Your Last Layer of Security – Backup, Replication, Recovery (CTComp & CASE)
Most organizations don’t consider backup & recovery as part of their IT security posture, however, as you read the many articles on how to protect against cyber-attacks, backup will always appear as the last line of defense. By incorporating versioning, file/image, system-state backups, and disaster recovery into your security posture your business is much more likely to survive an attack. Come see how CTComp’s Managed backup, replication and recovery services can get your organization back up and running within a few hours not days, while you can focus on your business.
Are your Printers and MFPs Providing Access for Security Threats? (Hewlett Packard)
IT is continually tasked with protecting confidential information, including employee identities and customer data, across multiple devices and environments. Although many IT departments rigorously apply security measures to individual computers and the business network, printing and imaging devices are often overlooked and left exposed. The security threats are real, and as printing and imaging devices become increasingly sophisticated, they offer greater opportunities for attackers to compromise the device or the entire network. Hear how HP can help you determine the vulnerability of your printing devices and see how they can help you secure your print environment.
Ethernet – A Secure Evolution from LAN to MAN to WAN in a Cloud Connected World (Comcast)
How Ethernet has evolved from a local area network protocol to becoming a network solution of choice for Metropolitan Area Network to Wide Area Networking including Cloud Services connectivity.
Insiders Are the New Malware (Varonis)
Nearly every major security breach starts with an insider, or an attacker using an insider’s credentials. 2015 was a banner year for insider threats. It’s estimated that the average organization suffered from 3.8 insider attacks last year and 45% of businesses can’t tell if they’ve suffered a breach. In order to combat the insider threat, organizations need to shift their focus from the perimeter to their data itself. They need to secure their data from the inside out. Join us for a live presentation where you’ll learn our 3-phase Inside-Out approach for preventing insider threats.
Drive Productivity within Your Organization with Salesforce.com (CTComp & CASE)
Are you managing key aspects of your operation with spreadsheets or from your email inbox? Are you using “swivel-chair integration” to get your systems to talk to each other? Are your Sales, Service and Marketing teams unable to see a unified view of your customers? If so, then join us to learn how Salesforce.com can streamline, integrate and automate your business processes.
Keeping You off The Front Page with Cisco’s Threat-Centric Security (Cisco)
People responsible for defending networks realize that the security threat landscape is constantly in flux as attackers evolve their skills. Cisco security platforms and our Talos research team provide unmatched architectural approaches that leverage big data, open APIs, and security baked into all of our products to provide unmatched visibility and automate defenses. In this talk we will see how this approach reduces time to detection, enhances effectiveness, and keeps your business from being front page news. Mike McPhee is a Cisco Systems Engineer focused on cybersecurity and internet edge architectures for a wide variety of verticals and customers. His previous experience in helping architect command and control systems for military customers, brewing lousy beer, and coaching his kids through micro soccer have helped him maintain perspective and deal with the chaos and fear the pursuit of true network security sometimes generates. Not to worry – this session won’t hurt a bit.
Protecting Your Digital Enterprise (Hewlett Packard Enterprise)
Keeping pace with market trends driving changes in data protection.
eFolder’s Secure Mapped Drive in the Cloud, File Sync/Share Solution (eFolder)
Tired of relying on consumer grade technology for your business file sharing and syncing needs? eFolder offers a secure business grade technology integrated with Mapped Drive capabilities for easy business collaboration.
Seven Quick Tips for Improving Your Website’s User Experience (CTComp & CASE)
Does your website need a redesign? Don’t have the time or the budget to do a complete overhaul? Not sure where to start? Usability is an important and often overlooked aspect of web design. In this session, you’ll learn techniques to make your site easier to navigate on any device, create cleaner and more consistent layouts, improve user engagement with clear calls to action, and continually improve your site through analytics and user testing.
Hear about the new devices and technologies offered in the most secure line-up of HP client devices including the thinnest and lightest notebooks, detachables, and the new HP Elite x3, HP’s first built for business 3-in-1 device. Designed for business, these devices offer the features that users love, but with the security that IT requires.
Criticality of Email Security (Zix Corp)
The increase in data breaches and the rise in external threats has reminded us of the importance of securing emails. Organizations need to be confident that the millions of emails leaving their network each day are protected where necessary, whether sent from a desktop or from a mobile device. Implementing secure email solutions should increase productivity and mitigate risk without creating employee frustration. Join security experts from Zix for a discussion on solutions to solve your most pressing secure email challenges.
Physical Security and Environmental Monitoring in Mission Critical Facilities (APC)
Physical security and environmental monitoring are critical to achieving availability goals of mission critical facilities. Security of the data center accounts for its surroundings as well as data processing equipment inside and the systems supporting them. In this presentation, systems for providing secure facilities are recommended and best practices for physical security are explained.
Is Your Site the Next Target? Website and Web Application Security Best Practice (CTComp & CASE)
In today’s web world, any website can become a target for hackers. These attacks do not discriminate between web sites that are large or small. Attendees will learn about security measures that all business should take to protect their websites and will gain an understanding of recommended security services, vulnerability detection and reporting tools.
Expect the Unexpected from Cisco! (Cisco)
Cisco Spark – Expect amazing new experiences as we blend team messaging, meetings and phone calls in the cloud. Bring your companies teams together in a place that makes it easy to keep people and work connected. Everyone who attends is eligible for a free Spark trail. Spark is where all your work lives and it is a mobile first platform and 100% cloud delivered!
Cisco Video – Unmatched video collaboration experience joining together with Webex into once experience! Now is the time for an intelligent approach to video conferencing from the pocket to the boardroom that is simple to use and provides choices from anywhere! Terry Blowers is a Unified Communications specialist at Cisco. His delivery is dynamic and relevant to today’s issues facing IT executives looking to simplify their communications while creating amazing new experiences.
How to Effectively Leverage the Cloud to both Simplify Administration and Save Your Company Money (Gemalto)
In this session, Gemalto Authentication Sales Engineer Andrew Arnott will review how a Cloud-based token management system can minimize initial capital expenditure on hardware, while saving data center power consumption and rack space. In addition to these up front and ongoing expenses, Andrew will speak to the ease of administration that goes along with that; service packs, patching and the like become things of the past. Token rollout automation tools, multi-tenant capabilities, and customizable help screens greatly simplify both the Administrator and User experience.
The Power of an Eco-System (Milestone & Axis)
Milestone and Axis team will show how two industry leaders can create your video security system. With Axis’ feature rich cameras powered by Milestones easy to use software platform we’ll demonstrate how using the Eco-System, you can create a best of breed solution.
By Ryan Carbone|2016-08-17T17:21:16+00:00August 17th, 2016|Tech Updates|Comments Off on 2016 Technology Showcase – Securing Your Future