InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Win Against Ransomware By Hardening Your Microsoft 365 Data Protection

Presented by

Rodney Scharich, Senior Partner Technology Strategist, Microsoft | Drew Russell, Technical GTM Lead - Cloud & SaaS, Rubrik

About this talk

Data in Microsoft 365 is critical to your business operations -- and a prime target for cyberattacks. Join this special session hosted by Microsoft and Rubrik to learn how to use immutable backups and policy-driven automation to protect this data from ransomware, corruption, or accidental deletion. Watch this and learn about: The evolving Microsoft 365 threat landscape Key questions to ask in a cyber attack scenario Why CISOs need to fortify Microsoft 365 data protection How to utilise data protection technologies to comply with legal and regulatory standards Make sure to take a look at the attachments as well - we've added extra learnings on how to optimise data protection and provided you with additional resources to help set you up for success. Drew Russell, Technical GTM Lead - Clous & SaaS, Rubrik Mike Preston, Technical Marketing Architect, Rubrik Rodney Scharich, Senior Partner Technology Strategist, Microsoft Eran Carmel, Principal Product Manager, Rubrik
Rubrik

Rubrik

21697 subscribers142 talks
Zero Trust Data Management Webcasts For IT Professionals
What is Zero Trust Data Management? An estimated 2 out of 3 ransomware attacks now target backups. That’s why it’s vital to ensure your backups are 100% protected and resilient. With zero trust data management no one is trustworthy. No user. No application. No device. To meet this new standard, data must be natively immutable so that it can never be modified, encrypted, or deleted by ransomware. Data needs to be ready at all times so you can recover what you need, and never pay a ransom.
Related topics