Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Key Findings from 2022 Data Threat Report - Global Edition Eric Hanselman, Principal Research Analyst, 451 Research; Justin Lam, Research Analyst, 451 Research As the pandemic continues to affect both business and personal lives, expectations of a ‘return’ to pre-pandemic conditions have faded from most plans... 5 hours ago | 58 mins Supercharging a Seamless & Secure Remote Workforce Mark Jeffries According to Gartner, it is projected that 31% of global workers will be remote in 2022 — and in the U.S., that percentage rises to a staggering 53%. ... 6 days ago | 16 mins From VPN to VPN-less: Modernizing Secure Remote Access Seema Kathuria In this webinar, you will learn: Why using a VPN-less approach enhances security while minimizing user friction How the Duo Network Gateway helps org... 4 weeks ago | 60 mins Why everyone is buzzing about Zero Trust for Secure Remote Access Alain Luxembourg (Regional Director, Benelux), Stefan van der Wal (Pre-Sales Consultant) In this webinar we show you how to: 1. Enable Zero Trust to all your apps and data from any device and location. 2. Provide secure remote access witho... 2 months ago | 47 mins Secure Your Public Sector House with a Duo Deadbolt Bart Green and Bob Slaney In this webinar, you will learn: Why a work-from-anywhere security strategy needs to include better user and device visibility, not just MFA How zero... 1 month ago | 55 mins Solving the 'work anywhere and access everything' security challenge Mark Guntrip, Sr Director of Cybersecurity Strategy, Menlo Security The corporate world has changed in many ways. Some forced, some desired. The end user experience of working within an organization, large or small, is... May 19, 2022 2:00am How to Implement Critical Access Management Rob Palermo, VP of Product Management & Strategy at SecureLink Every organization understands the importance of securing its most critical assets. These are the systems, applications, and data that are critical to... 1 day ago | 35 mins Why Work-from-Anywhere Requires Secure Modern WANs Carrie Goetz, StrategITcom, LLC; Rami Rammaha, Fortinet & Salvatore Salamone, Network Computing For decades, enterprises have searched for networking solutions that would provide remote workers and distributed offices with secure and reliable con... 1 day ago | 58 mins LockDown 2022: Endpoint Security Lockdown w/ PolicyPak: GPO, Intune, & Cloud Jeremy Moskowitz, Microsoft MVP Learn how to get out of the local admin rights business, stop ransomware and unknown software in its tracks, and handle USB/CD-ROM threats with ease. ... May 19, 2022 5:00pm The Journey to SSE John Spiegel, and Jaye Tillson, Axis Security and Jim Reavis, CEO, Cloud Security Alliance Due to the growth of “Cloud” over the past ten years, organizations have moved from the data center to “centers of data”. As applications are now dist... 1 day ago | 43 mins Load more