Some troubling statistics are emerging surrounding ransomware and the broad effect it is having on the IT industry and its customers:
- Over 18 million dollars paid to ransomware thieves between April 2014 and June 2015.
- More than 6 million detected ransomware attack attempts in Q4 2015.
- 50% of all malware are now ransomware attacks.
Industry experts agree that a staggering 93% of phishing emails now contain encryption ransomware. Many are opened by end users who don’t understand they are the targets of carefully crafted social engineering.
Join Scott Parker and Bryan Zimmerman from SolarWinds N-able as they explore the rise of Ransomware and ways to educate and protect your customers.
Attendees will be given free ransomware prevention materials and tip sheets that you can use to educate your customers about protecting themselves against threats.
Network security and compliance management has never been more challenging or dynamic, with Security and Operations departments facing rapidly expanding sources, types and frequencies of threats to their network integrity. Organizations of all sizes, types and locations are looking for Security Information and Event Management (SIEM) tools to help them manage in this environment.
Have you ever wondered:
- What exactly is a Security Information and Event Management (SIEM)?
- How does a SIEM work?
- What are organizations expecting from a SIEM in helping them to manage their network security?
- What are the opportunities that a SIEM can provide to MSP’s?
We will answer these questions and many more as we look at the basic workings of a SIEM tool, the growing market drivers, and the key capabilities a SIEM needs in battling against current and future threats. We will also explore the tremendous opportunities that this environment opens up to MSP’s, to help them expand their market size, geographical reach, and with stickier, more strategic product offerings.
Tune in on August 31 at 2 p.m. ET to hear firsthand about some of the trends driving the cloud market and the companies transforming it.
This webinar, which will feature Talkin’ Cloud Editor-in-Chief Nicole Henderson and Penton Channel Editorial Director T.C. Doyle, will zero in on:
- The most popular cloud services offered
- The top SaaS opportunities pursed
- The top vertical markets the cloud services companies are pursuing
If you’re looking for insights on the hottest cloud companies and the go-to-market business models they are embracing, then don’t miss this informational webinar, which promises an advanced sneak peek at the industry’s most respected list of top cloud services brokerages, the Talkin’ Cloud 100.
Who are the top 100 cloud services companies? Tune in on Sept. 8th at 2 p.m. ET and find out as Penton Technology’s Talkin’ Cloud unveils the 2016 TC 100.
Learn firsthand who the top 100 movers and shakers of the cloud market are and what technologies and markets they pursue from Talkin’ Cloud Editor-in-Chief Nicole Henderson and Penton Channel Editorial Director T.C. Doyle, along with special guest presenters.
This webinar will go in depth about the following:
- Top IaaS platforms leveraged by cloud services brokers
- Top SaaS offerings and up-and-coming SaaS ISVs
- Top cloud services of interest and a look at real-world companies pursuing them
If you’re in the market of selling, developing or integrating SaaS, PaaS or IaaS technologies, then this is one webinar you won’t want to miss. The 2016 TC 100 promises to be the definitive benchmark of companies in the cloud services market today.
One of the biggest challenges when creating a managed security offering is developing threat intelligence and instrumenting it with existing security controls. This challenge is magnified exponentially as a company's client base grows and needs evolve.
In this session, you’ll learn about the benefits of building your service offering around a unified security platform and how integrated threat intelligence accelerates the detection process. We’ll also recommend how MSSPs can leverage open threat sharing communities and custom intelligence development to maximize revenue and differentiate themselves from the competition.
Attend this Webchat and you will also learn:
- The importance of developing a comprehensive understanding of not only the different data types collected for analysis, but also the ways in which the data types interact with each other
- The need for an intelligent approach to identifying the latest threats to achieve the broadest view of threat vectors, attacker techniques and effective defenses
- Why the use of coordinated rule set updates is key to maximizing the effectiveness and efficiency of threat intelligence
- and to ensuring that your clients are protected no matter how (and how often) their business grows and needs change