Introduction to Meraki Cloud-Managed Security & SD-WAN
Join Presidio and Meraki for a tour of a new cloud-managed security appliance that integrates a next-generation firewall, internet gateway services, site to site VPN, and application traffic shaping, all with the power and simplicity of web-based centralized management!
RecordedApr 1 202049 mins
Your place is confirmed, we'll send you email reminders
New variants and delivery models have made Ransomware an increasingly resilient attack method. This is particularly true in the public sector, where hackers have successfully targeted multiple state and local governments, as well as higher education institutions, with sophisticated exploits.
Get ahead of this persistent threat and learn how to create your modern ransomware strategy. Join Presidio and Palo Alto Networks for an informational seminar on lessons learned from recent attacks, current trends and pillars for successful prevention.
Attendees of this complimentary session will learn:
• About recent Ransomware attacks and the lessons learned
• Key elements to consider for prevention and remediation
• Technology best practices and considerations for your modern Ransomware defense
Rob Kim, Sales VP National Practices, Presidio and Chet Chambers, Chief Evangelist, UiPath
The need for increased agility and better business continuity has never been more clear. The economy is changing rapidly and only companies agile enough to quickly adapt their processes and resources will thrive. Workplace disruption and challenges supporting key business processes remotely require exploring new approaches.
Fortunately, the technology is here to provide a better approach. Companies embracing this approach will see lower costs, greater efficiency, and more flexibility around their people and processes. Join Presidio and UiPath to hear how companies are slashing costs and improving outcomes with robotic process automation. Learn how easy it can be to start automating key business processes to deliver greater agility and business resiliency.
Michelle Curtis, Vice President, FLEX Solutions & Services at Presidio | Gregg Ostrowski, Regional CTO at AppDynamics
Is your data smart enough to drive your business? The truth is, it’s probably not.
APM solutions generate mountains of data – more than human beings can possibly analyze and leverage, rendering much of it useless. Adding AI can turn that problem into an advantage. Join industry experts from Presidio and AppDynamics as they dive into valuable information to help you think through the decisions you face around AIOps and what it means to your future.
Presidio and IGEL will present how the IGEL OS and UD Pocket can reduce issues that users experience when working from, such as configuring personal laptops/desktops. At the same time, the IGEL OS can secure personal devices in work from home scenario with a read-only operating system that is remotely managed. This removes the issues associated with deploying corporate anti-malware to personal devices, patching personal devices, and the need for complex VPN solutions. Join Presidio and IGEL as we discuss securing and simplifying work from home scenarios that are utilizing Citrix, VMWare, Windows Virtual Desktop, and Amazon Workspaces.
Over the past year, Cisco has advanced UCS in many ways.
During the Webinar, we will talk about all the new UCS features
and functionality that Presidio, Intel and Cisco have deployed
to our customer base.
Jeremy Axmacher - Team Lead - Managed Services Cloud Presidio
Technology practitioners are in common agreement that the “Principle of Least Privilege” is a good thing. This consensus is certainly nice, but what does the phrase mean precisely? Even more importantly, how can we talk about the “least privilege” without fluency in the language of privilege itself?
On AWS, that language is called the Identity and Access Management (IAM) JSON Policy Language, or IAM Policy Language for short. As a provider of Managed and Professional Services for customers using AWS, we’ve seen many examples of AWS IAM policies in the wild that indicate a difficulty speaking this cloud-native tongue.
And it’s no surprise- as a recent SANS Institute paper on Multicloud Security put it, “IAM is hard, and everywhere.” Join us for a rapid-fire IAM Policy Language session. We’ll review the fundamentals of IAM and cover a number of IAM Policies that you can use to enable secure access to your AWS environment.
Christian Rencken, Crowdstrike Strategic Threat Advisor and Braydon Wallace, Presidio Solution Architect
Cyber threat actors of both the nation-state and criminal varieties are notorious for engaging in opportunistic attacks to achieve their malicious objectives. Unfortunately, the rapid rise in a remote workforce brought on by the global COVID-19 pandemic is no different. Given the recent threat, this presentation will cover the Big 4 nation-state threat actors, to include Russia, China, Iran, and North Korea. CrowdStrike will discuss how these nations have evolved their offensive cyber capabilities over the last year, how they have shifted (or maintained) their targeting objectives, as well as how the Big 4 have affected different industries across the commercial and government sectors.
Resha Chheda, Cybereason, Director of Product Marketing and Charlie Winckless, Presidio Cyber Security Solutions Director
As enterprises continue to face increasingly advanced attacks, security teams need a more effective approach to detect malicious activity and understand attacker behavior. The MITRE ATT&CK framework offers a comprehensive and complex knowledge base of more than 200 techniques that adversaries may use over the course of an attack. But how does understanding these tactics and techniques translate into operationalizing MITRE ATT&CK threat intelligence to defend your organization?
Join Israel Barak, CISO of Cybereason and Charlie Winckless, Cyber Security Solutions Director of Presidio as they discuss how to simplify the complexity of the MITRE ATT&CK framework and understand:
-How to develop a more effective and scalable strategy to secure your organization using the ATT&CK framework
-3 ways you can enhance your security posture with the ATT&CK framework
-How Cybereason allows customers to search and understand their environment based on the ATT&CK framework
Dave Gold, SentinelOne Sr. Director Sales Engineering and Cameron Steadman, Presidio Solution Architect
We'll give you an overview of the threat landscape and how products have evolved to meet these changes. Learn how to use Automation, AI, and Machine Learning to better identify, block, contain and recover from attacks within your environment.
Learn about new approaches that you should be considering in your organization that can help optimize your resources and put time back in your day.
Bob Hunt, Presidio | Karinne Bessette, Veeam | Edward Watson, Veeam | Karl Rautenstrauch, Microsoft
Microsoft Office 365 enables your enterprise to work remotely, enabling employees to stay productive and connected in the comfort and safety of their home. With a massive influx of remote workers, businesses more than ever before are storing, sharing and accessing data within Microsoft Teams, OneDrive for Business as well as Exchange and SharePoint Online, and that data needs to be protected. Learn why!
In this webinar from Veeam:
• Hear the use cases and reasons for protecting remote Office 365 user data
• Learn how to mitigate data loss, recover quickly and meet compliance needs
•See a demo of the #1 Office 365 backup solution - Veeam Backup for Microsoft Office 365
Peter Mutua, Managing Consultant at Presidio | Jordan Miralis, Channel Engineer at Citrix
A growing number of organizations are turning to Citrix for advice and support to enable secure remote-work initiatives that can ensure the safety and productivity of their employees. Every organization faces the possibility of major and minor disruptions of all kinds; from planned events such as IT maintenance or office relocation, to looming emergencies such as hurricanes or epidemics, to unplanned events that strike completely without warning, such as earthquakes, tornadoes, or fires.
During this evolving global crisis, Presidio and Citrix have partnered closely to ramp up our customers’ remote-work efforts. Join us to learn about:
- The importance of business continuity
- Main elements of a business continuity plan and challenges it poses
- How Presidio and Citrix can help make your organization more resilient
Braydon Wallace, Presidio Solution Architect and Mark Gilliland, Presidio Cyber Security Consultant
We’ll discuss current trends in the endpoint protection, detection, and response space and how Presidio’s Dedicated Endpoint Practice can provide expertise and resources to help customers make the best decision.
Unified Communications Engineers who embrace automation can save hundreds of hours each year and provide custom integrations that bring value to Presidio and our customers.
Presidio Distinguished Engineers Brad Haas and Jeff Levensailor will present on their knowledge from the field and explain how you can get started with Cisco Webex Device Programmability (xAPI, Webex Admin APIs).
This session will include an overview of the available SDKs and some ready to use applications for the most common customer needs. We will end with a live demonstration and a Q&A with our experts.
In this session you will learn about common challenges of managing, operating and securing Kubernetes and container environments and how you can solve those for your infrastructure and application needs.
Presidio is a leading IT solutions provider assisting clients in harnessing technology innovation and simplifying IT complexity to digitally transform their businesses and drive return on IT investment. Our Digital Infrastructure, Cloud and Security solutions enable our almost 7,000 middle market, enterprise and government clients to take advantage of new digital revenue streams, omnichannel customer experience models, and the rich data insights generated by those interactions.
Our mission is to enable our clients to capture economic value from the digital transformation of their businesses by developing, implementing and managing world class, cloud ready, secure and agile IT Infrastructure solutions. We deliver this technology expertise through a full life cycle model of professional, managed, and support services including strategy, consulting, implementation and design.
By investing in the future of IT solutions we stay at the forefront of technology trends. And to ensure our clients have access to a wide range of technologies and best-of-breed solutions, we partner with over 500 OEMs including market leaders and emerging providers to bring our clients integrated, multi technology solutions.
Introduction to Meraki Cloud-Managed Security & SD-WANAndy Richter, Cyber Security Consultant at Presidio and Paul Reetz, Partner Solutions Architect at Cisco Meraki[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]49 mins