Latest Content

Welcome to our Hub! We hope you find something interesting to read, watch and share.

  • Unified Security for a Reconnecting World1:40

    Unified Security for a Reconnecting World

    During the last year we have been more connected than ever. We have adapted to a new way of life and found new ways to overcome the distance and physical isolation from our colleagues through digital

    Watch Video
  • Firebox M290 & M390 Datasheet

    Firebox M290 & M390 Datasheet

    Firebox M290 and 390 deliver enterprise-grade security for Small to Midsize Businesses to defend all types of small businesses against cyber attacks

    Read Article
  • Why MSPs Save the World

    Why MSPs Save the World

    It’s time for MSPs to help save the world from the rising tide of cyberattacks and cyber villians. How MSPs have grown their businesses and better protected their customers?

    Read Article
  • Defeating Ransomware with Unified Security from WatchGuard

    Defeating Ransomware with Unified Security from WatchGuard

    How Small-to-Midsize Businesses Can Defend Against the Onslaught of Ransomware Attacks

    Read Article
  • July 8, 2021 - Learnings from the Kaseya Supply Chain Attack and Mass Ransomware Incident1:30:40

    July 8, 2021 - Learnings from the Kaseya Supply Chain Attack and Mass Ransomware Incident

    On Friday, July 2, at least eight MSPs were hit with ransomware that infected their infrastructure and many of their customers. The attack exploited some unpatched vulnerabilities in the on-premises K

    Watch Video
  • A Security Umbrella From A Single Vendor4:12

    A Security Umbrella From A Single Vendor

    Equipping your team with the most holistic cybersecurity stack is just as important as protecting your clients with the latest and greatest security solutions. There are many factors to consider befor

    Watch Video
  • Q4 2020 Internet Security Insights Infographic

    Q4 2020 Internet Security Insights Infographic

    Top level insights from the WatchGuard Threat Lab on attacks and security trends from Q4 2020.

    Read Article
  • Protecting Your Network Assets with MFA

    Protecting Your Network Assets with MFA

    Learn what MFA is, how it works, and how WatchGuard's Cloud-based MFA service, AuthPoint, protects your assets from being hacked with just a single touch.

    Read Article
  • Firebox T80 Datasheet

    Firebox T80 Datasheet

    Firebox T80 is one of the highest performing tabletop appliances on the market & offers port expansion modules for integrated fiber connectivity, so you can adapt as your connectivity needs change.

    Read Article
  • WatchGuard Network Security Overview0:50

    WatchGuard Network Security Overview

    Watch Video
  • Security in Higher Ed: Trust, Student Experience, and Multi-Factor Authentication

    Security in Higher Ed: Trust, Student Experience, and Multi-Factor Authentication

    Higher education institutions work constantly to build smarter campuses. These advances tend to focus on digital transformation and overall more accessible, user-friendly resources to enable the...

    Read Article
  • 8 April 2020 - Strategies to Secure Your Remote Workforce30:17

    8 April 2020 - Strategies to Secure Your Remote Workforce

    We face risks in cybersecurity every day. However, one of the challenges of enabling a remote workforce is that the chances of being the subject of cyber attacks can increase significantly. Without th

    Watch Video
  • Security Solutions Built for Midmarket0:46

    Security Solutions Built for Midmarket

    WatchGuard offers products to protect your networks, endpoints, credentials and Wi-Fi that are designed to be simple to deploy, manage and use.

    Watch Video
  • AuthPoint Multi-Factor Authentication – Product Demo7:21

    AuthPoint Multi-Factor Authentication – Product Demo

    An overview of AuthPoint multi-factor authentication, presented by WatchGuard’s Director of Authentication. The demo covers the AuthPoint app, WatchGuard Cloud platform, AuthPoint authentication metho

    Watch Video
  • Cybersecurity Insights - Hybrid Work Models, MSPs Can Transform Your Business4:48

    Cybersecurity Insights - Hybrid Work Models, MSPs Can Transform Your Business

    According to a Canalys report, 134 million workers worldwide will either be working remotely or in a flexible work model. That’s 154% higher compared to remote work before COVID-19. When it comes to t

    Watch Video
  • Unified Security for a Reconnecting World

    Unified Security for a Reconnecting World

    While social distancing, we have adapted to find new ways to work, collaborate, and play. We've had to rely on digital communications in lieu of watercooler chats and cross-cubical banter. More than a

    Read Article
  • Firebox M590 & M690 Datasheet

    Firebox M590 & M690 Datasheet

    Enterprise-Grade deliver enterprise-grade security for Small to Midsize Businesses to defend all types of small businesses against cyber attacks

    Read Article
  • Flexible Pricing to Address the Evolving MSP Business3:45

    Flexible Pricing to Address the Evolving MSP Business

    As MSPs prepare for the shift to hybrid work environments, it is more important than ever to have the pricing and packaging model you and your customers need. The more options you have, the more compe

    Watch Video
  • Q4 2020 Internet Security Report

    Q4 2020 Internet Security Report

    WatchGuard’s Threat Lab (previously the LiveSecurity Threat Team) is a group of dedicated threat researchers committed to helping you stay ahead of the bad guys by providing in-depth analysis of the t

    Read Article
  • Strength of Passwords

    Strength of Passwords

    You’re only one weak password away from a breach...And even your “complicated” passwords can be cracked.

    Read Article
  • ESG: Modernizing Midmarket Security

    ESG: Modernizing Midmarket Security

    Midmarket organizations must think creatively and define a new model for cybersecurity built around integrated technologies, external partners and continuous training for business, IT and security.

    Read Article
  • Case Study: University of Miyazaki

    Case Study: University of Miyazaki

    University Partners with WatchGuard to Provide Best-in-Class Security

    Read Article
  • 6 Essential Features of a Modern Firewall

    6 Essential Features of a Modern Firewall

    In this eBook, we explore the six essential firewall features every network needs to protect against ransomware, malware, phishing, and other attacks.

    Read Article
  • How to Evaluate Real World Firewall Performance56:21

    How to Evaluate Real World Firewall Performance

    In today’s ever-changing cybersecurity landscape, firewall performance should be standardized in order to keep real-world threats at bay and ultimately, protect your business.

    Watch Video
  • WatchGuard Total Security: UTM Subscriptions

    WatchGuard Total Security: UTM Subscriptions

    One Platform, Total Security.

    Read Article
  • Security Solutions for the Midsize and Distributed Enterprise

    Security Solutions for the Midsize and Distributed Enterprise

    Protect your midmarket organizations from cyber attacks and overcome common challenges for IT leaders like limited budgets, minimal security staff, and a “good enough” approach to security.

    Read Article
  • Building Smarter College Campuses with Multi-Factor Authentication13:58

    Building Smarter College Campuses with Multi-Factor Authentication

    Student and faculty information can be accessed from anywhere at any time. With that comes the need to restrict unauthorized access to these applications and data.

    Watch Video
  • Securing the Midmarket

    Securing the Midmarket

    WatchGuard offers products to protect your networks, endpoints, credentials and Wi-Fi that are designed to be simple to deploy, manage and use. See why businesses just like you have chosen WatchGuard.

    Read Article
  • Panda Adaptive Defense 360 for MSPs

    Panda Adaptive Defense 360 for MSPs

    Panda AD 360 is a Cloud-based, cybersecurity solution for workstations, laptops, and servers that automates the prevention, detection, containment, and response for MSPs and MSSPs.

    Read Article
  • The Top 5 SD-WAN Pitfalls

    The Top 5 SD-WAN Pitfalls

    Choosing the right product to address your unique needs is just part of what it takes to implement SD-WAN successfully. For maximum ROI, be sure to avoid these common mistakes!

    Read Article
  • Key cybersecurity measures for the fashion industry

    Key cybersecurity measures for the fashion industry

    Fashion retailers need to address cybersecurity measures in the light of the increasingly omnichannel nature of the sector. Find out what a security partner can do for your business.

    Read Article
  • WatchGuard Honored in CRN’s First-Ever MES Matters List for 2022

    WatchGuard Honored in CRN’s First-Ever MES Matters List for 2022

    We are thrilled to announce that CRN has recognized WatchGuard in its first-ever MES Matters list for 2022! Read more about this awards program here.

    Read Article
  • Getting Ready for Salesforce MFA Requirement

    Getting Ready for Salesforce MFA Requirement

    Salesforce has announced they will automatically enable MFA on all accounts to help customers meet the requirement starting as early as September 2022. Find out more information in this article.

    Read Article
  • LockBit Ransomware Group Introduces Bug Bounties and More

    LockBit Ransomware Group Introduces Bug Bounties and More

    The LockBit ransomware group has unveiled a new website – LockBit 3.0 – to host their ransom extortions and data leaks. The website includes several new features, including an unprecedented bug...

    Read Article
  • 3 security strategies that will boost employee productivity

    3 security strategies that will boost employee productivity

    Most of the tech leaders rank cybersecurity as the top priority for IT spending in 2022. Check out this smart checklist and start thinking about IT spending planning.

    Read Article
  • Grading Gartner’s Guesses

    Grading Gartner’s Guesses

    This week on the podcast, we discuss two recent security reports, one on the topic of open source software and the other on “insecure by design” in the Operational Technology (OT) space. We go...

    Read Article
  • How do MSPs Future-Proof Their Profitability?

    How do MSPs Future-Proof Their Profitability?

    According to our Pulse poll, over 50% of MSPs will use vendor consolidation as their strategy to improve profitability. Future profitability. That’s on the mind of all technology leaders, right?

    Read Article
  • How MSPs can overcome zero-trust barriers

    How MSPs can overcome zero-trust barriers

    Organizations point out that they face several barriers to managing and maintaining a zero-trust approach. Do you know what these outstanding difficulties are and how as an MSP you can help them?

    Read Article
  • 200th Episode Extravaganza

    200th Episode Extravaganza

    In celebration of our 200th episode, this week on the podcast we take a look back at the last few years and revisit some of our favorite episodes. Along the way, we’ll give updates on a few of our...

    Read Article
  • How to stop sophisticated ransomware attacks

    How to stop sophisticated ransomware attacks

    How hackers deploy sophisticated tactics to evade traditional ransomware detection measures and take advantage of commonly used processes to break into systems? Discover more in our eBook.

    Read Article
  • A vulnerable Wi-Fi network puts your organization's data at risk

    A vulnerable Wi-Fi network puts your organization's data at risk

    A recent discovery highlights how insecure public Wi-Fi networks can be and how they represent a major access vector that puts both users and the organizations that manage them at risk.

    Read Article
  • Robux Ransomware

    Robux Ransomware

    This week on the podcast we cover the latest and most bizarre ransomware extortion demand we’ve seen in recent memory. Before that though, we cover the latest updates on nation state hacking...

    Read Article
  • Cybersecurity Insights - MFA Requirements for Salesforce5:40

    Cybersecurity Insights - MFA Requirements for Salesforce

    Salesforce started enforcing the use of multi-factor authentication since February 1st 2022, and they will be auto-enabling it as well. Companies using Salesforce should make sure they implement MFA w

    Watch Video
  • 0-Days for Days

    0-Days for Days

    This week on the podcast we cover two fresh 0-day vulnerabilities, one in Windows and another in Atlassian’s Confluence, both under active exploitation in the wild. Additionally, we cover Costa...

    Read Article
  • WatchGuard Honored in Seven Categories at the 2022 Cyber Defense Global InfoSec Awards

    WatchGuard Honored in Seven Categories at the 2022 Cyber Defense Global InfoSec Awards

    WatchGuard brings home seven 2022 Cyber Defense Global InfoSec Awards.

    Read Article
  • Three reasons why Security Operations Centers (SOCs) are adopted

    Three reasons why Security Operations Centers (SOCs) are adopted

    Company IT and security teams are facing cybersecurity challenges that increasingly test their defensive capabilities. Do you know what your weapon is to hunt the unknown? Find out in our new eBook.

    Read Article
  • Package Hijacking

    Package Hijacking

    This week on the podcast, we discuss the line between ethical security research and malicious activity thanks to a compromised open source software package. After that we cover the latest industry...

    Read Article
  • WatchGuard Wins Big at the 2022 IT World Awards with Six Honors

    WatchGuard Wins Big at the 2022 IT World Awards with Six Honors

    WatchGuard recognized at the 2022 IT World Awards securing six wins across multiple categories. Check out here the full list of WatchGuard’s awards.

    Read Article
  • Best practices for implementing the 5 most challenging technologies in cybersecurity

    Best practices for implementing the 5 most challenging technologies in cybersecurity

    Tech decision-makers have some reservations about adopting the latest technologies to avoid putting corporate security at risk. In this article we explain how to deploy the 5 latest solutions securely

    Read Article
  • WatchGuard Launches PSIRT Page

    WatchGuard Launches PSIRT Page

    WatchGuard’s Product Security Incident Response Team (PSIRT) has launched our public PSIRT page to provide a consolidated resource where network administrators can find advisories and information...

    Read Article
  • loading
    Loading More...