how F5 and Accudata can help secure your web apps from attack with the new capabilities in F5's Advanced Web Application Firewall (WAF):

    - Detect and mitigate automated attacks and bots that target web and mobile apps.
    - Secure credentials from theft and protect apps from credential abuse.
    - Protect against sophisticated application Denial of Service (DoS) attacks.
  • Why ServiceNow Makes IT the Hero
    Why ServiceNow Makes IT the Hero Vid Sista, Director of Technology Solutions Recorded: Sep 6 2018 13 mins
    Imagine a world where IT swoops in and saves the day. ServiceNow is making that a reality while obliterating the notion that IT is a cost center. In fact, we'll prove it in this webinar. ServiceNow is a catalyst for the digital transformation of your business, giving your entire organization, IT included, the ability to move faster, drive efficiency, improve end-user experience, and outpace the competition.

    In this 15-minute presentation, we’ll dive into the business case for ServiceNow and how it drives digital transformation in your own organization.
  • A Guide to Modern Business Continuity
    A Guide to Modern Business Continuity Bryan Halda, Solutions Architect Recorded: Aug 28 2018 27 mins
    Disasters can take down your IT environment in a variety of ways, and if you’re not prepared you could lose thousands of dollars or more. Hurricanes, tornadoes, and fires can destroy your ability to work—and so can cyber-attacks. Take one example: if you were locked out of your network due to a security breach, do you know how you would pay your employees?

    Join Accudata Systems Solutions Architect Bryan Halda for this 30-minute webinar and learn why you should consider cyber attacks as disasters and how to recover from them.
  • Accudata's White-Hat Files | August 2018 Edition
    Accudata's White-Hat Files | August 2018 Edition Anton Abaya, CISA, PCI QSA, Senior Consultant Recorded: Aug 22 2018 16 mins
    Our fourth White-Hat File is once again from Anton Abaya, CISA, PCI QSA, Senior Consultant in Accudata’s Risk and Compliance practice.

    In the July edition, Anton talked about his expertise with physical social engineering. In this 15-minute webinar, he’ll describe the most effective ways he uses online phishing techniques to break into corporate networks—and how you can ensure these remote attacks don’t work on your employees.

    To register for the September edition of the White-Hat Files, copy and paste this link: https://www.brighttalk.com/webcast/16347/333750?utm_source=Accudata+Systems&utm_medium=brighttalk&utm_campaign=333750
  • Business Trends and the Need for Secure SD-WAN
    Business Trends and the Need for Secure SD-WAN Dutch Schwartz Recorded: Aug 15 2018 14 mins
    Cybersecurity solutions often sacrifice speed for performance, which is why Forcepoint takes a different approach. Their software-first network security platform is a fundamentally different architecture from any other vendor.

    Learn why organizations that need unparalleled management and scalability select Forcepoint more than any other solution. Join us for our webinar on August 15 at 11:00 am CST.
  • Drive Out the Complexity of Hybrid Cloud
    Drive Out the Complexity of Hybrid Cloud Thanh Nguyen, Data Center & Cloud Practice Manager Recorded: Aug 14 2018 16 mins
    As the use of hybrid cloud increases, so does the struggle for enterprises to balance the opportunities against the challenges.

    Join Accudata Systems and F5 for a 15-minute webinar that will teach you how to Drive Out the Complexity of Hybrid Cloud and deliver any app, anywhere, with confidence.

    •Simpler operations: Reduce complexity across hybrid and multi-cloud environments
    •Faster deployments: Scale deployments with increased agility
    •Safer security: Reduce risk with a consistent policy to maintain compliance and control
    •Consistent application services: Deploy any application, anywhere, with consistent application services and security with F5
  • Why Integration Matters: How to Strengthen Your Security Posture
    Why Integration Matters: How to Strengthen Your Security Posture Alex Vasquez, Security Practice Manager Recorded: Aug 7 2018 28 mins
    The best way to secure your organization from today’s most complex threats is integration. It’s key to building a security infrastructure that deters seasoned attackers. Yet, it can be a challenging, time-consuming initiative to take disparate technologies and build an interoperable, world-class cyber security program.

    Join Accudata Systems Security Practice Manager Alex Vasquez on August 7 in our 30-minute webinar, Why Integration Matters: How to Strengthen Your Security Posture. He’ll address complicated IT challenges and security automation strategies, and you’ll learn about the following:

    •Integrating vendors into one environment
    •Preventing unauthorized access to VPN services with multifactor authentication
    •Optimizing your security strategy with automated support workflows
  • Easy. Say Goodbye to Excel with ServiceNow CMDB with Discovery
    Easy. Say Goodbye to Excel with ServiceNow CMDB with Discovery Mike Bledsoe, Advisory Solutions Consultant at ServiceNow Recorded: Jul 31 2018 16 mins
    Configuration Management Database (CMDB) conjures thoughts of Excel (manual entry—blah); it’s so cumbersome. But what if you could make it easier—automated, cloud based—and proactively eliminate service outages?

    Join our 15-minute webinar with ServiceNow Advisory Solutions Consultant Mike Bledsoe as he discusses common-use cases that prove the value in effective CMDB with ServiceNow’s Discovery solution. We’ve already started seeing how this is changing IT departments’ lives—there’s a reason why ServiceNow is Forbes’ #1 most innovative organization in the nation.

Embed in website or blog