For several years, the endpoint protection industry has been embracing the cloud, with an ever-growing number of vendors claiming to offer cloud options for their solutions. This trend has been recognized by Gartner in a research note titled “Prepare for Endpoint Protection Shifting to the Cloud.” In it, Gartner points out the advantages of cloud-driven security services over on-premises solutions and explains why more organizations are moving their security to the cloud.
Join Presidio and CrowdStrike for this webcast as we share the findings from the report and what they can mean for your organization’s security. We will also discuss how the Presidio + CrowdStrike cloud-native endpoint protection platform provides the most effective way to stop adversaries and prevent breaches, while maintaining optimal performance and minimizing user impact.
Join this webcast to learn:
•Why cloud-native endpoint protection is the most effective way to defeat today’s
sophisticated and evolving adversaries
•What features you should look for to ensure you’re getting a true next-gen, cloud-
native endpoint protection solution
•Why the Presidio + CrowdStrike cloud-native platform sets a new standard for
RecordedNov 12 201945 mins
Your place is confirmed, we'll send you email reminders
Bob Hunt, Presidio | Karinne Bessette, Veeam | Edward Watson, Veeam
Microsoft Office 365 enables your enterprise to work remotely, enabling employees to stay productive and connected in the comfort and safety of their home. With a massive influx of remote workers, businesses more than ever before are storing, sharing and accessing data within Microsoft Teams, OneDrive for Business as well as Exchange and SharePoint Online, and that data needs to be protected. Learn why!
In this webinar from Veeam:
• Hear the use cases and reasons for protecting remote Office 365 user data
• Learn how to mitigate data loss, recover quickly and meet compliance needs
•See a demo of the #1 Office 365 backup solution - Veeam Backup for Microsoft Office 365
Peter Mutua, Managing Consultant at Presidio | Jordan Miralis, Channel Engineer at Citrix
A growing number of organizations are turning to Citrix for advice and support to enable secure remote-work initiatives that can ensure the safety and productivity of their employees. Every organization faces the possibility of major and minor disruptions of all kinds; from planned events such as IT maintenance or office relocation, to looming emergencies such as hurricanes or epidemics, to unplanned events that strike completely without warning, such as earthquakes, tornadoes, or fires.
During this evolving global crisis, Presidio and Citrix have partnered closely to ramp up our customers’ remote-work efforts. Join us to learn about:
- The importance of business continuity
- Main elements of a business continuity plan and challenges it poses
- How Presidio and Citrix can help make your organization more resilient
Christian Rencken, Crowdstrike Strategic Threat Advisor and Braydon Wallace, Presidio Solution Architect
Cyber threat actors of both the nation-state and criminal varieties are notorious for engaging in opportunistic attacks to achieve their malicious objectives. Unfortunately, the rapid rise in a remote workforce brought on by the global COVID-19 pandemic is no different. Given the recent threat, this presentation will cover the Big 4 nation-state threat actors, to include Russia, China, Iran, and North Korea. CrowdStrike will discuss how these nations have evolved their offensive cyber capabilities over the last year, how they have shifted (or maintained) their targeting objectives, as well as how the Big 4 have affected different industries across the commercial and government sectors.
Israel Barak, CISO of Cybereason and Charlie Winckless, Presidio Cyber Security Solutions Director
As enterprises continue to face increasingly advanced attacks, security teams need a more effective approach to detect malicious activity and understand attacker behavior. The MITRE ATT&CK framework offers a comprehensive and complex knowledge base of more than 200 techniques that adversaries may use over the course of an attack. But how does understanding these tactics and techniques translate into operationalizing MITRE ATT&CK threat intelligence to defend your organization?
Join Israel Barak, CISO of Cybereason and Charlie Winckless, Cyber Security Solutions Director of Presidio as they discuss how to simplify the complexity of the MITRE ATT&CK framework and understand:
-How to develop a more effective and scalable strategy to secure your organization using the ATT&CK framework
-3 ways you can enhance your security posture with the ATT&CK framework
-How Cybereason allows customers to search and understand their environment based on the ATT&CK framework
Dave Gold, SentinelOne Sr. Director Sales Engineering and Cameron Steadman, Presidio Solution Architect
We'll give you an overview of the threat landscape and how products have evolved to meet these changes. Learn how to use Automation, AI, and Machine Learning to better identify, block, contain and recover from attacks within your environment.
Learn about new approaches that you should be considering in your organization that can help optimize your resources and put time back in your day.
Dan Blankenship, Palo Alto Systems Engineer and Shannon Welton, Presidio Solution Architect
Security teams often lack the visibility and automation required to stop attacks. Siloed tools like endpoint detection and response (EDR) and network traffic analysis (NTA) collect large amounts of data, but they also force analysts to pivot from console to console to verify threats, increasing complexity and slowing down investigations. Palo Alto Networks Cortex XDR™ is the world’s first detection and response app that natively integrates network, endpoint, and cloud data to stop sophisticated attacks.
Join your cybersecurity peers and experts in our Capture the Flag event. Your mission: to hunt down, stop and solve stealthy attacks quickly in a cloud-based environment. Users will use Cortex XDR to identify as many of these issues as possible within a predetermined amount of time.
Presidio Distinguished Engineers Brad Haas and Jeff Levensailor
Unified Communications Engineers who embrace automation can save hundreds of hours each year and provide custom integrations that bring value to Presidio and our customers.
Presidio Distinguished Engineers Brad Haas and Jeff Levensailor will present on their knowledge from the field and explain how you can get started with Cisco Serviceability APIs for Unified Communications Manager.
This session will include an overview of the available SDKs and some ready to use applications for the most common customer needs. We will end with a live demonstration and a Q&A with our experts.
Braydon Wallace, Presidio Solution Architect and Mark Gilliland, Presidio Cyber Security Consultant
We’ll discuss current trends in the endpoint protection, detection, and response space and how Presidio’s Dedicated Endpoint Practice can provide expertise and resources to help customers make the best decision.
Maor Franco, Director of Product Marketing at Cybereason | Charlie Winckless, Cyber Security Solutions Director at Presidio
Mobile devices have been ranked the #1 hardest enterprise asset to defend. Compounded by bring-your-own device policies, enterprises are struggling to protect themselves against mobile threats. Attacks on the endpoint are no longer limited to servers and desktop PCs.
Join Presidio and Cybereason to learn about the challenges and success the industry has had addressing mobile, and the evolution of mobile device security. We'll cover the shifts we are seeing in the market and where it is headed.
Data Privacy & Compliance Can Be Daunting. More users, apps and data to manage and protect. New data privacy and compliance requirements to meet. Securing AWS, Azure, and Google Cloud Platforms All with limited IT staff and security talent Take on Digital Transformation with Ease and Confidence with SailPoint Predictive Identity. Organizations Face New Challenges. With the power of SailPoint Predictive Identity you can see more, do more and secure more….It’s time to rethink identity.
Zero Trust is quickly becoming the dominant security model for the cloud, shifting the perimeter from the network to the people and devices that make up a modern workforce. As a model with many moving parts, the immediate question is where to start? Join Presidio & Okta experts to learn:
· The full Zero Trust reference architecture and steps to get there
· Why Identity is the foundational layer to build contextual access controls from
When someone tells that corny old “Knock! Knock!” joke, the answer is always a silly one. In the context of your business, however, it’s extremely important that the person “knocking” on the door to applications and resources be the right person with valid access rights.
The recent shift to an almost all-remote workforce has maxed out the IT and Security teams that were already busy managing digital transformation and the shift to the cloud. Now, they are also challenged to understand the who/what/where/when/how of their remote workers.
Join experts from Presidio and Idaptive as they discuss what identity means today in the new age of remote work. They’ll share best practices and stories from real-life identity and access management (IAM) customer implementations, focusing on the business and security benefits of IAM to organizations of all sizes.
Does your software strategy enable all of your IT and business objectives? Does it hold you back from achieving the real-time flexibility, growth, and features you need to transform your business? In this session we will look at a recommended software strategy that enables you to achieve your IT and business objectives; and support the organization through times of expansion, growth, and crisis with relevant examples around today’s evolving world. Presidio will help you achieve the right software strategy tailored to your business objectives, providing a complete financial analysis for various licensing models.
Devin Callaway, Presidio Security Practice Lead and Troy Gerber, Presidio Senior Solution Architect
As traditional network boundaries have dissolved, and we’ve seen a large increase in remote workers, Identity and access management has become critical to securing our data. Identity is not just a technology problem to be solved by point products. A strong IAM framework must be in place to address the entire problem. This includes Lifecycle Management, Governance, Authentication, Authorization, Auditing, as well as the people and business processes involved. In this session, we will discuss how to combine these IAM topics into a strong IAM framework.
Presidio is a leading IT solutions provider assisting clients in harnessing technology innovation and simplifying IT complexity to digitally transform their businesses and drive return on IT investment. Our Digital Infrastructure, Cloud and Security solutions enable our almost 7,000 middle market, enterprise and government clients to take advantage of new digital revenue streams, omnichannel customer experience models, and the rich data insights generated by those interactions.
Our mission is to enable our clients to capture economic value from the digital transformation of their businesses by developing, implementing and managing world class, cloud ready, secure and agile IT Infrastructure solutions. We deliver this technology expertise through a full life cycle model of professional, managed, and support services including strategy, consulting, implementation and design.
By investing in the future of IT solutions we stay at the forefront of technology trends. And to ensure our clients have access to a wide range of technologies and best-of-breed solutions, we partner with over 500 OEMs including market leaders and emerging providers to bring our clients integrated, multi technology solutions.
Why Endpoint Security Must Move To The CloudCharlie Winckless - Security Engineering Director at Presidio & Jackie Castelli - Product Marketing Director at CrowdStrike[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]44 mins