Channel Expert Hour

How to Help Your Customers Protect Themselves from Ransomware Attacks

Thursday, August 25, 2016  2:00pm ET / 11:00am PT

solarwinds Some troubling statistics are emerging surrounding ransomware and the broad effect it is having on the IT industry and its customers:

  • Over 18 million dollars paid to ransomware thieves between April 2014 and June 2015.
  • More than 6 million detected ransomware attack attempts in Q4 2015.
  • 50% of all malware are now ransomware attacks.

Industry experts agree that a staggering 93% of phishing emails now contain encryption ransomware. Many are opened by end users who don’t understand they are the targets of carefully crafted social engineering.

Join Scott Parker and Bryan Zimmerman from SolarWinds N-able as they explore the rise of Ransomware and ways to educate and protect your customers.

Attendees will be given free ransomware prevention materials and tip sheets that you can use to educate your customers about protecting themselves against threats.


Making SIEM simple, and profitable for MSP’s

Tuesday, August 30, 2016  2:00pm ET / 11:00am PT

Fortinet Network security and compliance management has never been more challenging or dynamic, with Security and Operations departments facing rapidly expanding sources, types and frequencies of threats to their network integrity. Organizations of all sizes, types and locations are looking for Security Information and Event Management (SIEM) tools to help them manage in this environment.

Have you ever wondered:

  • What exactly is a Security Information and Event Management (SIEM)?
  • How does a SIEM work?
  • What are organizations expecting from a SIEM in helping them to manage their network security?
  • What are the opportunities that a SIEM can provide to MSP’s?

We will answer these questions and many more as we look at the basic workings of a SIEM tool, the growing market drivers, and the key capabilities a SIEM needs in battling against current and future threats. We will also explore the tremendous opportunities that this environment opens up to MSP’s, to help them expand their market size, geographical reach, and with stickier, more strategic product offerings.


The Hottest Companies in Cloud Services

Wednesday, August 31, 2016  2:00pm ET / 11:00am PT

Insight Tune in on August 31 at 2 p.m. ET to hear firsthand about some of the trends driving the cloud market and the companies transforming it.

This webinar, which will feature Talkin’ Cloud Editor-in-Chief Nicole Henderson and Penton Channel Editorial Director T.C. Doyle, will zero in on:

  • The most popular cloud services offered
  • The top SaaS opportunities pursed
  • The top vertical markets the cloud services companies are pursuing

If you’re looking for insights on the hottest cloud companies and the go-to-market business models they are embracing, then don’t miss this informational webinar, which promises an advanced sneak peek at the industry’s most respected list of top cloud services brokerages, the Talkin’ Cloud 100.


The Most Progressive Cloud Companies in Business

Thursday, September 8, 2016  2:00pm ET / 11:00am PT

Insight Who are the top 100 cloud services companies? Tune in on Sept. 8th at 2 p.m. ET and find out as Penton Technology’s Talkin’ Cloud unveils the 2016 TC 100.

Learn firsthand who the top 100 movers and shakers of the cloud market are and what technologies and markets they pursue from Talkin’ Cloud Editor-in-Chief Nicole Henderson and Penton Channel Editorial Director T.C. Doyle, along with special guest presenters.

This webinar will go in depth about the following:

  • Top IaaS platforms leveraged by cloud services brokers
  • Top SaaS offerings and up-and-coming SaaS ISVs
  • Top cloud services of interest and a look at real-world companies pursuing them

If you’re in the market of selling, developing or integrating SaaS, PaaS or IaaS technologies, then this is one webinar you won’t want to miss. The 2016 TC 100 promises to be the definitive benchmark of companies in the cloud services market today.


Threat Intelligence: The MSP’s Secret Weapon

Wendesday, September 21, 2016  2:00pm ET / 11:00am PT

AlienVault One of the biggest challenges when creating a managed security offering is developing threat intelligence and instrumenting it with existing security controls. This challenge is magnified exponentially as a company's client base grows and needs evolve.

In this session, you’ll learn about the benefits of building your service offering around a unified security platform and how integrated threat intelligence accelerates the detection process. We’ll also recommend how MSSPs can leverage open threat sharing communities and custom intelligence development to maximize revenue and differentiate themselves from the competition.

Attend this Webchat and you will also learn:

  • The importance of developing a comprehensive understanding of not only the different data types collected for analysis, but also the ways in which the data types interact with each other
  • The need for an intelligent approach to identifying the latest threats to achieve the broadest view of threat vectors, attacker techniques and effective defenses
  • Why the use of coordinated rule set updates is key to maximizing the effectiveness and efficiency of threat intelligence
  • and to ensuring that your clients are protected no matter how (and how often) their business grows and needs change

You must have Javascript and Cookies enabled to access this webcast.
Click here for Help.

By submitting this form, I acknowledge and agree to Penton's Terms of Service and to Penton's use of my contact information to communicate with me about Penton's or its third-party partners' products, services, events and research opportunities. Penton's use of the information I provide will be consistent with Penton's Privacy Policy. In addition, I understand that my personal information will be shared with any sponsor(s) of the resource, so they can contact me directly about their products or services. Please refer to the privacy policies of such sponsor(s) for more details on how your information will be used by them.