Exponential-e Events

Register for our upcoming live webinars to learn more about our technology, gain business insights and expand your industry knowledge.

Our experts from across Products, Sales, Engineering and the Executive team are on hand to deliver insightful webinars to help you meet requirements and make key business decisions.

Make Hybrid Cloud work for you

Join us at an exclusive virtual wine and cheese tasting event with Exponential-e and Dell Technologies as we help you accelerate your digital transformation objectives through hybrid Cloud and deliver better services to your end-users. We'll explore how you can:

01
Avoid expensive migration and rearchitecting costs moving entire workloads to the Public Cloud
02
Optimise data centre costs and drive efficiencies
03
Maintain business continuity with in-built DRaaS
04
Unify visibility and management of both private and public Cloud environments
05
Reduce complexity with an out-of-the box, Hyperconverged Private Cloud solution

Registration now closed

Unfortunatley, we are now at capacity for this event. However, if you would like further details about up and coming events around this topic, or require a one to one workshop, please fill out the below form to register your interest.

100% Privacy Guaranteed.
View our privacy policy
.

Missed one of our webinars? Catch up here...

The malicious side of QR codes and how to protect your devices against them
Read webinar synopsis

We all know how important it is to ensure your devices are protected while working remotely, but have you considered the same for your mobile devices?

QR codes have been around for over two decades and are used as a very secure and reliable data accessing tool, yet cybercriminals have not held back in finding ways to utilise these to get to your data. Due to the ongoing global crisis, QR codes have made a huge comeback and almost everyone has had to use them at some point in the last 18 months such as track and trace, getting the vaccine, and even viewing food / drink menus.

We all ensure our laptops and PCs have the most up-to-date malware protection, but do we do the same for our mobile devices?

Enter our Head of Cyber Consultancy, Mark Belgrove, and Sarah Dommett, head of compliance at one of our key security vendors, One Compliance Security Ltd, who discussed the vulnerabilities and educational aspects of all things QR and how to keep your mobiles and data safe from cybercrime.

Manufacturers, are you a supply-chain cyber target?
Read webinar synopsis

Recently, we’ve seen a large number of cyber attacks targeting organisations for maximum impact and ultimately, maximum payout. As we saw with the recent JBS ransomware attack, food and drink manufacturers are a clear target for cyber-criminals who are wanting to cause disruption on a large scale. If this has taught us anything, it’s that no size business is safe, especially without a robust cyber security strategy in place to mitigate risks to supply chains. So how exactly do you ensure your organisation is protected if it becomes the target of a supply-chain cyber attack?

Watch our webinar where our Head of Cyber Consultancy, Mark Belgrove, talks through everything you need to know about cyber-threats. From the current threat landscape and how supply-chains are being targeted, to the types of attacks which are used for maximum disruption to a business, and the approaches and tools which can be used to combat these attacks.

Cyber Security Workshop: Working from Anywhere
Read webinar synopsis

Hybrid working is set to stay, which means IT teams must futureproof systems and processes with a “working from anywhere” approach in mind. Whether people are connecting from coffee shops on public Wi-Fi, to working from home but potentially not connected to the VPN, how can these common issues be combatted with a rigorous Cyber Security strategy in place for the coming years? Our Head of Cyber Consultancy, Mark Belgrove, will be taking you through the top vulnerabilities that arise from remote working, the quickest and most cost-effective controls that can be put in place to prevent attacks, and finally how to create a safe working environment for employees, wherever they are based. Watch now.

SD-WAN:
The Perfect Partner for SASE
Read webinar synopsis

We’ve de-mystified SD-WAN with you and now we’re here to delve into SASE and understand why SD-WAN is the ideal enabler for the Cloud-based Security solution. In the era where data is your most valuable asset, it’s crucial that it is secure at all times - at rest, in transit and in use. Watch our Director of Infrastructure, Andy Chant, and Lead SD-WAN Architect, Matt Bird, discuss what exactly SASE is, why this enhanced layer of Security could replace your traditional Security approach, and why when paired with SD-WAN, it enables a cost-effective, centralised and simplistic solution to securely manage your organisation’s network and ultimately, your data. Watch now.

Cyber Security Workshop: An insight into firmware attacks
Read webinar synopsis

As we approach the one year anniversary of shifting to a remote working model, it’s clear the requirement for collaboration and communication tools is still profound. The global pivot to enable organisations to continue serving their customers has been an extremely positive step where Digital Transformation is concerned, but with the speed of response to the situation having been a priority, cyber security has taken a back seat for some, despite the evolving threat landscape. Now, one year on and with the move to cloud communications platforms continuing, it’s time to take back control of your platform security.

Watch our webinar from Tuesday 30th March where our Head of UCC, Mat Godolphin, and Head of Cyber Consultancy, Mark Belgrove, walked through the cloud-based solutions that can elevate your organisations’ communications, both internally and externally, as well as the evolving threat landscape, discussing the key security and compliance issues you should be aware of. Watch now.

How can you securely move to a cloud communications platform in this changing world?
Read webinar synopsis

As we approach the one year anniversary of shifting to a remote working model, it’s clear the requirement for collaboration and communication tools is still profound. The global pivot to enable organisations to continue serving their customers has been an extremely positive step where Digital Transformation is concerned, but with the speed of response to the situation having been a priority, cyber security has taken a back seat for some, despite the evolving threat landscape. Now, one year on and with the move to cloud communications platforms continuing, it’s time to take back control of your platform security.

Watch our webinar from Tuesday 30th March where our Head of UCC, Mat Godolphin, and Head of Cyber Consultancy, Mark Belgrove, walked through the cloud-based solutions that can elevate your organisations’ communications, both internally and externally, as well as the evolving threat landscape, discussing the key security and compliance issues you should be aware of. Watch now.

How can you identify risk and implement a robust security strategy amid more stringent FCA regulations?
Read webinar synopsis

It’s not new news that regulations get tighter year on year, especially for the FCA. But in today’s world where sophisticated cyber-criminals are preying on any gap in an organisation’s security barrier, and with 70% of UK finance organisations saying they were hit by a cyber-attack in 2020, how can the sector ensure they avoid hefty fines and remain secure to comply with FCA regulations?

Watch our webinar from 25th March 2021 where our Head of Cyber Consultancy, Mark Belgrove, discussed key threats already seen this year in the Finance sector, what you should be aware of as the threat landscape broadens, and how key security controls can be implemented to mitigate these risks. 

Safeguarding students online and protecting your school from cyber attacks
Read webinar synopsis

If your school had to close for a third time and once again initiate remote learning, would you be prepared?

In the new era of remote learning, students have been most at risk when it comes to online safety. However, without having access to each student’s individual device, it is difficult to engage, safeguard and protect schools’ infrastructure.

Watch our panel discussion where Mark Belgrove, Exponential-e’s Head of Cyber Consultancy, was joined by representatives from Mimecast and Impero Software to consider how these challenges can best be overcome. They taked in-depth look at the current threat landscape, how to alleviate vulnerabilities in your school’s infrastructure, and what to do if an overnight shift back to remote learning becomes necessary. The topics covered:

  • Achieving compliance with Oftsed online safety requirements.
  • Safeguarding students from cyber bullies and online vulnerabilities.
  • Maximising flexibility and agility, in order to minimise disruption to students’ education.
  • The importance of educating staff, teachers, and students on cyber security best practice.
Why educating your
employees is as valuable as your data, and protecting it.
Read webinar synopsis

“Data is your most valuable asset” is a common phrase used in the business world, but what about your employees? Time, money and trust are invested in your employees on a daily basis through training, wages and responsibility, so it’s vital they are equipped with the correct knowledge and tools to help combat cybercrime.

The evolving threat landscape continues to pose new threats; add that to the increase in staff working from home, keeping tabs on cyberattacks, and human error that’s becoming more common as a result of more sophisticated attacks, leaves your organisation vulnerable to potential attacks.

Watch our webinar from Tuesday 8th December with our Head of Cyber Consultancy, Mark Belgrove, Cyber Security Communications Consultant, Corinne Linksell, and Director of Threat Intelligence at Mimecast, Francis Gaffney, where they discussed new threats we should all be aware of, why educating your employees on cyber security is crucial with the increase in remote working, and different ways organisations should be approaching this with their remote workforce.

How to securely manage
your remote workforce and their access controls
Read webinar synopsis

Managing your remote workforce's access credentials has become more difficult than ever before. IT teams are now faced with a wealth of complexities as a result of remote working, especially when needing to provide and revoke access to critical applications, as well as remotely onboard new employees, whilst simultaneously prevent cyberattacks. So how can you take control and enable users to access key applications on any device, from anywhere?

Watch our webinar from Wednesday 18th November with our Head of Cyber Consultancy, Mark Belgrove, and technical expert, James Richmond, from one of our key Security partners, Okta, where they discussed the risks associated with disparate systems and access controls, ways in which you can simplify this management in a safe and effective way, and what this means for the future of remote working where secure remote access is concerned.

How can you keep track
of your organisation’s data with a remote work force?
Read webinar synopsis

When GDPR came into force, it was vital that all organisations tightened up on their data handling policies. The law has not only put a sharper focus on how organisations handle sensitive data, but as a result has highlighted many issues around compliance and risk across numerous industries. Fast forward 2 years and we now find ourselves in a position where more employees are working from home and for most, handling data on a daily basis, both inside and outside the corporate network. So, with a remote workforce, how can you keep track of your organisation’s data, ensure you comply with GDPR and protect against insider threats?

View our webinar from Thursday 12th November where our Head of Cyber Consultancy, Mark Belgrove, was joined by Sebastian Zipf, from one of our key Security partners Code42, to delve into the rise of risk to data as a result of our increased virtual collaboration, what this means from a GDPR perspective with regards to data and IP governance, and measures you can take to mitigate these risks.

Teams Calling:
Migrate and Monetise with Exponential-e
Read webinar synopsis

Over the last 6 months, we’ve all witnessed communication and collaboration be key enablers for organisations to adapt in the current climate, but who can you trust to continue this momentum and support you and your customers moving forwards?

As one of the first providers to deliver an integrated Office 365 Microsoft Teams experience, with global calling plans underpinned by a 24/7 x 365 NOC, we are positioned as the Service Provider of choice for Direct Routing for Microsoft Teams. Our modular, value-add approach means your customers will receive the best-of-breed solution fit for their evolving needs, whilst your business requirements are met through an efficient and profitable model, both now and in the future.

Watch our webinar from Thursday 22nd October to learn how our global reach, in-house product experts and hands on sales teams will enable your customers to seamlessly migrate to a Teams Calling platform with added functionality, and how you can benefit from becoming a Unified Communications Reseller with us. Our Head of Unified Communications, Mathew Godolphin, was joined by our UCC Specialist, Chad Rogers, and Tom Cribb from one of our key partners, Softcat, to discuss the benefits of our Teams Calling platform and why our expertise makes us your Service Provider of choice.

The next generation of Vulnerability Management
Read webinar synopsis

We’ve all been there before… a date is set for your next compliance audit and you only have a few days left to undertake a risk assessment of your entire IT estate. You call in a PEN tester who uncovers a problem… but wait… this has been an issue for months! How did nobody pick up on that?

The identification and management of vulnerabilities has evolved since its inception and this is now ingrained as an ongoing business process instead of a simple programme that runs in the background. Continuous Vulnerability Management is a key cornerstone for tackling security alerts in real-time, helping you to mitigate against risks and take a proactive stance on cybercrime.

In this webinar, our Head of Cyber Consultancy, Mark Belgrove, was joined by John Stock, Product Manager at Outpost24, one of our key Cyber Security partners, to discuss the different tools for bolstering your own security and how to apply them. They discussed:
  • The ever-evolving threat landscape and what it means for organisations
  • The key differences between a PEN test and a Vulnerability Management tools
  • Best practise scenarios to help you successfully implement the right strategy
  • Why all of this matters from a compliance and regulatory perspective
How to maintain endpoint visibility in an evolving threat landscape
Read webinar synopsis

As we move into the post-COVID “new normal”, organisations are harnessing Cloud environments to power a more agile approach to running their business operations. The benefits of this are clear, but what is not so clear is how the threat landscape is evolving, with cybercriminals breaching your defences in more sophisticated ways than ever before. So, with a greater number of employees working from home, and the utilisation of both Cloud and on-premise environments, how can you best protect your critical data and infrastructure?

On the 29th September, our Head of Cyber Consultancy, Mark Belgrove, joined by Cian Harrington from one of our key Cyber Security partners, AT&T Cyber Security, to give you their thoughts on:

  • How COVID-19 is causing the threat landscape to accelerate and evolve
  • The increasingly devious ways cybercriminals are looking to infiltrate your business
  • What defence considerations and strategies to think about with Hybrid Cloud environments
  • The importance of additional threat intelligence tools when it comes to avoiding breaches
Geopolitics and cyber-attacks: what you need to know
Read webinar synopsis

As we find ourselves amid a global pandemic with cyber-criminals taking full advantage of phishing and malware attacks, preying on users and the simple but lethal user errors, we mustn’t forget about other attacks which are also on the rise. Over the last few years, it’s clear that cyber-attacks are the preferred targeted tool used for financial and political gain. Geopolitical issues and nation-state cyber-attacks are on the rise, and it’s important to be aware they are indiscriminate. Not only are these attacks on the rise, but the attackers are becoming more refined and more skilled, meaning taking steps to protect your organisation has never been more important.

Watch our webinar from Wednesday 17th September where our Head of Cyber Consultancy, Mark Belgrove, and Nick Frost, Founder and Director of one of our key partners, CRMG, used their joint expertise of over 40 years to delve into these types of attacks, what they may look like, how you can spot them and how you can be proactive to protect your organisation.

How can Digital Transformation enhance the student experience?
Read webinar synopsis

Over the last 4 months, we’ve seen the adoption of many technologies be accelerated across all sectors, whether it’s been to communicate effectively whilst working remotely, or to access critical applications from any location. Technology and Education in the last 20 years have been crucial to many things; student success, computer literacy and accessibility of educational content. So, in the ever-changing landscape of Higher Education, how can IT be used effectively as a key transformation driver? How can Universities provide a platform for students and staff to collaborate without boundaries, whilst driving value, improving performance and reducing costs?

Watch our webinar from Wednesday 2nd September where our CIO, Jonathan Bridges discussed the new normal for universities and how this will impact the future of Education provision, as well as delving into ways Higher Education establishments can overcome these new market challenges of collaborating, operating and attracting students.

SD-HOME:
The Panel
Read webinar synopsis

A home-worker needs three key things to effectively work from home: the infrastructure, the relevant security measures and a strategy which supports them.

Our final SD-HOME webinar hosted a panel session with our Managing Director - Mukesh Bavisi, CFO - Henry Pepperall, Director of Engineering - Chris Christou, and Head of Cyber Consultancy - Mark Belgrove, where each of them answered questions around SD-HOME technology and discussing the ways in which it supports a distributed workforce, from a network, security, infrastructure and home-user perspective.

To learn more about how SD-HOME can be implemented into your organisation, how it extends your corporate security to the home and how this will have a more positive impact on your workforce, watch now.

SD-HOME:
A CIO’s Perspective
Read webinar synopsis

As a CIO, the top priority is delivering transformative strategies that manage disruptive situations and enable your remote workforce to stay productive whist adhering your company’s security policies. Our Managing Director, Mukesh Bavisi, takes you through our latest innovation, SD-HOME and discussed how the technology extends your corporate security network into your users’ home, how it will improve application performance and enhance user-experience safely and securely. To learn more about these benefits you can expect as a CIO, watch now.

SD-HOME:
A CFO’s Perspective
Read webinar synopsis

With a distributed workforce model here to stay, our CFO, Henry Pepperall, delved into the specific business outcomes of our innovative SD-HOME technology from a CFO’s perspective and what this will mean for employees in the new normal. Henry looked at the benefits of a cost-per-user model, compared to a cost-per-site model, and how you can justify the ROI of a home network investment as an organisation.

To learn more about the financial advantages and gain insight directly from a member of our Executive Team, watch now.

The Rise of the Distributed Workforce: Culture, Technology, Resilience
Read webinar synopsis

We are currently in a remote workforce 'limbo', with most people now working from home, but just as many companies trying to play ‘catch-up’ from a technological standpoint. In practice, remote working has been proven to be successful, with high levels of productivity and increased collaboration. But what is the longer-term play? Some organisations may well be considering getting rid of their physical offices, but is this solution really that simple? As it stands today, we do not have a final date for our return to the office, but with lockdown easing, now is the right time to be thinking about how you strategically approach your organisation’s business model, moving forward.

A distributed workforce is not a new concept, but it may well become the new normal and a key requirement for potential employees, thanks to its the flexibility and better work/life balance it offers. Organisations must therefore to be able to provide an environment that reflects this.

Watch our panel session from Tuesday 16th June, where our Managing Director, Mukesh Bavisi, aksed our technology experts what a distributed workforce means for the future of organisations and business as we know it today.

Chris Christou, Director of Engineering, touched on the importance of infrastructure, after which Afshin Attari, Director of Public Sector and Unified Communications discussed collaboration and cultural impacts. Finally, our Head of Cyber Consultancy, Mark Belgrove, and Chief Innovation Officer, Jonathan Bridges, explored operational efficiency, and how secure Cloud solutions can streamline and accelerate the transition to a distributed workforce.

Business & Operational Resilience
with Mukesh Bavisi, MD
Read webinar synopsis

Delivering key solutions and meeting customers’ needs is a priority for all. During the current pandemic, businesses have had to pivot and adapt in order to continue operating as close to BAU as possible to meet business objectives. So, how are businesses being resilient and stepping up to the plate during this time?

Our Managing Director, Mukesh Bavisi, gave a glimpse into how Exponential-e enabled its 3,000 customers, over 100,000 end users, and our own workforce to work from home within 48 hours; as well as an insight into how business and operational resilience is being achieved during COVID-19. Our Director of Engineering, Chris Christou, took us through some key solutions, customer stories, what it means to be a critical supplier supporting our frontline NHS and what we are doing to ensure all our customers continue to be supported during this unprecedented time.

How can I protect devices and data outside of my network?
Read webinar synopsis

The rise of “bring your own devices” (BYOD) has left organisations in an unfamiliar position where security is concerned, especially where data is stored on these devices, so how exactly do you ensure this data and the devices are kept secure? We discussed how to protect data at rest, in transit and in use as well as the steps you can take to ensure your devices are protected at all times, in or outside of your corporate network.

The Do’s and Don’ts
of UC Security
Read webinar synopsis

Recent events have meant the way we work has changed significantly with a huge increase in the demand for Unified Communications (UC) solutions, to enable people to communicate and work productively from home. However, the speed at which some UC platforms have been on-boarded have also given rise to security issues. So how can we tell what is secure and what we should be looking out for?

Our Head of UCC Solutions, Gareth Hayes, and Head of Cyber Consultancy, Mark Belgrove, discussed the vulnerabilities to be aware of when using a UC platform, a look at compliance considerations and where the new way of working leaves us with data breaches and impact on shadow IT, as well as a look at risks coming from UC devices.

Find out how Exponential-e has responded to the Coronavirus outbreak and kept our customers online

The Coronavirus outbreak has forced UK businesses at all levels, in all industries, to rapidly transform the way they work, and adapt their existing infrastructures to enable homeworking, in line with the latest government regulations. There’s no doubt this has been an unprecedented challenge, but Exponential-e are working with our customers every step of the way to put the right measures in place to ensure they can run as usual, and they are well-placed to handle any new challenges that arise. Click here to view some case studies in various sectors. 

Read our latest blogs

Here's why that's a good thing… "In the new contact centre, we're no longer reliant on hunt groups, and can onboard new services and new desks very easily, which has allowed for a much higher l...
At Exponential-e, we've been deeply involved in connectivity for a long time now. Ever since we first launched our self-owned network back in 2002, we've been committed to providing secure, high-perfo...
For a number of years now, Public Cloud solutions have been widely used by technology providers across our Channel Partner ecosystem. It's not hard to see why. The unparalleled flexibility, scalabilit...

Talk to one of our specialists

Fill out the form and we'll get back to you as soon as possible.

If you are looking for technical support, please contact our Support team on: 0845 230 6001

Connect with us

Take a look at our latest posts on Facebook. Keep uo to date with the latest news on Twitter. Subscribe to our YouTube Channel. Be part of the conversation, join us on Linkedin. Check out the Exponential-e Blog.

Talk to one of our specialists

Fill out the form and we'll get back to you as soon as possible.

If you are looking for technical support, please contact our Support team on: 0845 230 6001

100% Privacy Guaranteed.
View our privacy policy
.

100% Privacy Guaranteed.
View our privacy policy
.