As users have flocked to Teams, compliance officers, information governance professionals, and other risk management decision-makers are asking whether they have access to the right archiving and data protection capabilities for the many data types produced within Microsoft Teams. Sponsored by Dropsuite, Exterro, IPRO, Micro Focus, Mimecast, Smarsh, Theta Lake, and ZL Technologies.
Cybersecurity challenges abound for organizations across the world, with phishing and ransomware critical threats to neutralise. A survey report on a primary market research survey on how to reduce the reduce the risks of both. Sponsored by KnowBe4, Octree Limited, SlashNext, Spamhaus Technology, and Trend Micro.
This report compares and contrasts the respective approaches to information governance and eDiscovery by IPRO and Microsoft 365. It is offered to enable professionals with responsibility for information governance evaluating the move to Microsoft 365 to gauge suitability to task of the information governance and eDiscovery tools offered by both vendors. Sponsored by IPRO.
Cybersecurity challenges abound for organizations across the world, with phishing and ransomware critical threats to neutralise. An investigation into how to reduce the reduce the risks of both. Sponsored by KnowBe4, Octree Limited, SlashNext, Spamhaus Technology, and Trend Micro.
The education sector faces a growing complex of cybersecurity threats. The industry has been under high attack for several years already, with phishing, ransomware and denial-of-service attacks growing in frequency and ferocity. Sponsored by BIO-key International, KnowBe4, Mimecast, and Yubico.
Examining the cybersecurity skills shortage across the world, and advocacy for the use of advanced security services and technologies that more effectively leverage the time of current professionals. Sponsored by Anomali, SlashNext, Trustwave and VMware Carbon Black.
Exploring the dynamics of the new threat landscape, and highlighting new security solutions and practices that go beyond the capabilities of conventional solutions. Sponsored by Anomali, BIO-Key International, MDaemon Technologies, Virsec and VMware Carbon Black.
Threat intelligence can help to enable security analysts, threat researchers and others to deal more effectively with cyber criminals by providing the information to better understand current and past attacks, and it can give them the ability to predict and thwart future attacks. Sponsored by Cyren.
Cybersecurity technology can only go so far in protecting an organization. Good security awareness training is essential in protecting the organization from security threats and the damage they can cause. Sponsored by Infosec, KnowBe4, MediaPRO and Mimecast.
Microsoft 365 delivers a range of long-offered and new style productivity and collaboration tools. Equally, however, is the reality that Microsoft 365 comes with some shortcomings in the areas of security, archiving, backup, data protection, eDiscovery, and other key aspects of the offering. Relying solely on the native capabilities in Microsoft 365 can lead to challenges. Sponsored by Backupify, Mimecast, Quest Software and Yubico.