Skip to content

Main Navigation

Gigaom Search
  • Menu

  • About Us
  • ResearchExpand
    • Cloud & Infrastructure
    • Data Infrastructure, AI & Analytics
    • Edge & Networking
    • Security & Risk
    • DevOps & Applications
  • Analysts
  • Search
  • Sign in
Become a Client
Padlock With Keyhole icon in. personal data security Illustrates cyber data or information privacy idea. blue color abstract hi speed internet technology.
Image credit: Thitichaya Yajampa
Sponsored by
Jan 28, 2021 @ 12:00 PM CST -- On Demand Webinar

Data Management and Secure Data Storage for the Enterprise

This free 1-hour webinar from GigaOm Research brings together experts in data management and security, featuring GigaOm Analyst Enrico Signoretti and special guest from RackTop Systems, Jonathan Halstuch. The discussion will focus on data storage and how to protect data against cyberattacks.

Most of the recent news coverage and analysis of cyberattacks focus on hackers getting access and control of critical systems. Yet rarely is it mentioned that the most valuable asset for the organizations under attack is the data contained in these systems.

In this webinar, you will learn about the risks and costs of a poor data security management approach, and how to improve your data storage to prevent and mitigate the consequences of a compromised infrastructure.

Featured Speakers

Enrico Signoretti Analyst, GigaOm Research
Jonathan Halstuch CTO and Co-Founder, RackTop Systems

Why Attend?

Register now to join GigaOm and RackTop Systems for this free expert webinar.

In this 1-hour webinar, you will discover:
• The relationship between data management and security
• Data management and security are investments, not insurance policies.
• Not all attacks are the same, there isn’t only ransomware.
• Common attacks and how to prevent them
• Risks, challenges, and solutions to have better control over your data

Who Should Attend:
• CxOs
• IT managers
• Project managers
• System administrators
• Infrastructure/system architects

Register to Join GigaOm for this free expert webinar:

Watch now

Register To Watch Now

Required

GigaOm needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Data Management, Data Security
  • Tweet
  • Share
  • Post

Related Research

Fintech Icon  On Abstract Financial Technology Background .
Image credit: monsitj
Sponsored by
Enrico Signoretti Apr 14, 2021 (Apr 20, 2021) -- Business & Technology Impact

Adventist Risk Management Data Protection Infrastructure

Companies always want to enhance their ability to quickly address pressing business needs. Toward that end, they look for new ways to…

Read More
Security & Risk
security-4038043_1920
Image credit: Pete Linforth
Michael Desmond Apr 9, 2021 (Apr 9, 2021) -- Blog

Secure Insight: GigaOm Partners with the CISO Series

Don’t look now, but GigaOm, the analyst firm that enables smart businesses to future-proof their decisions, is forging new partnerships to extend…

Read More
Security & Risk
futuristic city
Image credit: Jackie Niam
Enrico Signoretti Apr 8, 2021 -- Blog

Data Storage Acceleration

Flash memory is now the standard for storing active data in the data center. NVMe and NVMe over Fiber (NVMe-oF) are on…

Read More
Data Management, Data Storage
rad.Brus.MLOps_Radar Chart
Andrew J. Brust Apr 5, 2021 (Apr 5, 2021) -- Market Radar

GigaOm Radar for Evaluating Machine Learning Operations (MLOps)

The time for performing production machine learning (ML) on an ad hoc basis is over. The management of experimentation, deployment, and monitoring…

Read More
Machine Learning, ML Ops
Host data and technology
Image credit: z_wei
Michael Desmond Apr 5, 2021 -- Blog

Unstructured Data and the Challenge of Modern Data Management

Data volumes continue to skyrocket and businesses keep working to harness that data for analytics and intelligence, driving innovation and improving business…

Read More
Data Management
Internet of things, wireless sensor network
Image credit: chombosan
Iben Rodriguez, Geoff Uyleman Apr 1, 2021 (Apr 1, 2021) -- Key Criteria & Market Landscape

Key Criteria for Evaluating Vulnerability Management Tools

Vulnerability management tools scan your IT estate to help identify and mitigate security risks and weaknesses. These tools can facilitate the development…

Read More
Security & Risk

Stay on top of emerging trends impacting your industry with updates from our GigaOm Research Community.

Join Research Community
Gigaom
  • About Us
  • Analysts
  • Press Room
  • Contact
  • Twitter
  • Facebook
  • LinkedIn
  • RSS Feed
  • Newsletter
  • Privacy Policy
  • Terms of Service
  • © GigaOm All Rights Reserved 2021
This website uses cookies; by continuing you are a agreeing to our Privacy Policy Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

This is an necessary category.

Save & Accept