Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Taking Zero Trust to 100%: Best Practices to Support your Journey Alexandra Willsher, Forcepoint | John Leonard, Computing | Anne Cockshott, The Channel Company EMEA Zero Trust is widely regarded as the best approach for protecting organizations, but implementing it is a journey rather than a one-off purchase. The... 3 months ago | 38 mins Putting Zero Trust into Action to Secure the Hybrid Workforce Mike Crouse, Director, Enterprise User & Data Protection, Forcepoint | Heath Mullins, Senior Analyst, Forrester A fireside chat with guest speaker, Forrester Senior Analyst Heath Mullins As we transition from a remote to a fully mobile, hybrid workforce, organi... 4 months ago | 59 mins Simplifying RMM: Optimise Remote Working Bruce Dodworth, Sea Glass | Lewis Barnes, boxxe | Ranjeet Mani, GoTo RMM, or Remote Monitoring and Management, is fundamental when it comes to managing your IT infrastructure. From the ability to track and monitor the p... June 8, 2023 9:00am Zero-Trust Security for Identities and Privileged Accounts Eric Schwake, Director of Product Marketing, Fortinet Zero-Trust Security for Identities and Privileged Accounts - Cybersecurity for All User Identities Cyberattackers understand that user identities ar... 4 days ago | 41 mins Universal ZTNA: How to Use Zero Trust for All Locations Peter Newton, Senior Director of Products & Solutions, Fortinet Zero Trust is not just for Remote Access ZTNA needs to evolve beyond just being a remote access solution to connect to private applications. Zero Tr... June 13, 2023 9:00am How to Easily Oversee Your Essential Operations with Kintone Nim Grinvald, Kintone Technical Evangelist The average office employee spends 20% of their work week searching for info they need. If you’re a manager with a team to track, odds are that number... 2 weeks ago | 37 mins 2023 SASE Trends: Operational Benefits Emerge as Adoption Advances Comcast Business IT leaders seeking to ensure users have secure and reliable network access from anywhere are turning to Secure Access Service Edge (SASE) to deliver o... 2 weeks ago | 50 mins Why You Need an Integrated Technology Approach: Remote Access to File Data Chris Mellor, Blocks & Files; Andres Rodriguez, Nasuni; Jim Liddle, Nasuni Strategies and Technological Approaches for Addressing the Remote Access to File Data Problem, Data Explosion, and Why You Need an Integrated Technolo... 2 weeks ago | 49 mins Building Healthy and Efficient Software Teams in 2023 Heddy Stern, Director, Product Management and Design, VMware & Dustin Ruehle, Director, Engineering, VMware It’s 2023, and the remote productivity push we felt at the beginning of the pandemic has mostly faded away. Instead, software leaders are being asked ... 2 weeks ago | 61 mins Re-thinking Network Segmentation: Enhance Your Defense Ajay Uggirala, Director of Product Marketing Network segmentation is a crucial part of any proactive security strategy or business continuity plan. Implementing network segmentation not only make... June 20, 2023 3:00pm Load more