Powerful insights from HTG webinars
These webinars represent the best technology expertise at HTG, distilled into succinct, insightful discussions. Come prepared with questions for our team - we love a challenge.
Get access to live events and on-demand webinars below.
Come along to our next webinar
We don't have any webinars currently scheduled
Keep an eye on this page for news on upcoming events. And, check out our previous webinars below, which we've recorded.
Get in touch with HTG
If you can't yet enough of our faces, then why not speak to our team directly for an in-depth assessment? We deliver expert Modern Workplace and Virtual Desktop services.
Access our recorded webinars
The top security issues we see today and how to fix them
This webinar is hosted by HTG's in-house experts, Chief Technology Officer, Kevin Howell, and Chief Innovation Officer, Alan McBurney. We will be discussing modern workplace security issues such as phishing attacks, insider threats and compliance while remote working. Based on a wealth of experience, our security tips and no-nonsense best practices will help businesses improve the security of their IT systems.
Everything you need to know about Microsoft Sentinel
Find out about how Microsoft Sentinel collects data from all your applications, devices, and cloud services to quickly spot suspicious behaviour and eliminate threats. But to realise this, you need the right people with the time to configure, manage and tune the technology. Plus, they must have the expertise to understand what the alerts mean and how to build on the intelligence and insights gained.
HTG celebrates achieving Microsoft Advanced Specialisation
The Identity and Access Management Advanced Specialisation showcases proven, verifiable expertise in deploying ...
Cloud experts HTG on expansion trail to achieve £30M turnover
Secure cloud expert Howell Technology Group (HTG) is on the expansion trail, doubling the size of its premises.
Why endpoint security is important for your business
In this article, we will discuss the importance of endpoint security, how it works and how it compares to a traditional ...