Webinars

  1. Events
  2. Webinars

Views Navigation

Event Views Navigation

Today

Data-Centric Zero Trust for Oil and Gas

Webinar Data-Centric Zero Trust for Oil and Gas A well implemented Zero Trust Architecture can stop ransomware and allow you to continue to operate without having to shutdown systems to contain the attack as was the case with the Colonial Pipeline incident. In this webinar you’ll learn why adopting a data-centric zero trust architecture is […]

Securing Unstructured Data with Zero Trust Principles with Cambridge Computer

Join Cambridge Computer & RackTop for a tech briefing on RackTop's Zero Trust architecture to store and protect your unstructured data. Many IT leaders that work in national labs infrastructure have prioritized security and compliance for any solution in use. Daily, we hear about the mounting pressure to decrease attack surfaces, harden machines, and meet […]

Storage Field Day 23 – Tech Field Day

About Tech Field Day Hosted by Gestalt IT,  Tech Field Day is a series of invite-only technical meetings between influencers and sponsoring enterprise IT companies. We refer to influencers as delegates and invite them from around the world. Companies share their products and innovations through presentations, demos, roundtables, and more. Over 2-3 days, a panel […]

Security Field Day 7 – Tech Field Day

About Tech Field Day Tech Field Day is a series of invite-only technical meetings between influencers and sponsoring enterprise IT companies. We refer to influencers as delegates and invite them from around the world. Companies share their products and innovations through presentations, demos, roundtables, and more. Over 2-3 days, a panel of a dozen delegates […]

Margarita Madness Mixology with HPE, Anexinet, and RackTop

Win the Data Security Bracket with HPE, Anexinet & RackTop! Did you know MOST ransomware attacks target unstructured datasets on network shares, making centralized file storage solutions an attractive target for encryption and/or data exfiltration of large amounts of data? Cyber storage solutions structure datasets and deliver a variety of capabilities to identify, protect, detect, […]