Webinars

Upcoming Webinars

Thumbnail: Event
WatchGuard Tech Masterclass - Total Identity Security and Multi-Factor Authentication
1:00pm AEDT
Body

2-hour Virtual Technical Training | Learn how to use WatchGuard AuthPoint MFA, Password Manager and Dark Web Monitoring to protect identities, assets, accounts and information. URL: https://secure

Thumbnail: Event
WatchGuard Tech Masterclass - Wi-Fi in The WatchGuard Cloud
1:00pm AEDT
Body

2-hour Virtual Technical Training | In this Masterclass, we will take a detailed look at how to build and deploy a Wi-Fi 6 environment in the WatchGuard Cloud. https://secure.watchguard.com/WB-APAC

On-Demand Webinars

2024 Security Predictions
1h

Explore WatchGuard Threat Lab's 2024 predictions on what cybersecurity threats will look like in the next year and ways to defend your business.

MSP Success Using Vendor Managed Services
55m

Explore strategies and vendor services to take advantage of today to pivot and remain flexible for the future.

A Preview of CyGlass with WatchGuard
1h 1m

Learn about WatchGuard’s exciting acquisition of CyGlass and what makes this technology such an important addition to the WatchGuard platform.

Top Security Threats Worldwide Q2 2023
1h 12m

Explore key findings from the WatchGuard Threat Lab’s 2023 Q2 Internet Security Report.

MSPs Success During Economic Uncertainty
39m

Explore strategies and vendor services to take advantage of today to pivot and remain flexible in the face of economic uncertainty.

Insuring Your Digital Future
55m

Examine cyber insurance requirements and explore potential solutions for protecting your business from data breaches and other cyber threats.

Top Security Threats Worldwide Q1 2023
1h 7m

Explore key findings from the WatchGuard Threat Lab’s Q1 2023 Internet Security Report.

ITDR & Zero Trust Enablement
48m

Learn about the importance of identity threat detection and response (ITDR) and how it fits into your security services portfolio.

How XDR Can Help MSPs
55m

Discover XDR essential concepts & the keys to free up overwhelmed security teams trying to identify attacks with only narrow, disjointed attack viewpoints.