Webinars On-demand


Featured

Visibility of Spend & Usage in the Cloud

How to manage SaaS and IaaS

Okta for O365 and Azure Active Directory

Secure access to O365 and Azure AD integration

Overcoming Cloud Transformation Challenges

Move to the cloud with maximum security & user convenience.

Recent Webinars

What's next in Hyper-Converged Infrastructure

The benefits of VMware vSAN with Veeam Availability Suite on HPE

Tackle Today’s Mobile Threats

VMware AirWatch & Check Point partner for Ultimate Mobile Security

Microsoft Enterprise Mobility + Security

Benefits and Limitations of Microsoft EM+S

CrowdStrike - Built to Stop Breaches

Setting the new standard in endpoint protection.

Defeat Ransomware with Disaster Recovery

A simple and effective solution to recover your critical systems and data.

Lock Down Security Breaches

Slash the time needed to respond effectively to breaches

How to Manage a Software Audit

The Do's and Don'ts according to the SAM experts

Citrix NetScaler SD-WAN

Improve branch resilience, agility and user experience

SSL: A Critical Security Blindspot

Must-know facts on SSL encrypted threats & hidden malware

Re-Think Security with Centrify

Protect your organisation against cyber attacks and data breaches

Microsoft Azure Security Solutions

Enterprise-grade security for Azure deployments with Barracuda

Make Significant Cost Savings with Azure

Discover how you can enhance business processes and reduce costs with Azure

Insider Threats - Means, Motive, Opportunity

The Anatomy of Insider Breaches, and how your business can counteract them.

VMware Cloud Foundation

The software-defined data centre platform for the hybrid cloud

Ransomware: The Perfect Crime?

Analysis of Ransomware attacks & the latest protection strategies

CrowdStrike - Built to Stop Breaches

The New Standard in Endpoint Security & Incident Response Management

Want a Quote? Just tell us what you need

Email Call

Need Advice? We can help with your next project

Email Call

Email Call