Dirk Schrader, Field CISO (EMEA) and VP of Security Research at Netwrix, discusses the company’s recent Hybrid Security Trends report, which compared and contrasted on-prem security with security in the cloud – with the findings covering such topics as: security challenges, investment plans, the role of cyber insurance and the emergence of cyber resilience as a focus.
Read MoreGuido Grillenmeier , Principal Technologist EMEA at identity security pioneer, Semperis, discusses the reasons why Microsoft Active Directory can be particularly vulnerable to security breaches, and explains how its free Purple Knight AD Security Assessment tool helps end users to discover and understand these vulnerabilities, and helps with remediation, alongside other Semperis security solutions. For more information, please visit: https://www.purple-knight.com/
Read MoreIrvin Shillingford, Regional Manager Northern Europe at Hornetsecurity, discusses the current backup landscape, with particular reference to the company’s recently launched VM Backup Version 9, featuring immutable cloud storage. For further information on VM Backup V9 visit https://bit.ly/3I3oLHw
Read MoreIrvin Shillingford, Regional Manager Northern Europe at Hornetsecurity, discusses the current backup landscape, with particular reference to the company’s recently launched VM Backup Version 9, featuring immutable cloud storage.
Read MoreAlkesh Soneji, Sales Director at Infrassist, discusses the company’s technology portfolio, which covers Professional Services – IT automation, security and RMM – and Support Services, such as NOCs and helpdesks. He shares some great example of how Infrassist has helped MSP customers address various technology challenges.
Read MoreJasson Casey, CTO, Beyond Identity, discusses the company’s development of Zero Trust Authentication, which looks set to be a key component of a wider, truly optimised enterprise Zero Trust Security solution. He emphasises that, while detection and response has a role to play, there needs to be a renewed focus on the prevention part of any meaningful cybersecurity strategy.
Read More