More people are working from home than ever before because of the coronavirus pandemic. This has caused plenty of issues for IT departments and other employees. In recent weeks, many of our customers have asked us to help them solve problems ranging from “simple” home office and desktop connectivity issues to complex remote computer access in critical infrastructures, such as hospitals or control rooms.
In this 45-minute webinar, we will open our “bag of technology tricks” and give you an overview of technology that enables you to overcome the challenge of connecting your remote employees with servers and computers. Learn how the right mix of KVM, AV, and infrastructure technology can drastically improve user workflows and access to critical hardware and data.
Topics covered:
Join us in this webinar as we explore the critical and growing threat of insider security risks. Discover how organizations can effectively protect mission-critical systems against malicious or accidental insider threats by implementing robust security solutions like Black Box NIAP-certified Secure KVM switches. With insights from industry experts, we dive into the history of cybersecurity, real-world cases of insider threats, and strategies for safeguarding data in today’s hybrid work environments.
Play VideoJoin us for an in-depth introduction to Black Box’s advanced KVM solutions, hosted by application specialist Brian Andrews. In this 25-minute webinar, Brian takes you through the essentials of KVM technology, discussing everything from common terminology to specific product offerings such as desktop and secure KVM switches, high-performance KVM matrix systems, and the versatile Emerald IP range. The session concludes with a Q&A segment where Brian addresses questions about video interfaces, peripheral support, and more.
Key topics covered:
Join Karina, Tom Fitzgerald, and Brian Andrews as they discuss the intricacies of deploying multisite control rooms. This session, part four of our webinar series, delves into why multisite deployments are crucial and explores the challenges and solutions for maintaining efficient, secure, and resilient operations.
Key Topics Covered: