Upcoming Webinars

Event Image
ISR Q2 2023 thm image
Top Security Threats Worldwide Q1 2024
8am - 9am PDT, 3pm - 4pm GMT

Join WatchGuard CSO Corey Nachreiner and Director of Security Operations Marc Laliberte as they discuss key findings from the WatchGuard Threat Lab’s Q1 2024 Internet Security Report. You’ll learn

Thumbnail: Event
WatchGuard MDR (Managed Detection and Response)
10:00 am (GMT-6)

WatchGuard MDR es operado 24/7 por el equipo de élite de profesionales de ciberseguridad de WatchGuard desde un moderno SOC totalmente dotado de personal y potenciado por IA. Con este nuevo servicio

On-Demand Webinars

Critical Factors to Look for in a Cybersecurity Vendor

Find out what key characteristics and business strategies you’ll want to consider when assessing which cybersecurity vendor to use for your business.

Secure Your Clients Against Ransomware

Learn how MSPs can help prevent their SMB clients from falling victim to a ransomware attack.

Top Security Threats Worldwide Q2 2022
1h 7m

Join WatchGuard CSO Corey Nachreiner and Security Engineer Trevor Collins as they cover the latest Internet Security Report from the WatchGuard Threat Lab.

Keeping Up with the Threat Landscape

Discover the latest threat landscape, including the attack tools and techniques you need to defend against.

The Best (Tested) MFA Features for Admins and Users

Explore multi-factor authentication from a competitive outlook and learn about the key features that leading MFA solutions are offering.

Back to Basics: Securing Your Business

Come back to the basic elements of cybersecurity and review the security principles and key practices that need to be adopted in every organization.

Top Security Threats Worldwide: Q1 2022
1h 16m

Discover the attack trends and latest malware variants targeting WatchGuard Firebox and EPDR customers worldwide.

Salesforce Requires MFA

Multi-factor authentication adds an extra layer of protection against threats. That's why Salesforce now requires MFA when accessing their products. Discover all details here.

Choosing the Right Security Model

Discover the strategies that IT leaders can use develop the security approach to thrive in an ever-changing risk environment.