Webinars

  1. Events
  2. Webinars

Views Navigation

Event Views Navigation

Today

Webinar: Improve Security, Drive Operational Efficiencies and Maintain Continuous Compliance

Business demands on IT organizations continue to escalate while IT resources and budgets are under constant scrutiny. Sophisticated security attacks and complex regulatory compliance requirements make it nearly impossible to meet those demands. BrickStor Security Platform by RackTop empowers IT organizations to address each of these challenges in a low-cost manageable solution. In this webinar, […]

Insider threats

Learn how insider threats operate from a former NSA engineer. Gain the knowledge you need to develop an efficient insider threat program. Find out how to better detect and identify unusual and unauthorized behavior so you can intervene before your team’s intellectual property has been compromised. Most importantly, you will develop an understanding of how […]

Free

Defend Against Ransomware Webinar with Carahsoft

Featured Speakers: Glenn Saxman, Senior Account Executive, Racktop Systems Kirby Rock-Ellis, Sales Engineer, RackTop Systems Bill Downer, Senior Director of National Programs, Seagate Government Solutions With the majority of government employees now working remotely, the risk of ransomware attacks is increasing. The shift to remote work transformed most organizations’ cybersecurity posture, and exposed gaps in cybersecurity solutions. […]

Webinar: Data Management and Secure Data Storage for the Enterprise

This free 1-hour webinar from GigaOm Research brings together experts in data management and security, featuring GigaOm Analyst Enrico Signoretti and special guest from RackTop Systems, Jonathan Halstuch. The discussion will focus on data storage and how to protect data against cyberattacks. Most of the recent news coverage and analysis of cyberattacks focus on hackers […]

Ransomware Protection for Unstructured Data with Cloudian

Webinar Ransomware Protection for Unstructured Data with Cloudian To defend against ransomware, you can either prevent the attack or contain its impact. Attack prevention often involves training programs for users, advising them to avoid “phishing” attacks such as emails whose senders are posing as trusted sources. Another prevention strategy monitors emails and network activity to […]