Resources by Video

    Remote Productivity That's Not Remotely Difficult

    Virtual Desktop Infrastructure (VDI) isn’t all that exciting. Or is it? How about adding device independent endpoint security? Better work experiences for remote users? High performance for applications like Zoom and Teams? All of a sudden, in a new era where 451 Research sees “ a lot more capable Desktop as a Service options emerging,” VDI presents some exciting options...

    videos

    Cloud Forecast: Looking to 2022 [Webinar Replay]

    Luminary Series featuring Bob Evans of CloudWars and Gene Torres from Zerto In March, we spoke to Bob Evans, creator of industry analyst site Cloud Wars, and Gene Torres, Technology Evangelist at Zerto, about the importance of a multi-cloud strategy and how to stay secure when your workloads are spread across on-prem, enterprise cloud, and hyperscale environments. We speak...

    videos

    Zero Trust Security: Verify by Design, Not Default

    Former Federal CIO Tony Scott has experience that spans not only the US government, but also Microsoft, VMware, and Disney, which means he’s had a front row seat for the evolution of not only the cyberattacks meant to cripple digital infrastructure but also the defenses against them over the past 20 years. Now as an advisor to ColorTokens, a leader...

    videos

    Skip Architecting – Start Using VMware Horizon with Expedient Enterprise Workspace

    Virtual desktop infrastructure (VDI) is a wonderfully difficult problem to solve. You have back-end infrastructure, front-end brokers, load balancers, file servers, and more just to get to the starting line. What if you could skip all of that? Instead of spending all your time building and architecting, what if you could jump directly to deploying desktops immediately? Expedient Enterprise Workspace,...

    videos

    Introducing Expedient Micro-Segmentation with ColorTokens [Webinar Replay]

    Protecting your network is a top security priority, usually focused on the perimeter of the network. But that can’t be our only focus. What happens if something gets through the perimeter? How do we protect our workloads and users from threats moving around inside our network? With Expedient Micro-Segmentation, powered by ColorTokens, you can easily secure and compartmentalize your network...

    videos

    Race to the Cloud with Mike Walker from Microsoft [Webinar Replay]

    Organizations are racing to the cloud at a record pace. To navigate the complexities involved, they need to realize the full potential of a multi-cloud approach and determine the optimal mix of on-premises, Enterprise cloud, and Azure for the spectrum of Microsoft and VMware-based workloads amassed over decades. Watch Mike Walker, Senior Director of Applied Innovation and Digital Transformation at...

    videos

    Recover: Get Back Up And Running Faster [Webinar Replay]

    The worst has happened. Your organization is completely offline and the attackers are asking you for a sizeable ransom. Now what? Which backups can you trust? How can you make sure you’ve closed the door to further attacks? And how do you get your business back online without any further interruption? Watch AJ Kuftic, Digital Product Strategist at Expedient, discuss...

    videos

    Survive the Disaster, Manage the Crisis with C4CS' Oliver Schmidt [Webinar Replay]

    If a ransomware attack were to happen to your organization, how will you regain the trust of your customers? The technology and recovery capabilities only account for getting back online. Public relations, lost productivity, and business continuity plans are all a part of a full crisis management plan. Watch as AJ Kuftic, Digital Product Strategist at Expedient, and Oliver Schmidt,...

    Videos

    Detect: How to Figure Out What Happened [Webinar Replay]

    The first sign of a ransomware attack will probably be a helpdesk ticket that says something like, “there’s a red screen on my computer and it wants money. Also, what’s a Bitcoin?” Once you process that information, how do you figure out where the ransomware got in? How do you know what’s safe and what’s not, and how do you...

    Videos

    Protect: How to Stop Attacks Before They Happen [Webinar Replay]

    The best way to avoid having to deal with a ransomware disaster is to keep it from happening in the first place… which is easier said than done. Technology certainly plays a role, but that’s only half of the story. Making sure your people are aware of attack attempts and what they look like is crucial to protecting your environment....

    Videos

    How to Avoid the IT Land Mines that Cripple Your Cloud Strategy [Webinar Replay]

    The decisions you make today could impact your cloud journey for years to come and you won’t even know it. Take, for instance, a new one-year vendor contract you sign to hold you over until the end of your current hardware lifecycle: by the time you’re migrated to the new platform, you’re not going to want to switch when it...

    Videos
    Providing Resilience
    October 17th, 2024 at 1:00 PM ET

    How Packetwatch and Expedient Transform Incident Response

    Join us

    Providing Resilience

    October 17th, 2024 at 1:00 PM ET

    How Packetwatch and Expedient Transform Incident Response

    Join us