skip to Main Content

Get In Touch


Phone: 281.897.5000
Toll Free: 800.246.4908
Fax: 281.897.5001
Address: Accudata Systems, Inc. 7906 N. Sam Houston Parkway West, Suite 300 Houston, TX 77064


Phone: 972.428.0700
Address: 1649 W. Frankford Road Suite 1060 Carrollton, TX 75007

Our Location

“The event was very good. Love the location. The the presentation was great. These guys are very knowledgeable and they seem like they can really help us as we move along with our cloud strategy.” – System Engineer for an engineering consulting company

Upcoming Events and Webinars 

Webinar | Overcome the Remote Access Challenge with Palo Alto Prisma

Date: Thursday, April 16

Time: 11:30 am

Organizations everywhere have had to shift to remote work rapidly. These changes have created new vectors for cybersecurity risk. Organizations need a way to enable digital business transformation and innovation securely. Our partner, Palo Alto Networks, believes that this requires a fundamentally different approach: both security and networking must be delivered in the cloud.

Accudata’s Cybersecurity Practice Manager, Charles Johnson, will talk about best practices for securing your cloud initiatives with Prisma Access, a Secure Access Service Edge (SASE) platform, by bringing together industry-leading security and SD-WAN capabilities in the cloud. During this webinar, you’ll learn:

  • How to get your business connected remotely while ensuring the safety of your users and protecting your business
  • Why it is essential to enable your business’s remote access solution to scale in these challenging times
  • How Palo Alto Networks can help overcome these challenges

Click here to Register for our Webinar


Webinar | Secure your Remote Workforce with Cisco Meraki

Date: Thursday, April 23

Time: 11:30 am

In these difficult times, businesses are coming to rely more and more heavily on work-from-home technologies to keep their operations running and their employees safe. But while many vendors offer viable options, not everyone can offer a solid work-from-home solution that combines the flexibility, the scalability, and most importantly, the security of Meraki. Furthermore, Accudata Systems has several Meraki experts who can help your business enable a remote workforce without scrambling for ways to secure it.

Join Accudata Solutions Architect Luis Grados and Cisco Meraki Consulting Systems Engineer, Cloud Networking, Gordon Hughes on April 23rd at 11:30 a.m to walk you through a demo of Meraki, highlighting features that could benefit your environment, such as:

  • Security features like AMP and Umbrella
  • Unparalleled visibility for network management
  • Central enrollment and management of network devices

Click here to Register for our Webinar

Webinar | Stressing about your service desk?

Date: Thursday, April 30

Time: 11:30 am

Business leaders are asking themselves “What should we be focusing on right now?” and “How quickly can we pivot to handle this current situation safely and efficiently?”

Managing and maintaining an IT service desk correctly requires a lot of time, effort, and money. However, many organizations have found that leveraging an outside team of IT professionals may be more beneficial than employing an in-house staff. In this 20-minute webinar on April 30, Accudata Systems’ managed services practice manager, Mark Holdsworth, breaks down current challenges that our customers are facing with their service desks, including:

  • Short- and long-term staffing
  • Efficiency to your business objectives
  • Unexpected operational costs

Click here to Register for our Webinar

Past Events and Webinars 

Webinar | Weathering the Storm without Breaking the Budget

The best defense against a targeted attack begins with the skills of your IT team, not your IT investment. Those crucial skills should also find support in tested procedures, validated standards, and effective governance. The purpose of an investment in any technology is to support or protect business processes or add value to them. Cybersecurity tooling is no different.

In this session, learn how to leverage your current IT investment to ensure your entire organization is resilient in the face of a cyberattack, and have confidence you can weather the storm without breaking the budget.

Click here to WATCH NOW

Webinar | Securing the Future with Palo Alto Cortex

Securing the future of your enterprise just got attainable with the launch of Palo Alto Cortex! Join Accudata’s Cybersecurity Practice Manager Charles Johnson as he walks through Palo Alto Cortex. Cortex is the industry’s only open and integrated AI-based continuous security platform that continually evolves to stop the most sophisticated threats.

Accudata Systems, in partnership with Palo Alto Networks, wants you to experience the future of cybersecurity today, leveraging Cortex Data Lake, Cortex XDR, and Demisto.

Click here to WATCH NOW

Webinar | From Idea to a Product in a Flash: the DevOps Culture

Competition is fierce, and every company needs a technological advantage to get ahead. No matter your industry, the user experience is key for your customers. However, meeting that demand is difficult with siloed development methodologies. Instead, adopting a DevOps culture can focus disparate resources on a single goal to move that new idea to production in a flash.

Attend this session to learn:
•How to build a successful DevOps culture
•How a DevOps culture can benefit your business
•What others have done
•How to get started

Click here to WATCH NOW

Webinar | Case Study: Real-World Breach Response

Accudata’s customer, a large ecommerce services provider, detected malware in an email sent to customers. However, their IT team discovered the malware was just the tip of the iceberg and began to dig deeper. Realizing the scope and magnitude of the breach, Accudata’s security and managed service teams were brought in to mitigate the attack and quickly began the remediation process.

In this 60-minute presentation, Chief Technology Officer Brian DiPaolo and Managed Services Practice Manager Mark Holdsworth detail the challenges of identifying and eliminating an active attacker in order to bring the business back online.

Click here to WATCH NOW

Live Event | Cybersecurity Heavy Hitters | Expert Panel

Join the “heavy hitters” of cybersecurity as they come together at Minute Maid Park to network and discuss the most important cloud security issues facing organizations today. The diverse panel will provide perspectives from the federal and business arenas to help you come away with tangible best practices to bolster your security posture as quickly as possible. Our expert panel includes:

Panel moderator: Patrick Vardeman, Chief Executive Officer, Accudata Systems

  • Samuel Sutton, Computer Scientist, FBI
  • Teresa Tonthat, CISO, Texas Children’s Hospital
  • Brian DiPaolo, Chief Technology Officer, Accudata Systems

Live Event | The Future of Work

The Citrix you’ve always known has evolved and moved beyond virtual apps and desktops—and it’s exciting! Curious about what’s new and how it will impact your organization?

We’ll cover:

  • The recent transformation we’ve seen from Citrix and what that means for your organization
  • How Citrix Workspace provides security, productivity, and control unlike other technologies
  • What the integration of Citrix Cloud and Cisco Hyperflex means for your organization

Webinar | Micro-segmentation is achievable. What’s stopping you?

Yes, micro-segmentation (uSeg) is complex and seems expensive. But, the barriers are finally breaking down. True uSeg is now achievable, and we’ll tell you how. In 30 minutes, we’ll define:

1. The scope of uSeg
2. uSeg models that really work
3. Requirements for successful implementation
4. Why this approach is defining modern cybersecurity strategies

Click here to WATCH NOW!

Webinar | Why IT Pros Want Digital Network Architecture 

Learn the basics of Cisco’s Digital Network Architecture (DNA) with Accudata Systems’ resident expert Alejandro Rodriguez. In 15 minutes we’ll define Cisco’s DNA, identify how your network can benefit, and we’ll showcase some use cases to help validate DNA’s business impact. Digital network technology is transforming the backbone of IT, so whether you’re a CIO or Network Engineer, you will find value in this content.

Click here to WATCH NOW!

Webinar | White-Hat Files February Edition

Welcome back to the White-Hat Files, Accudata’s monthly hacker-centric webinar series! For our first White-Hat File of 2019, we are looking into the Marriott breach.

Join us as Accudata Security Solutions Architect Russell Moore discusses how Marriott’s security was breached, how to reduce attacker dwell time, and the best practices that can keep your company’s name out of the news.

Click here to WATCH NOW!

Webinar | White-Hat Files 2018 Recap Edition

For 2018’s last White-Hat File, we’re focusing on the future. With the new year on the horizon, there’s never been a better time to update and fine-tune your security strategy.

In this 30-minute webinar, Accudata’s Risk and Compliance Professional Services Manager Ismael Alfaro will focus on how to monitor, implement, and iterate on IT security best practices.

Click here to WATCH NOW!

Expert Panel | Managing Risk and Compliance in a Secure Cloud

Securing cloud infrastructure is no simple task, and when lines of business adopt cloud applications for daily administration, the layers of complexity are compounded. In this 45-minute webcam panel, (ISC)², Splunk, and Accudata Systems will tackle some of the toughest questions on managing risk and compliance in the cloud, including:

– How organizations are fighting cloud sprawl
– Best practices for securing data in the cloud
– Cloud data-loss prevention
– How to apply a risk-based approach to reduce exposure in the cloud

– Bruce Beam, Director of Infrastructure and Security, (ISC)²
– Dimitri McKay, Security Architect, Splunk
– Tim Sills, Senior Risk Consultant, Accudata Systems

Click here to WATCH NOW!

Webinar | Cloud benefits – wait there’s more!

Cloud infrastructure’s residual benefits are significant! Namely, anyone who buys corporate IT knows licensing is a nightmare. Different pricing structures, unclear benefits, and complex licensing server setups are all too common. That’s why F5 is changing the game.

Join us for a 15-minute webinar led by F5’s Cloud Specialist Cindy Burns to learn why licensing isn’t what it used to be!

Click here to WATCH NOW!

Webinar | Why Accudata Relies on Citrix Cloud

Accudata Systems isn’t just a Citrix Platinum Partner—we rely on Citrix Cloud internally to provide the agility and depth of service we need to compete in today’s business landscape. Join Accudata’s director of technology, Vid Sista, for a 30-minute webinar to learn how Accudata uses Citrix Cloud to:

  • Protect sensitive data outside our corporate network.
  • Leverage Citrix’s Virtual Apps and Desktop environments to reduce resource needs.
  • Provide a consistent experience for all Accudata team members, regardless of location.

Click here to WATCH NOW!

Live Event | Is the Digital Transformation Just Hype?

Digital transformation isn’t only the latest IT buzzword—it’s a requirement to stay relevant. But what does it mean for your company? How can you effectively implement these changes in your organization? And how can you demonstrate value to the C-suite?

Join Xentaurs CTO Joe Onisick and Accudata Systems Director of Technology Solutions Vid Sista to learn:

  • What digital transformation means for your business
  • What IT needs to be successful
  • How your business can profit from the digital transformation

View our digital transformation webcam panel and additional resources.

Webinar | Drive Out the Complexity of Hybrid Cloud 

As the use of hybrid cloud increases, so does the struggle for enterprises to balance the opportunities against the challenges.

Join Accudata Systems and F5 for a 15-minute webinar that will teach you how to Drive Out the Complexity of Hybrid Cloud and deliver any app, anywhere, with confidence.

  • Simpler operations: Reduce complexity across hybrid and multi-cloud environments
  • Faster deployments: Scale deployments with increased agility
  • Safer security: Reduce risk with a consistent policy to maintain compliance and control
  • Consistent application services: Deploy any application, anywhere, with consistent application services and security F5

Click here to WATCH NOW!

Webinar | White-Hat Files August Edition 

Our fourth White-Hat File is once again from Anton Abaya, CISA, PCI QSA, Senior Consultant in Accudata’s Risk and Compliance practice.

In the July edition, Anton talked about his expertise with physical social engineering. In this 15-minute webinar, he’ll describe the most effective ways he uses online phishing techniques to break into corporate networks – and how you can ensure these attacks don’t work on your employees.

Click here to WATCH NOW!

Webinar | A Guide to Modern Business Continuity 

Disasters can take down your IT environment in a variety of ways, and if you’re not prepared you could lose thousands of dollars or more. Hurricanes, tornadoes, and fires can destroy your ability to work – and so can cyber-attacks. Take one example: if you were locked out of your network due to a security breach, do you know how you would pay your employees?

Join Accudata Systems Solution Architect Bryan Halda for this 30-minute webinar and learn why you should consider cyber attacks as disasters and how to recover from them.

Click here to WATCH NOW!

Webinar | Make Integration a Reality 

The best way to secure your organization from today’s most complex threats is integration. It’s key to building a security infrastructure that deters seasoned attackers. Yet, it can be a challenging, time-consuming initiative to take disparate technologies and build  an interoperable, world-class cyber security program.

Join Accudata Systems Security Practice Manager Alex Vasquez on August 7 in our 30-minute webinar, Why Integration Matters: How to Strengthen Your Security Posture. He’ll address complicated IT challenges and security automation strategies, and you’ll learn about the following:

  • Integrating vendors into one environment
  • Preventing unauthorized access to VPN services with multifactor authentication
  • Optimizing your security strategy with automated support workflows

Click here to WATCH NOW!

Webinar | CMDB with ServiceNow Discovery  

The Configuration Management Database (CMDB) conjures thoughts of cumbersome, inefficient manual entry. But what if you could make it easierautomated, cloud based – and proactively eliminate service outages?

Join our 15-minute webinar with ServiceNow Advisory Solutions Consultant Mike Bledsoe as he discusses common-use cases that prove the value in effective CMDB with ServiceNow’s Discovery solution. We’ve already started seeing how this is changing IT departments’ lives – there’s a reason why ServiceNow is Forbes #1 most innovative organization in the nation.

Click here to WATCH NOW!

Webinar | White-Hat Files | July Edition 

Our third White-Hat File comes from Anton Abaya, CISA, PCI QSA, Senior Consultant in Accudata’s Risk and Compliance practice.

In this 15-minute webinar, he’ll describe the most effective ways he’s used social engineering and phishing techniques to crack into companies, as well as the best practices you can implement to ensure these attacks don’t work on your business.

Click here to WATCH NOW!

White-Hat Files Webinar | June Edition 

Welcome to the White-Hat Files – a monthly series where the best white-hat hackers give you what you need to know about the cybersecurity threat landscape.

Our second White-Hat File comes from Professional Services Manager Ismael Alfaro, who holds CISSP, PCI QSA, and GIAC certifications.  In this 15-minute webinar, he’ll talk about how companies continue to fail year after year at securing the vulnerabilities our experts find – and how to avoid being one of them.

Click here to WATCH NOW!

Webinar | Learn to Fight Cloud Sprawl and Eliminate Service Outages 

Adding automation to your IT environment is one of the best ways to fight cloud sprawl and help eliminate service outages. In this 15-minute webinar, Accudata’s Director of Technology Solutions, Vid Sista, will explain the following:

  • How automation solutions enable proactive identification of service issues
  • Why cloud sprawl is a major threat to IT security – and how to stop it
  • How businesses can automate IT services

Click here to WATCH NOW!

Join us FORE Happy Hour @ CiscoLive! 

Going to CiscoLive! conference in Orlando in June?  So are we!

Join us for a PAR TEE at Topgolf Orlando following Monday’s session at CiscoLive! on June 11. You’ll enjoy dinner, drinks, Topgolf, and networking with your peers.  We will also raffle off items throughout the night: gift cards and golf packages to name a few.  You won’t want to miss it!

Accudata + Forcepoint Security Series | Risk-Adaptive Protection 

Join us on May 23 at 11:00 am CST to see how Forcepoint’s new Risk-Adaptive Protection solution with Dynamic Data Protection provides unparalleled security for your company’s critical data assets.  In our 30-minute webinar, you’ll learn:

  • How to harness the power of behavioral analytics to understand data interactions across users, machines and accounts
  • Why Risk-Adaptive Protection is the future of Data Loss Prevention
  • How to drive efficiencies with an intuitive solution that reduces alerts and overly restrictive polices

Click here to WATCH NOW! 

Accudata’s White-Hat Files | May 2018 Edition 

Welcome to the White-Hat Files – a monthly series where the best white hat hackers give you what you need to know about the threat landscape.

Our first White-Hat File comes from Josh Berry, who holds OSCP, CISSP, and GIAC certifications.  In this 15-minute webinar, he’ll give you the rundown on Accudata’s most-seen vulnerabilities, as well as best practices you can use to defeat attackers looking to dissect and destroy your business.

Click here to WATCH NOW

Event | Crawfish & Cybersecurity 

Join Accudata Systems on Wednesday, May 16, as we crack open some crawfish and explain how to combine security solutions into one holistic protection strategy!  Our Security Practice Manager Alex Vasquez will explain the following:

  • Why multiple security vendors give you the greatest overall security posture
  • How Okta and ServiceNow can integrate into current Palo Alto deployments
  • What managing a solution with multiple vendors looks like

Meet the May GDPR Deadline – Critical Steps to Prepare 

The May deadline for GDPR is approaching fast – and companies that don’t have a solution will face stiff fines.  Businesses need to understand the different categories of data, how data is stored, how it moves throughout an organization, and what technical measures to take to ensure they are compliant.

In this 30-minute webinar, our GDPR-certified expert Paul Kendall will explain:

  • Critical steps to achieve compliance
  • What companies need to protect
  • How to protect data that lives inside the EU and how to access that data outside the EU
  • Why Forcepoint’s GDPR solution is unique
  • What different data breaches mean for GDPR fine activity and how to minimize your chances of losing data

Click here to WATCH NOW!

Webinar | Top Ways to Revolutionize Your IT Department 

Ask yourself – could your company’s IT department handle a complex project in a short timeframe? Could it, for instance, integrate hundreds of new users and 35 branch offices in less than 30 days? 

That’s where Accudata Systems’ proven methodology comes in. During this quick 30-minute webinar, you’ll learn Accudata’s proven formula for success – and understand how IT departments can revolutionize the way they operate. We will cover:

  • Why IT departments struggle with large projects
  • How to prioritize IT integration tasks
  • Accudata’s five-step proven process to reduce project complexity
  • Review a customer example that includes integrating 35 new sites and 600+ users into an existing organization in less than 30 days

Ultimate Test Drive with Palo Alto 

Want to test drive Palo Alto Networks Traps Advanced Endpoint Protection?  Accudata Systems invites you to take the Ultimate Test Drive with Palo Alto Networks.  You will get hands-on experience with the Palo Alto Networks next-generation security platform.

Our complimentary three-hour technical workshop is dedicated to restoring visibility and control over the applications, users, and content traversing your network.

In this workshop, learn how:

  • Traps replaces legacy AV with multi-method prevention
  • Traps prevents vulnerability exploits
  • Traps prevents malware infections
  • The Palo Alto Networks security platform automatically converts threat intelligence into prevention

Live Webinar | Ask-A-QSA Webinar 

PCI 3.2 is now in effect.  If you’ve hit a roadblock with the new requirements, don’t worry – you are not alone! Join Accudata for our fourth Ask-A-QSA webinar and ask your toughest PCI questions.  Our experienced QSAs will give you their expert guidance, as well as some tips and tricks to make sure your compliance efforts are as efficient and effective as possible!

Missed our live webinars? Listen to our webcast here!
Session 1 webinar recording
Session 2 webinar recording

Event | Custom Tailored Shirts & Solutions 

Your business runs on data.  Whether it’s accessing confidential information, predicting customer purchasing trends, or analyzing which new products to develop, your data availability is paramount.

In our presentation, you will learn how Rubrik and Pure Storage work together to create a powerful data management platform that spans on-prem and cloud environments and scales seamlessly, reducing your footprint by 70% or more.

With Accudata, you can harness the power of flash storage, next-gen data protection, and the cloud.

Our lunch presentation will cover: 

  • How Accudata’s Tape to Cloud solution cost-effectively enables near-instant backups
  • How Rubrik’s application and data-recovery solutions combat the latest cyber threats
  • Why Pure Storage is the clear choice for next-generation data environments

Every attendee will be measured at the event to receive a custom tailored shirt from luxury brand J.Hilburn ($200 value)

Webinar | Ransomware’s Next Steps 

Promising huge profits from tiny efforts or investments, ransomware remains an exceptionally popular tool for both advanced and novice attackers alike.

Join Accudata Systems and Palo Alto for an informative webinar to learn how your organization can deploy Traps™ advanced endpoint protection to prevent ransomware attacks without sacrificing your teams productivity or resources.

In this quick, focused webinar, learn the latest intel on:

  • Ransomware trends and predictions
  • New attack vectors and payment schemes
  • How to break down attacks

We hope you can join our live webinar with Q&A on Tuesday, February 27th from 1:30 pm – 2:00 pm CST.

Missed our live webinar?  Listen to our webcast here!

Webinar | Ask-A-QSA 

PCI 3.2 is now in effect.  If you’ve hit a roadblock with the new requirements, don’t worry – you are not alone!  Join Accudata for our fourth Ask-A-QSA webinar and ask your toughest PCI questions.  Our experienced QSAs will give you their expert guidance, as well as some tips and tricks to make sure your compliance efforts are as efficient and effective as possible!

Accudata’s next Ask-A-QSA webinar will be held on March 8th.  For this 30-minute webinar, we’re offering two convenient times: 11:30 am and 1:30 pm CST.

Missed our live webinars? Listen to our webcast here!
Session 1 webinar recording
Session 2 webinar recording 

Webinar | PCI 3.2 | Ask a QSA

Time is almost up – PCI 3.2 deadline is less than a month away!  

Are you prepared, or are you worried about the new regulations and how they affect your business?  Don’t fret; we have answers! Join Accudata for our third Ask-a-QSA webinar, where we’ll give you the opportunity to get your PCI 3.2 questions answered and get expert advice on any problems you may be facing.

Accudata’s next Ask-a-QSA webinar will be live on January 23.  For this 30-minute webinar, we’re offering two convenient times: 11:30 am and 1:30 p.m. CST.

Missed our live webinars? Listen to our webcast here!
Session 1 webinar recording 
Session 2 webinar recording

FBI Cybersecurity Panel Luncheon with Accudata

Securing the cloud is no simple task. And, too often, it’s overlooked.   

We’re bringing together the experts for a panel discussion on the most important cloud security issues facing organizations today.  Our goal is for you to come away with tangible best practices to bolster your security posture as quickly as possible.

Our expert panel includes FBI Supervisory Special Agents, Alert Logic’s Chief Security Evangelist, and Accudata Directors of Technology and Strategic Services.

Panel topics include:

  • What are the most common vulnerabilities in AWS and Azure?
  • Provide real world examples of active threats being worked by the FBI
  • What can you expect if the FBI does have to investigate a breach within your own organization?
  • How to quickly remediate common cloud vulnerabilities

Check Point’s Starting Line-Up 

As threats evolve, businesses must find the means to continuously detect and prevent attacks and respond quickly to limit damages.  Enter Check Point’s dream team – stronger, faster, and more agile than the bad actors looking to tackle your organization.

Join our experts at the new, state-of-the-art Accudata Corporate Headquarters for a training camp with our MVP’s.  We’ll introduce and demo each of the key starters in Check Point’s line-up.  You’ll learn:

  • How SandBlast Mobile detects and blocks attacks before they become widespread
  • How SandBlast Agent for Endpoints protects against advanced malware, including stopping and reversing ransomware attacks
  • How Check Point Capsule’s seamless security protects you from threats wherever you go
  • How Check Point vSec for Microsoft Azure extends advanced threat prevention to protect Azure cloud environments from threats and provide network segmentation

Register soon!  Our roster is limited to 15 attendees.

Build Your Digital Workspace | Begin the Digital Transformation 

Having a unifiedcontextual, and secure digital workspace is vital to realizing the full benefits of the cloud and avoiding increased complexity and security challenges.

Join Accudata Systems and Citrix for our cloud-focused event on building your workspace of the future.  

You’ll learn:

  • How digital workspaces provide a unified pane of glass through which IT can configure, monitor, and manage your entire technology infrastructure
  • How machine learning through Citrix Cloud can contextualize each worker’s patterns and expectations so they can get work done securely, wherever they are
  • How a software-defined perimeter grants secure access and full visibility across the network and user ecosystem
  • How Citrix Cloud simplifies management of Citrix technologies, unifies virtual apps, desktops, data, device management, and networking on any cloud or infrastructure and secure the digital workspace

Every attendee will have a chance to win a JBL Charge Portable Bluetooth Speaker!

Hyperconverged | The Future of Data Centers | Dine & Dash Event 

Join Accudata for a Dine & Dash event at Maggiano’s to learn how hyperconverged infrastructure can help you strengthen the business – and taken home food for four people!

Experts from Thales (from Vormetric) will discuss how hyperconverged infrastructure integrates servers, storage, application delivery, and security to streamline the deployment, management, and scaling of data center resources.

You”ll learn:

  • How Big Data and IoT influence business operations
  • Updates on the state of the data security market
  • Nutanix + Thales = Big Data’s encryption and key management story
  • F5 + Thales + enhanced SSL security

Accudata’s Dine & Dash event is a grab-and-go – stay for appetizers and expert discussion, and then leave with dinner for four.

Also, everyone who attends will be entered to win a Nest Cam Security Camera!

Combatting Insider Threats| Upcoming Lunch Seminar – San Antonio 

Protecting the human point where all breaches occur is the one constant when it comes to security.  What are you doing to proactively protect your data from a malicious, compromised, or accidental user?

Join Accudata Systems and Forcepoint’s Robert Slocum, Global Director of Data Security and Insider Threats, for Combatting Insider Threats as we demonstrate:

  • The tools and best practices that can be applied to prevent and remediate the threat
  • How organizations are preparing for insider threats
  • Where to focus efforts to protect your critical data and intellectual property

Every attendee will have a chance to win a Nest Security Camera Package ($500 value)!

What’s New with PCI 3.2 

The PCI council announced revision 3.2 last year – and there are big changes for merchants and service providers that are required for compliance in 2018.  As we move into 2017, it’s time to start seriously considering how to plan your new compliance strategy.  During our live webinar, you’ll get the rundown of how the most notable PCI 3.2 changes will impact your business, as well as a live Q&A with our PCI QSAs.

You’ll learn:

  • Specific PCI 3.2 changes that will impact both merchants and service providers
  • The level of effort required to remediate each change and maintain compliance
  • How changes will impact your people, processes, and technology
  • How to set a realistic timeline to achieve compliance prior to 2018

Missed our live webinar?  Listen to our webcast here! 

Hyperconverged: The Next-Gen Data Center  | Upcoming Lunch Seminar 

The future of data center technology has arrived.  Hyperconverged solutions take software-defined virtualization to the next level.

Join Accudata Systems for a delicious lunch and an introduction to hyperconverged data center architecture.  Accudata’s data center experts will focus on:

  • How hyperconverged technologies uniquely scale to meet deman on a pay-as-you-go model
  • The difference between managing a hyperconverged solution and existing data center environments
  • Use cases for when it makes sense to leverage hyperconverged resource pooling
  • Integrating a hyperconverged solution into your environment
  • Providing vendor aqnostic analysis on the differences between hyperconverged solutions from Cisco, Nutanix, Simplivity, and VCE

Everyone who attends will be entered to win a pair of Bose Bluetooth Headphones!


The Evolution & Cyber Threat Landscape of Ransomware | Live Webinar with Q&A 

Join Alert Logic and Accudata Systems for an in-depth webinar focused on ransomware and the evolution of the cyber threat landscape on Wednesday, September 21st at 11:00 am CST.

Our webinar will include:

  • Understanding the cybersecurity risks across cloud, hybrid and on-prem environments
  • A deeper view of bad actor groups, who they are, their focus, and reasons behind the campaigns
  • Understand the tools, tactics and techniques used to gain access to vulnerable infrastructures
  • Understanding ransomware, how it began, how it evolved and how it proliferates today
  • Effective strategies for detecting ransomware and understanding organizational security responsibilities in the “kill chain”
  • Live Q&A

The Future is Bright for Unified Communications |  Lunch Seminar

Join Accudata Systems and Cisco to learn how to customize your UC solution with innovative new technologies.  Meet organizational goals and increase collaboration through easy-to-use, feature-rich corporate communication systems and integrated desktop applications, deployed as an on-prem, cloud or hybrid solution.

Cisco collaboration experts will discuss:

  • The newest on-prem technologies, including voice, video, and collaboration
  • Cisco Hosted Collaboration (HCS) and Spark Call
  • Hybrid cloud solutions, including Collaboration Meeting Rooms (CMR) and Spark Call Integration
  • How to integrate and leverage WebEx and Cisco Spark
  • Live Demos

All attendees will have a chance to win a $350 American Express Gift Card!  Space is limited, so register today!

Whiteboard + Lunch | Smart Cloud Design 

For years now, the cloud has been misunderstood.  Rarely is it completely defined, with each core component explained and linked to the next.  Until now.  Accudata has built a consumable, holistic approach to the cloud.  In this dynamic lunch and whiteboard session, Smart Cloud Design, Accudata cloud expert Thanh Nguyen will discuss:

  • The six core components of the cloud
  • How a holistic cloud strategy eases operational strain
  • Optimizing your strategy by integrating both security and integrating multiple cloud solutions into unified management platform
  • Use cases describing where to start and how to effectively integrate multiple layers of the cloud’s six core components

All attendees will have a chance to win an Oculus Rift!


Upcoming Webinar | Give Your Business a New Voice 

Deploying, configuring, and managing a traditional VoIP system is cumbersome.  Leave tradition behind and empower your business with the new voice in communication.

Join Accudata Systems and Cisco Meraki for an in-depth webinar focused on the new cloud-managed Meraki VoIP solution.  Communications Product Specialist Josh Tobin will discuss:

  • The business benefits of integrating your VoIP solution with your network
  • How to quickly onboard a new phone
  • A phone so easy to use your end users will require no training or hands-on instruction

All attendees will have a chance to win a Yeti Tundra 35 Cooler!

Webinar | Can Your Data Recover from a Modern Disaster? 

Your business needs to know how to respond to every type of disaster.  Ransomware attacks and other incidents need a modern response plan – otherwise, you’ll have to follow the FBI’s recommendation and “just pay up.”

Join Accudata Systems experts Mark MacArthur and Joseph Huff for an in-depth webinar focused on business continuity plans and data recovery.

Our webinar will include:

  • What makes an effective business continuity plan
  • Layered data protection strategies
  • Why your business continuity plan needs a data protection strategy
  • The methodology behind effective data recovery


Webinar | Getting Clear on Cloud Security   

For the final installment of our Threat Defense Webinar Series, we’re looking at next generation security strategies to protect the ever-evolving cloud environment. It’s no secret that the cloud revolution has taken hold, placing new challenges in front of IT leadership. In fact, new General Data Protection Regulations (GDPR) and Privacy Shield Regulations are starting to impose heavy fines for cloud related missteps.

During this informative webinar you’ll learn:

  • Why data protection is key to keeping your business afloat
  • How to determine if a cloud platform is truly trustworthy
  • Which best practices and technologies can keep your cloud applications secure any time, any place


Executive Cybersecurity Roundtable – Houston   

Join Accudata Systems for our executive roundtable dinner at The Capital Grille – City Centre on Tuesday, May 17th. The discussion will focus on building and maintaining a security breach strategy.

Leading the roundtable discussions will be:

  • Sanjeev Sah, CISO, Texas Children’s Hospital 
  • Adam Bosnian, Executive Vice President, CyberArk
  • Jeff Man, Chief Security Strategist, Tenable

Seating is limited to 20 registrants, and all attendees will be entered to win an exotic car rental – choices include a Bentley, Maserati, and more! 


Executive Cybersecurity Roundtable – Dallas   

Join Accudata Systems for our executive roundtable dinner at Chamberlain’s Steak and Chop House on Wednesday, May 18th. The discussion will focus on building and maintaining a security breach strategy.

Leading the roundtable discussions will be:

  • Harold Gonzalez, CISO and Senior Vice President, Xome
  • Adam Bosnian, Executive Vice President, CyberArk
  • Jeff Man, Chief Security Strategist, Tenable

Seating is limited to 20 registrants, and all attendees will be entered to win an exotic car rental – choices include a Bentley, Maserati, and more! 

If you are interested in attending our Executive Roundtable, please email


What’s Your Next Move?  The Cloud.  

Ease the uncertainty and anxiety that can come with a migration to the cloud by taking time to learn the ins and outs of seamless migrations. Things like picking providers, ensuring strong data encryption, and negotiating SLAs shouldn’t keep you from innovating for your business.

Join Accudata Systems at our lunch seminar as we outline how to plan and execute a cloud environment — and how to manage that environment once it’s in place. Our proven methodology has helped companies:

  • Map out data flow and interdependencies
  • Identify and evaluate business-critical assets
  • Forecast and price out different cloud providers
  • Ensure data security during and after cloud migrations
  • Learn the steps to plan, implement, and manage a cloud environment


PCI QSA Webinar; How to Overcome the Top 5 PCI Challenges

For more than a decade, Accudata has been a certified PCI QSA company, and we see the compliance challenges organizations face firsthand.  During a brief, 20-minute presentation, PCI QSA Tim Sills will highlight these challenges and discuss how we work with customers to help achieve compliance.

Following the presentation, Mr. Sills will be joined for a candid open forum by Anton Abaya, PCI QSA and audit expert.  You’ll have the opportunity to ask questions and learn what your peers are experiencing.


Cloud Security Best Practices for 2016 Lunch & Learn 

IT spending on cloud solutions is at an all-time high – and security concerns are rising in tandem.  Have you taken time to evaluate your cloud security strategy?  Do you have a provider exit plan?  Have you identified who owns the encryption keys for cloud-based data?  These are just a few of the considerations IT teams must evaluate when facilitating their company’s move to the cloud.

Join Accudata’s Security Practice Director and resident cloud expert, Vid Sista, for our Cloud Security lunch seminar.  Mr. Sista will help you:

  • Identify best practices from the leading cloud security authorities
  • Understand the specific skills necessary to build your strategy
  • Understand the importance of interoperability, encryption, and portability
  • Evaluate the best tools on the market to secure your cloud assets
Back To Top