We live in uncertain times, requiring a great deal of flexibility as we adjust to changing conditions and navigate uncharted waters. FlexPod, a Converged Infrastructure stack powered by NetApp and Cisco, offers the agility and flexibility necessary to respond in today’s everchanging environment. Whether you are looking to provide distance learning, work from home solutions, expand health care environments or to collect and analyze the data necessary to plot your course, FlexPod can enable the multicloud approach necessary to move forward. Join us for this 60-minute webinar as we discuss and demonstrate how FlexPod can help you innovate and “flex” to meet these current challenges.
RecordedApr 15 202049 mins
Your place is confirmed, we'll send you email reminders
Bob Hunt, Presidio | Karinne Bessette, Veeam | Edward Watson, Veeam
Microsoft Office 365 enables your enterprise to work remotely, enabling employees to stay productive and connected in the comfort and safety of their home. With a massive influx of remote workers, businesses more than ever before are storing, sharing and accessing data within Microsoft Teams, OneDrive for Business as well as Exchange and SharePoint Online, and that data needs to be protected. Learn why!
In this webinar from Veeam:
• Hear the use cases and reasons for protecting remote Office 365 user data
• Learn how to mitigate data loss, recover quickly and meet compliance needs
•See a demo of the #1 Office 365 backup solution - Veeam Backup for Microsoft Office 365
Peter Mutua, Managing Consultant at Presidio | Jordan Miralis, Channel Engineer at Citrix
A growing number of organizations are turning to Citrix for advice and support to enable secure remote-work initiatives that can ensure the safety and productivity of their employees. Every organization faces the possibility of major and minor disruptions of all kinds; from planned events such as IT maintenance or office relocation, to looming emergencies such as hurricanes or epidemics, to unplanned events that strike completely without warning, such as earthquakes, tornadoes, or fires.
During this evolving global crisis, Presidio and Citrix have partnered closely to ramp up our customers’ remote-work efforts. Join us to learn about:
- The importance of business continuity
- Main elements of a business continuity plan and challenges it poses
- How Presidio and Citrix can help make your organization more resilient
Christian Rencken, Crowdstrike Strategic Threat Advisor and Braydon Wallace, Presidio Solution Architect
Cyber threat actors of both the nation-state and criminal varieties are notorious for engaging in opportunistic attacks to achieve their malicious objectives. Unfortunately, the rapid rise in a remote workforce brought on by the global COVID-19 pandemic is no different. Given the recent threat, this presentation will cover the Big 4 nation-state threat actors, to include Russia, China, Iran, and North Korea. CrowdStrike will discuss how these nations have evolved their offensive cyber capabilities over the last year, how they have shifted (or maintained) their targeting objectives, as well as how the Big 4 have affected different industries across the commercial and government sectors.
Israel Barak, CISO of Cybereason and Charlie Winckless, Presidio Cyber Security Solutions Director
As enterprises continue to face increasingly advanced attacks, security teams need a more effective approach to detect malicious activity and understand attacker behavior. The MITRE ATT&CK framework offers a comprehensive and complex knowledge base of more than 200 techniques that adversaries may use over the course of an attack. But how does understanding these tactics and techniques translate into operationalizing MITRE ATT&CK threat intelligence to defend your organization?
Join Israel Barak, CISO of Cybereason and Charlie Winckless, Cyber Security Solutions Director of Presidio as they discuss how to simplify the complexity of the MITRE ATT&CK framework and understand:
-How to develop a more effective and scalable strategy to secure your organization using the ATT&CK framework
-3 ways you can enhance your security posture with the ATT&CK framework
-How Cybereason allows customers to search and understand their environment based on the ATT&CK framework
Dave Gold, SentinelOne Sr. Director Sales Engineering and Cameron Steadman, Presidio Solution Architect
We'll give you an overview of the threat landscape and how products have evolved to meet these changes. Learn how to use Automation, AI, and Machine Learning to better identify, block, contain and recover from attacks within your environment.
Learn about new approaches that you should be considering in your organization that can help optimize your resources and put time back in your day.
Dan Blankenship, Palo Alto Systems Engineer and Shannon Welton, Presidio Solution Architect
Security teams often lack the visibility and automation required to stop attacks. Siloed tools like endpoint detection and response (EDR) and network traffic analysis (NTA) collect large amounts of data, but they also force analysts to pivot from console to console to verify threats, increasing complexity and slowing down investigations. Palo Alto Networks Cortex XDR™ is the world’s first detection and response app that natively integrates network, endpoint, and cloud data to stop sophisticated attacks.
Join your cybersecurity peers and experts in our Capture the Flag event. Your mission: to hunt down, stop and solve stealthy attacks quickly in a cloud-based environment. Users will use Cortex XDR to identify as many of these issues as possible within a predetermined amount of time.
Braydon Wallace, Presidio Solution Architect and Mark Gilliland, Presidio Cyber Security Consultant
We’ll discuss current trends in the endpoint protection, detection, and response space and how Presidio’s Dedicated Endpoint Practice can provide expertise and resources to help customers make the best decision.
Maor Franco, Director of Product Marketing at Cybereason | Charlie Winckless, Cyber Security Solutions Director at Presidio
Mobile devices have been ranked the #1 hardest enterprise asset to defend. Compounded by bring-your-own device policies, enterprises are struggling to protect themselves against mobile threats. Attacks on the endpoint are no longer limited to servers and desktop PCs.
Join Presidio and Cybereason to learn about the challenges and success the industry has had addressing mobile, and the evolution of mobile device security. We'll cover the shifts we are seeing in the market and where it is headed.
Data Privacy & Compliance Can Be Daunting. More users, apps and data to manage and protect. New data privacy and compliance requirements to meet. Securing AWS, Azure, and Google Cloud Platforms All with limited IT staff and security talent Take on Digital Transformation with Ease and Confidence with SailPoint Predictive Identity. Organizations Face New Challenges. With the power of SailPoint Predictive Identity you can see more, do more and secure more….It’s time to rethink identity.
Zero Trust is quickly becoming the dominant security model for the cloud, shifting the perimeter from the network to the people and devices that make up a modern workforce. As a model with many moving parts, the immediate question is where to start? Join Presidio & Okta experts to learn:
· The full Zero Trust reference architecture and steps to get there
· Why Identity is the foundational layer to build contextual access controls from
When someone tells that corny old “Knock! Knock!” joke, the answer is always a silly one. In the context of your business, however, it’s extremely important that the person “knocking” on the door to applications and resources be the right person with valid access rights.
The recent shift to an almost all-remote workforce has maxed out the IT and Security teams that were already busy managing digital transformation and the shift to the cloud. Now, they are also challenged to understand the who/what/where/when/how of their remote workers.
Join experts from Presidio and Idaptive as they discuss what identity means today in the new age of remote work. They’ll share best practices and stories from real-life identity and access management (IAM) customer implementations, focusing on the business and security benefits of IAM to organizations of all sizes.
Does your software strategy enable all of your IT and business objectives? Does it hold you back from achieving the real-time flexibility, growth, and features you need to transform your business? In this session we will look at a recommended software strategy that enables you to achieve your IT and business objectives; and support the organization through times of expansion, growth, and crisis with relevant examples around today’s evolving world. Presidio will help you achieve the right software strategy tailored to your business objectives, providing a complete financial analysis for various licensing models.
Devin Callaway, Presidio Security Practice Lead and Troy Gerber, Presidio Senior Solution Architect
As traditional network boundaries have dissolved, and we’ve seen a large increase in remote workers, Identity and access management has become critical to securing our data. Identity is not just a technology problem to be solved by point products. A strong IAM framework must be in place to address the entire problem. This includes Lifecycle Management, Governance, Authentication, Authorization, Auditing, as well as the people and business processes involved. In this session, we will discuss how to combine these IAM topics into a strong IAM framework.
Maximize Network and App Performance for Your Remote Employees
Current events are impacting all of us on a global scale. Organizations are taking swift measures to protect the well-being of employees by rolling out work-from-home initiatives.To support your remote employee productivity, Riverbed is here to help you optimize at-home network connections, and deliver reliable performance of business-critical apps.
During this webinar, we'll discuss how to boost your network and app performance by:
•Optimizing at-home network connections to achieve up to 99% data reduction
•Delivering 10x faster, reliable performance of cloud, on-prem, and SaaS apps
•Eliminating performance issues caused by unpredictable network latency and competition among apps
During this unprecedented time of crisis, organizations across all industries have leaned on technology partners and vendors to quickly adapt their IT needs to the new normal. For all of our clients, Presidio has been that trusted technology advisor - providing accelerated deployment of modern remote workforce solutions as part of our COVID-19 business response solutions.
While many of these solutions - designed and rapidly deployed for our clients by Presidio - are based on scaling secured network connectivity, infrastructure, and endpoint solutions from VMware, Citrix, AWS, and Microsoft, Presidio has also accelerated application and data modernization for our clients during these crucial times.
DID YOU KNOW?
For a global financial securities firm, Presidio re-factored and migrated over 30+ applications to Google Kubernetes Environment (GKE) using Apigee Edge API Management Platform.
For a national fast food retailer, Presidio analyzed and optimized their AWS-deployed mobile application platform that resulted in 3x increased traffic with zero downtime.
For a global media and communications giant, Presidio designed and developed a hybrid DevSecOps platform, in addition to re-factoring 100+ existing applications using cloud-based microservices.
For a national healthcare provider, Presidio developed and migrated their patient portal site to deliver dynamic patient access to data using serverless functions and modern development techniques.
WANT TO LEARN MORE? Attend our App and Data Transformation Webcast to learn more about how Presidio has transformed IT environments and accelerated the client journey towards business transformation.
Tes Gebremarian - Senior Solution Architect with Presidio
We will discuss how Presidio has helped customers of different sizes and verticals migrate to the cloud. A comprehensive migration program has been developed based on the AWS Cloud Adoption Framework and the combined experiences of helping our customers with their cloud journey.
Thomas Wells - Microsoft Solutions Architect with Presidio & Garrison Rose - Microsoft Engineer with Presidio
We will address common questions and concerns that organizations have when they’re getting started. We’ll cover Teams Modes, Teams and Channels configurations, security options, client configuration, and more. We will also discuss Presidio’s offering to provide you free 1:1 guidance to move to Microsoft 365.
Legacy security architectures that are centered around corporate data centers collapsing due the shifts of data into the cloud and users moving to remote work locations. In addition, cyber threats have become more sophisticated and are often designed to focus directly on the shortcomings of legacy security deployments. These challenges have been emerging for years but are now highlighted by the recent global crisis. In this session, we will demonstrate how these deficiencies have developed and are an inhibitor to digital transformation. We will also provide guidance on how to integrate security into your enterprise in such a way that universal visibility and enforcement is achieved while not hampering performance or availability for users with modern use cases.
Presidio is a leading IT solutions provider assisting clients in harnessing technology innovation and simplifying IT complexity to digitally transform their businesses and drive return on IT investment. Our Digital Infrastructure, Cloud and Security solutions enable our almost 7,000 middle market, enterprise and government clients to take advantage of new digital revenue streams, omnichannel customer experience models, and the rich data insights generated by those interactions.
Our mission is to enable our clients to capture economic value from the digital transformation of their businesses by developing, implementing and managing world class, cloud ready, secure and agile IT Infrastructure solutions. We deliver this technology expertise through a full life cycle model of professional, managed, and support services including strategy, consulting, implementation and design.
By investing in the future of IT solutions we stay at the forefront of technology trends. And to ensure our clients have access to a wide range of technologies and best-of-breed solutions, we partner with over 500 OEMs including market leaders and emerging providers to bring our clients integrated, multi technology solutions.