Events

Search
Architecture
Order by
Direction
Event Type

There are currently none available, please check back later

Training

Search
Discover "Cisco Secure Connect" with Ingram Micro Featured Image
Discover "Cisco Secure Connect" with Ingram Micro

Cisco+ Secure Connect, a turnkey SASE offer that radically simplifies the way companies can securely access applications and resources hosted anywhere from any location at any time. Easy to deploy, use, and manage through a unified cloud dashboard, it significantly reduces organisations’ operational complexities to deliver greater agility, speed, and scalability.

Cisco Full-Stack Observability with Ingram Micro Featured Image
Cisco Full-Stack Observability with Ingram Micro

Cisco Full-Stack Observability provides a central point that you use to monitor and control all the organisations connected to applications: AppOps & DevOps, NetOps, InfraOps, and SecOps. It also provides a unified view of resource allocation, infrastructure, and security to provide you with the ability to fine-tune an application ecosystem to provide the optimal application experience.

IMSecure Discover "Cisco+ Secure Connect" with Ingram Micro Featured Image
IMSecure Discover "Cisco+ Secure Connect" with Ingram Micro

Find out more about Cisco SASE, Cisco+ Secure Connect Overview, demo and more.

IMSecure shortcut - Security Practice Accelerator Featured Image
IMSecure shortcut - Security Practice Accelerator

Ingram Micro has developed "IMSecure - The Security partner journey", a program to support partners to enter and growth on Cisco Security business. This session represents a shortcut on this journey and will be focused on consultant approach you can get enrolling in the program.

Cybersecurity Series - Introduction Featured Image
Cybersecurity Series - Introduction

In this series, Michał Porada shows and explains the threats lurking for us and our employers. Get to know the Video Tips series and don't give in to hackers!

Cybersecurity Series - Social Engineering Featured Image
Cybersecurity Series - Social Engineering

In this episode, we talk about social engineering methods that hackers use to obtain confidential data from us, which can also be used to get to the resources of the organisation we work for. Learn social engineering methods of hackers and don't be fooled!

Cybersecurity Series - Phishing Featured Image
Cybersecurity Series - Phishing

What do phishing activities look like in practice? In this episode, see some real-life examples and don't be fooled on the web. The data you have is sometimes very important to cybercriminals and they will go to great lengths to extract it from you.

Cybersecurity Series - Open Source Intelligence (OSINT) Featured Image
Cybersecurity Series - Open Source Intelligence (OSINT)

We leave a huge amount of personal and business data on the Internet, often open to the public. Watch this episode and find out how Ingram Micro’s Eye Site can help your business.

Cybersecurity Series - Inspector Gadget Featured Image
Cybersecurity Series - Inspector Gadget

Did you know that there are really many ways to introduce malware or even a mini computer into your corporate (and private) network without you even noticing? Watch this episode, learn the ways of cybercriminals and don't be fooled.

1. Select your country