Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Planning for COMPLETE Recovery from a Ransomware Attack Josue Guzman, Sr. Technical Account Mngr, Synology; Brandon Dunlap, Moderator Accidents and attacks can happen – no matter how airtight your security practices are. As ransomware threats continue to surge, businesses struggle to... July 7, 2022 5:00pm Defining & Refining Your Niche to Attract Ideal Customers Maiko Sai, Airtight Concepts We will introduce a systematic approach to define & refine their niche to attract the right audience for their business so that they will waste no tim... 3 years ago | 17 mins Are Smartphones Outsmarting Your Network Security Perimeter? McAfee and AirTight Networks In this Webinar, AirTight Networks will discuss strategies you can use today to manage unauthorized smartphone access on your network. The combinatio... 11 years ago | 28 mins Policy, Performance, and Security for the BYOD Revolution Andrew Borg, Aberdeen; Kaustubh Phanse, AirTight Networks; Jim Szafranski, Fiberlink Employees are bringing their mobile devices to the workplace, and employers are increasingly motivated to support them in doing so. Is it really chea... 11 years ago | 58 mins Get more performance and throughput with advanced NGFWs Navneet Singh, Product Marketing Director, Palo Alto Networks Did you know that your security could be suffering because attacks may be hiding in the ever-increasing amounts of encrypted traffic flowing through y... 4 years ago | 33 mins End-to-end Security Solutions for Mid-Market Businesses Dell Technologies Security breaches in modern businesses are at an all-time high and continue to grow by the thousands daily. Even without imminent threats, ensuring yo... 2 years ago | 22 mins How Leading Brands Build Trust with CIAM John Tolbert - Lead Analyst, KuppingerCole and Mayur Upadhyaya - Senior Director Identity Cloud, Akamai Analyst tips to balance privacy & security with user experience Digital trust is what sets brands apart from their competitors. Taking and storing cu... 2 years ago | 59 mins Open Data, Not Firewalls Josh Koenig, Wes Manning Data is best when shared. On your website, in the cloud. But sometimes you need a firewall, too. It’s a security thing. What if you could have it all—... 7 years ago | 36 mins Riverbed & Gigamon for Complete Visibility with Advanced Network Performance Mon Derek Campbell, Senior Sales Engineer, Gigamon & Bill Coon, Technical Director, Riverbed Achieving visibility isn’t a go-it-alone endeavor. It takes teamwork. And when industry leaders Gigamon and Riverbed converge, the results are a winni... 2 years ago | 44 mins Stop Hackers with Integrated CASB & IDaaS Security CloudLock: Brad Pielech - Integrations Architect, CloudLock OneLogin: Mario Tarabbia - Director of Sales Engineering Your organization has turned to cloud platforms and applications (including SaaS, IaaS, PaaS, and even IDaaS) to meet business needs, and it’s your jo... 6 years ago | 54 mins