Brian DiPaolo, Chief Technology Officer; Mark Holdsworth, Managed Services Practice Manager
Accudata’s customer, a large ecommerce services provider, detected malware in an email sent to customers. However, their IT team discovered the malware was just the tip of the iceberg and began to dig deeper. Realizing the scope and magnitude of the breach, Accudata’s security and managed service teams were brought in to mitigate the attack and quickly began the remediation process.
In this 60-minute presentation, Chief Technology Officer Brian DiPaolo and Managed Services Practice Manager Mark Holdsworth detail the challenges of identifying and eliminating an active attacker in order to bring the business back online.
ServiceNow is not a ticketing system; the Information Technology Service Management (ITSM) module is a true service and support force multiplier, enabling the automation of many tasks every service desk manager encounters on a daily basis. One common concern every organization encounters is leveraging the full capabilities of the ServiceNow platform. Watch as Arnie Erazo, Accudata Solutions Architect and ServiceNow Expert, walks you through the second part of creating a detailed report using the platform.
Join CyberArk's Endpoint Privilege Manager (EPM) Business Lead Todd Moseley and Sales Engineer Brance Spradlin as they discuss CyberArk's Endpoint Privilege Manager - the endpoint security solution that effectively enables privilege management, credential theft protection, and application control. When all it takes is one email getting through your perimeter defenses, securing your endpoints is more crucial than ever. Learn how CyberArk can help you:
- Reduce the attack surface and mitigate critical vulnerabilities
- Contain attackers at the endpoint and limit lateral movement
- Stay on top of the latest threats
- Save time, stabilize configurations, and reduce helpdesk tickets
- Automatically block malicious applications
ServiceNow is not a ticketing system; the Information Technology Service Management (ITSM) module is a true service and support force multiplier, enabling the automation of many tasks every service desk manager encounters on a daily basis. One common concern every organization encounters is leveraging the full capabilities of the ServiceNow platform. Watch as Arnie Erazo, Accudata Solutions Architect and ServiceNow Expert, walks you through the platform's dashboards and uses.
Digital network technology is transforming the backbone of IT. Join Accudata Practice Manager Jason Fackrell as he discusses Cisco's Enterprise Campus Wireless. Over 15 minutes, Jason will define enterprise wireless, talk through the critical considerations when looking at enterprise wireless, and discuss DNA Spaces.
Learn the basics of Cisco's Digital Network Architecture (DNA) with Accudata Systems’ resident expert Alejandro Rodriguez. In 15 minutes we'll define Cisco's DNA, identify how your network can benefit, and we'll showcase some use cases to help validate DNA's business impact. Digital network technology is transforming the backbone of IT, so whether you're a CIO or Network Engineer, you will find value in this content.
Join us February 26 at 11 a.m. for Why IT Pros Want Digital Network Architecture.
Welcome back to the White-Hat Files, Accudata’s monthly hacker-centric webinar series! For our first White-Hat File of 2019, we are looking into the Marriott breach.
Join us on February 14 at 11 a.m. as Accudata Security Solutions Architect Russell Moore discusses how Marriott’s security was breached, how to reduce attacker dwell time, and the best practices that can keep your company’s name out of the news.
Bruce Beam (ISC)², Dimitri McKay (Splunk), and Tim Sills (Accudata)
Securing cloud infrastructure is no simple task, and when lines of business adopt cloud applications for daily administration, the layers of complexity are compounded. In this 45-minute webcam panel, (ISC)², Splunk, and Accudata Systems will tackle some of the toughest questions on managing risk and compliance in the cloud, including:
- How organizations are fighting cloud sprawl
- Best practices for securing data in the cloud
- Cloud data-loss prevention
- How to apply a risk-based approach to reduce exposure in the cloud
- Bruce Beam, Director of Infrastructure and Security, (ISC)²
- Dimitri McKay, Security Architect, Splunk
- Tim Sills, Senior Risk Consultant, Accudata Systems
Cloud infrastructure’s residual benefits are significant! Namely, anyone who buys corporate IT knows licensing is a nightmare. Different pricing structures, unclear benefits, and complex licensing server setups are all too common. That’s why F5 is changing the game.
Join us on October 18 for a 15-minute webinar led by F5’s Cindy Burns to learn why licensing isn’t what it used to be!
Accudata Systems isn’t just a Citrix Platinum Partner—we rely on Citrix Cloud internally to provide the agility and depth of service we need to compete in today’s business landscape. Join Accudata’s director of technology, Vid Sista, for a 30-minute webinar on October 16 at 11 a.m. CST to learn how Accudata uses Citrix Cloud to:
•Protect sensitive data outside our corporate network.
•Leverage Citrix’s Virtual Apps and Desktop environments to reduce resource needs.
•Provide a consistent experience for all Accudata team members, regardless of location.
Patrick Vardeman, CEO; Rick Snyder, Sr. VP; Anoj Willy, CEO; Vid Sista, Director of Technology Solutions
Join moderator Patrick Vardeman, CEO of Accudata Systems, for a dynamic digital-first webcam panel discussion with Rick Snyder, Senior Vice President of Cisco’s Partner America’s Organization; Anoj Willy, CEO of Xentaurs, a leading Digital Transformation Systems Integrator; and Vid Sista, Director of Technology Solutions at Accudata Systems.
They’ll cover it all—from what to consider in your DevOps strategy to hybrid cloud solutions and industry-leading technologies to build an effective data intelligence program. The digital business is far more complex than ever imagined, and we’ll do our part to help you understand where your investment can have the greatest payoff.
September’s White-Hat File comes from licensed attorney and Risk and Compliance Senior Consultant John Sharp.
In this 15-minute webinar, you’ll learn how cybersecurity compliance regulations aren’t the catchall you need to make sure your network is secure—as well as the most common pitfalls organizations face when trying to stay compliant.
Organizations use an average of 765 web applications. Based on research from F5 Labs, these web apps were the initial target in 53% of data breaches. Bad actors commonly target web apps to steal credentials or use previously stolen credentials to gain widespread access to user accounts. Often these attacks leverage automation and/or bots for the heavy lifting.
Learn how F5 and Accudata can help secure your web apps from attack with the new capabilities in F5's Advanced Web Application Firewall (WAF):
- Detect and mitigate automated attacks and bots that target web and mobile apps.
- Secure credentials from theft and protect apps from credential abuse.
- Protect against sophisticated application Denial of Service (DoS) attacks.
Imagine a world where IT swoops in and saves the day. ServiceNow is making that a reality while obliterating the notion that IT is a cost center. In fact, we'll prove it in this webinar. ServiceNow is a catalyst for the digital transformation of your business, giving your entire organization, IT included, the ability to move faster, drive efficiency, improve end-user experience, and outpace the competition.
In this 15-minute presentation, we’ll dive into the business case for ServiceNow and how it drives digital transformation in your own organization.
Disasters can take down your IT environment in a variety of ways, and if you’re not prepared you could lose thousands of dollars or more. Hurricanes, tornadoes, and fires can destroy your ability to work—and so can cyber-attacks. Take one example: if you were locked out of your network due to a security breach, do you know how you would pay your employees?
Join Accudata Systems Solutions Architect Bryan Halda for this 30-minute webinar and learn why you should consider cyber attacks as disasters and how to recover from them.
Our fourth White-Hat File is once again from Anton Abaya, CISA, PCI QSA, Senior Consultant in Accudata’s Risk and Compliance practice.
In the July edition, Anton talked about his expertise with physical social engineering. In this 15-minute webinar, he’ll describe the most effective ways he uses online phishing techniques to break into corporate networks—and how you can ensure these remote attacks don’t work on your employees.
To register for the September edition of the White-Hat Files, copy and paste this link: https://www.brighttalk.com/webcast/16347/333750?utm_source=Accudata+Systems&utm_medium=brighttalk&utm_campaign=333750
Cybersecurity solutions often sacrifice speed for performance, which is why Forcepoint takes a different approach. Their software-first network security platform is a fundamentally different architecture from any other vendor.
Learn why organizations that need unparalleled management and scalability select Forcepoint more than any other solution. Join us for our webinar on August 15 at 11:00 am CST.
Thanh Nguyen, Data Center & Cloud Practice Manager
As the use of hybrid cloud increases, so does the struggle for enterprises to balance the opportunities against the challenges.
Join Accudata Systems and F5 for a 15-minute webinar that will teach you how to Drive Out the Complexity of Hybrid Cloud and deliver any app, anywhere, with confidence.
•Simpler operations: Reduce complexity across hybrid and multi-cloud environments
•Faster deployments: Scale deployments with increased agility
•Safer security: Reduce risk with a consistent policy to maintain compliance and control
•Consistent application services: Deploy any application, anywhere, with consistent application services and security with F5
Accudata Systems is a leader in IT consulting and systems integration. For more than 35 years, we have helped strengthen organizations by solving their toughest IT challenges with a commitment to partnership, flexibility, and guaranteed results. The vastness of our expertise, paired with our proven methodology, enables a true partnership as we help our clients secure, modernize, and grow.