Webinars On-demand


Featured

Secrets to CASB Success

How to exploit CASB to use more cloud with security confidence.

Discover More with Microsoft Teams

Discover how Microsoft Teams brings together your workforce

Microsoft End of Support Options - Virtual Roundtable

Discover the benefits of moving to a Modern Desktop

Recent Webinars

Secrets to CASB Success

How to exploit CASB to use more cloud with security confidence.

Discover More with Microsoft Teams

Discover how Microsoft Teams brings together your workforce

Using Data Science to Patch Fewer Vulnerabilities

Discover which vulnerabilities pose the most risk - fix the 5% that matter most!

MPLS to SD-WAN Migration: A Practical Blueprint

Reduce MPLS/WAN costs whilst improving performance & security.

Bridging the SOC Skills Gap

How advancements in SIEM & Threat Hunting technology provide valuable automation for SOC teams

Proofpoint & Palo Alto Integration

Industry giants team up to provide platform to platform intelligence sharing & more...

Discover the importance of IT and Business Governance

Improve efficiency, data privacy and regulatory compliance when you simplify and automate the control of unstructured data.

Cloud Compliance with Dome9

See Dome9's key capabilities in delivering efficient, effective cloud security and compliance.

Protecting your VAP's: Eliminating Human Risk

Online Workshop - Protecting Your VAP's: Eliminating Human Risk

Active EDR: Rapid, Autonomous Attack Response

A brand new approach to Endpoint Detection & Response (EDR)

Microsoft End of Support Options - Virtual Roundtable

Discover the benefits of moving to a Modern Desktop

Why & How to Replace your MPLS

Reduce your WAN costs and improve performance and security

Microsoft's New Security Offerings

Explore the latest security products & suites

360° Cloud Security Webinar

How to secure, monitor and manage heterogeneous multi-cloud environments

Zero Trust: How to Make it Work

​​How Zscaler can help you to define and accelerate a Zero Trust Model

Centrify Zero Trust Privilege

Stop the leading cause of breaches – privileged credential abuse.

Want a Quote? Just tell us what you need

Email Call

Need Advice? We can help with your next project

Email Call

Email Call