Webinars

Upcoming Webinars

Video Thumbnail
Live Demo: AuthPoint
Join the Live AuthPoint Demo
-
Time 1 Start - End
8:00 AM PST, 2:00 PM PST
Body

If you are like most IT leaders evaluating multi-factor authentication solutions, you want to test them all and feel certain that you are selecting a solution that best meets the needs of your

Video Thumbnail
Man drawing circles in the air with light
Automate: Streamlining Your Security
Time 1 Start - End
8:00 - 8:30 am PST, 3:00 - 3:30 pm GMT
Body

More than ever, IT leaders need security with a high degree of autonomy and automation to lighten the load for IT staff, optimize network performance, and deliver the highest resilience to cyber

Video Thumbnail
White Shield with a white circled checkmark in the lower right corner and a wi-fi symbol in the center
5 Simple Ways to Secure Your Wi-Fi
Time 1 Start - End
8:00 - 9:00 am PDT, 3:00 - 4:00pm GMT
Body

Companies will go to great lengths to keep unauthorized users off their networks, but Wi-Fi access points can provide hackers a convenient way in. Learn about the simple process to add WatchGuard

Illustration of a document with CPE in the center

Want an Easy Way to Earn CPE Credits*?

Knowledge and time go hand in hand. Attend any WatchGuard webinar (live or on-demand) to earn CPE credit towards your security certifications. It’s as simple as entering your attendance details through your membership account with your certifying body.

*A 1 hour webcast is equal to one CPE credit and a 30 minute webcast is equal to 0.5 CPE credit

On-Demand Webinars

Webinar Series: Secure Wi-Fi

With Wi-Fi vulnerabilities like the Wi-Fi Key Reinstallation Attack – also known as “KRACK” – making global headlines, it’s clear that there’s a lot more to Wi-Fi than just connecting – security needs

Ransomware Defense Tactics

The WannaCry ransomware attack that crippled hundreds of thousands of computer systems has made the threat of ransomware front-page news around the globe. This news should be especially daunting to

Cloud Security Strategies for SMBs

Small and midsize businesses are rapidly moving to the cloud to reduce infrastructure costs while gaining scalability and efficiency. Email servers, web servers, customer relationship manager systems,

Unifying Security Silos

When cyber criminals lurk behind every dark corner of your network, where do you look for protection? Having disparate security solutions – from the network, endpoint, and threat intelligence feeds –

2017 Security Predictions

2017 is sure to be marked by significant change and innovation within the world of technology. But as technology evolves, cyber threats are all too certain to follow suit. With our best crystal ball

Staying Ahead of Hackers

Over 90% of all breaches are enabled by a few hundred commercial exploit kits that hackers share and sell in the black market. The typical IT environment may have thousands of unpatched

Defending Your Wi-Fi Airspace

Organizations across all industries are facing increased pressure from customers, vendors, and employees to offer Wi-Fi access. While offering this service provides significant gains, businesses

Least Wanted Malware

New breeds of malware are emerging every day. These network threats can run the gamut from minor bugs, to ransomware programs used to extort money and subject victims to the mercy of their data

How to Battle Ransomware

Large corporations are no longer the primary target for hackers, making network security for small and mid-sized businesses more important than ever before. Ransomware has evolved dramatically over