19

Jun

2020

"You’ve Got Mail”- Protecting your Hosted Email

Author: JPGuiang

Date of Event: Friday, June 19th 2020
Where:TIG Webinar

Time:8:15am -9:30am CST

Description:

The iconic “You’ve Got Mail” email days are now more than 20 years behind us. With each passing month, cyber-hackers are looking for ways to get into your email through dark web channels, which could be due to outdated credentialing and lax security protocols.

Moderated by TIG’s Cloud and Data Center Director, Chad Martin in this exclusive webinar as Unitrends introduces backup appliances and cloud data protection that leverages cutting edge technology to automate manual tasks, eliminate management complexity, and deliver tested hardware and software resilience.

Spanning Dark Web Monitoring key benefits:
  • Reduce the risk of significant data loss that requires costly intensive recovery & restoration efforts
  • Reduce the risk of IP theft
  • Reduce the risk of a business email compromised attack

And discover a “No-Sweat” recovery plan for Office 365:

  • Daily, automated and on-demand backup
  • Advanced search & secure encryption
  • Self-service recovery - data restored in seconds, with just a few clicks Unlimited storage and retention
  • Easy set-up – nothing to install!
Comments (0)
Number of views (3098)

18

Sep

2019

TIG & Unitrends Ransomware Webinar

Author: Event Admin

Date of Event: Wednesday, September 18th
Where: Webinar
Time: 11:30am– 12:30 pm PST

Join TIG and Unitrends on September, 18th to learn how the new rules of recovery can keep your business running – no matter what.

The greatest threat comes from within: The number one cause of IT downtime is your employees, not an external threat.

Employees inadvertently delete files, click on ransomware bait, hoard data and don’t test new software adequately.

Your data backup and recovery solution probably does an okay job of protecting you from external threats – but how is it against more common employee issues?

In this webinar, learn how advanced data backup solutions can protect you against the 5 most likely internal threats, including:

  • Enabling easy pretesting of software patches, upgrades, fixes
  • Protecting against malicious employees who delete large numbers of files
  • Automated discovery & recovery from ransomware attacks
  • How to recover deleted files in less than 5 minutes

Comments (0)
Number of views (2843)

20

Sep

2018

Data Connectors – Atlanta

Author: Event Admin

Date of Event: September 20, 2018 Where:InterContinental Buckhead Atlanta 3315 Peachtree Road NE Atlanta, Georgia 30326 United States Time:8:00AM – 5:00PM

The Atlanta Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more.

Technology Integration Group will be presenting from 4:15AM-4:45AM during Session Eleven.

Topic: VMware on AWS and Shared-Security in the Cloud

Session Summary: VMware Cloud on AWS is an integrated cloud offering jointly developed by AWS and VMware delivering a highly scalable, secure and innovative service that allows organizations to seamlessly migrate and extend their on-premises VMware vSphere-based environments to the AWS Cloud running on next-generation Amazon Elastic Compute Cloud (Amazon EC2) bare metal infrastructure. This session will look at the benefits of this cloud offering, as well as, the joint-security responsibilities of AWS and the customer.

Chad Martin, Director (VSS Practice - East) Technology Integration Group 1750 Corporate Drive, Suite 730 Norcross, Georgia 30093 [email protected] 678-462-1158 (mobile)

Presentation Info:

Chad Martin, Director (VSS- Virtualization, Server, Storage and Cloud)

Chad Martin has 20 years of overall professional IT experience within the Health Care, Governmental (DoD), Educational and Commercial industries. He has proven leadership abilities and outstanding organizational skills, as well as, an excellent record of exceeding all performance goals. Chad is a dedicated, highly accomplished and motivated Solutions Architect with proven track record of rapport-building, resourceful problem-solving and communication skills. Strong emphasis on integration and security of production systems and networks.

By holding multiple certifications across various technical disciplines, Chad is able to effectively integrate, design, market and deliver the latest technologies and service techniques. These technologies range from VDI (Virtual Desktop Infrastructures), HCI (Hyper-Converged Infrastructure) traditional storage solutions and CSPs (Cloud Service Providers). With his breadth of technology exposure and overall experience Martin plays an integral part in both Pre- and Post-Sale customer engagements.

Comments (0)
Number of views (5146)

13

Sep

2018

Data Connectors – San Francisco

Author: Event Admin

Date of Event: September 13, 2018 Where: InterContinental Mark Hopkins San Francisco 999 California Street San Francisco, 94108 Time:8:00AM – 5:00PM

The San Francisco Bay Area Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.

Technology Integration Group will be presenting from 10:15AM-10:45AM during Session Three.

Comments (0)
Number of views (4598)

11

Oct

2017

ISSA Discover Security Conference 2017

Author: Event Admin

Date of Event: 10/11/2017
Where: Pomaika’i Ballrooms at Dole Cannery
735 Iwilei Rd
Honolulu, HI 96817
Time: All Day

See What Matters! Malicious attackers are penetrating networks every day, compromising what most organizations think is adequate security. They can run, but they cannot hide. With the most advanced security solutions, attackers and hackers armed with weapons-grade cyber exploits and malware and those with malicious intent get inside infrastructures, DNS gateways, and multitier applications that are on premises or in the cloud; we cannot let our guard down. Discover what other people are doing to improve their security posture and what vendors are doing to help them. Discover the latest security trends, what can possibly happen inside your environment and how vendor solutions can help you See What Matters so you can see, manage and secure what matters.

Hosted by the Hawaii Chapter of Information Systems Security Association (ISSA), this 2-day event is focused upon cybersecurity for all vertical market segments in both the public and private sectors. It is will attended, and recently moved to a larger venue that can accommodate up to 600 attendees.

Comments (0)
Number of views (4722)
RSS
12