<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Webinars Archives - GCC HELLAS - ICT DISTRIBUTION</title>
	<atom:link href="https://gcc.net.gr/category/webinars/feed/" rel="self" type="application/rss+xml" />
	<link>https://gcc.net.gr/category/webinars/</link>
	<description></description>
	<lastBuildDate>Thu, 26 Feb 2026 09:06:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://gcc.net.gr/wp-content/uploads/2025/04/android-icon-192x192-1-150x150.png</url>
	<title>Webinars Archives - GCC HELLAS - ICT DISTRIBUTION</title>
	<link>https://gcc.net.gr/category/webinars/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Deploying Security Strategies for the Modern Network</title>
		<link>https://gcc.net.gr/webinars/deploying-security-strategies-for-the-modern-network/</link>
		
		<dc:creator><![CDATA[gcc]]></dc:creator>
		<pubDate>Thu, 26 Feb 2026 09:06:32 +0000</pubDate>
				<category><![CDATA[Business Cyber Security]]></category>
		<category><![CDATA[Networking Infrastructure]]></category>
		<category><![CDATA[Software-Defined Segmentation]]></category>
		<category><![CDATA[Unified IT Environments]]></category>
		<category><![CDATA[Webinars]]></category>
		<guid isPermaLink="false">https://gcc.net.gr/?p=2028</guid>

					<description><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/deploying-security-strategies-for-the-modern-network/">Deploying Security Strategies for the Modern Network</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/deploying-security-strategies-for-the-modern-network/">Deploying Security Strategies for the Modern Network</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protecting &#038; Accelerating User Web Access</title>
		<link>https://gcc.net.gr/webinars/protecting-accelerating-user-web-access/</link>
		
		<dc:creator><![CDATA[gcc]]></dc:creator>
		<pubDate>Tue, 23 Dec 2025 08:26:18 +0000</pubDate>
				<category><![CDATA[Business Cyber Security]]></category>
		<category><![CDATA[Networking Infrastructure]]></category>
		<category><![CDATA[Software-Defined Segmentation]]></category>
		<category><![CDATA[Unified IT Environments]]></category>
		<category><![CDATA[Webinars]]></category>
		<guid isPermaLink="false">https://gcc.net.gr/?p=1918</guid>

					<description><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/protecting-accelerating-user-web-access/">Protecting &#038; Accelerating User Web Access</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/protecting-accelerating-user-web-access/">Protecting &#038; Accelerating User Web Access</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Application Delivery Without Limits</title>
		<link>https://gcc.net.gr/webinars/application-delivery-without-limits/</link>
		
		<dc:creator><![CDATA[gcc]]></dc:creator>
		<pubDate>Thu, 20 Nov 2025 11:50:03 +0000</pubDate>
				<category><![CDATA[Business Cyber Security]]></category>
		<category><![CDATA[Networking Infrastructure]]></category>
		<category><![CDATA[Software-Defined Segmentation]]></category>
		<category><![CDATA[Unified IT Environments]]></category>
		<category><![CDATA[Webinars]]></category>
		<guid isPermaLink="false">https://gcc.net.gr/?p=1895</guid>

					<description><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/application-delivery-without-limits/">Application Delivery Without Limits</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/application-delivery-without-limits/">Application Delivery Without Limits</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The evolution of Access to Applications with Fortinet ZTNA</title>
		<link>https://gcc.net.gr/webinars/the-evolution-of-access-to-applications-with-fortinet-ztna/</link>
		
		<dc:creator><![CDATA[gcc]]></dc:creator>
		<pubDate>Wed, 23 Jul 2025 13:32:12 +0000</pubDate>
				<category><![CDATA[Business Cyber Security]]></category>
		<category><![CDATA[Networking Infrastructure]]></category>
		<category><![CDATA[Software-Defined Segmentation]]></category>
		<category><![CDATA[Unified IT Environments]]></category>
		<category><![CDATA[Webinars]]></category>
		<guid isPermaLink="false">https://gcc.net.gr/?p=1745</guid>

					<description><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/the-evolution-of-access-to-applications-with-fortinet-ztna/">The evolution of Access to Applications with Fortinet ZTNA</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/the-evolution-of-access-to-applications-with-fortinet-ztna/">The evolution of Access to Applications with Fortinet ZTNA</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Performace and Security Testing</title>
		<link>https://gcc.net.gr/webinars/performace-and-security-testing/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 10 Jun 2025 12:37:05 +0000</pubDate>
				<category><![CDATA[Business Cyber Security]]></category>
		<category><![CDATA[Networking Infrastructure]]></category>
		<category><![CDATA[Software-Defined Segmentation]]></category>
		<category><![CDATA[Unified IT Environments]]></category>
		<category><![CDATA[Webinars]]></category>
		<guid isPermaLink="false">https://gcc.net.gr/?p=845</guid>

					<description><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/performace-and-security-testing/">Performace and Security Testing</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/performace-and-security-testing/">Performace and Security Testing</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Risk Exposure Management</title>
		<link>https://gcc.net.gr/webinars/meeting-todays-modern-endpoint-security-requirements-fortiedr-3/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 25 Mar 2025 14:20:42 +0000</pubDate>
				<category><![CDATA[Business Cyber Security]]></category>
		<category><![CDATA[Networking Infrastructure]]></category>
		<category><![CDATA[Software-Defined Segmentation]]></category>
		<category><![CDATA[Unified IT Environments]]></category>
		<category><![CDATA[Webinars]]></category>
		<guid isPermaLink="false">https://gcc.net.gr/?p=500</guid>

					<description><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/meeting-todays-modern-endpoint-security-requirements-fortiedr-3/">Cyber Risk Exposure Management</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/meeting-todays-modern-endpoint-security-requirements-fortiedr-3/">Cyber Risk Exposure Management</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Meeting Today’s Modern Endpoint Security Requirements &#124; FortiEDR</title>
		<link>https://gcc.net.gr/webinars/meeting-todays-modern-endpoint-security-requirements-fortiedr/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 25 Mar 2025 14:19:04 +0000</pubDate>
				<category><![CDATA[Business Cyber Security]]></category>
		<category><![CDATA[Networking Infrastructure]]></category>
		<category><![CDATA[Software-Defined Segmentation]]></category>
		<category><![CDATA[Unified IT Environments]]></category>
		<category><![CDATA[Webinars]]></category>
		<guid isPermaLink="false">https://gcc.net.gr/?p=490</guid>

					<description><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/meeting-todays-modern-endpoint-security-requirements-fortiedr/">Meeting Today’s Modern Endpoint Security Requirements | FortiEDR</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/meeting-todays-modern-endpoint-security-requirements-fortiedr/">Meeting Today’s Modern Endpoint Security Requirements | FortiEDR</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 Steps to Secure Cloud Migration</title>
		<link>https://gcc.net.gr/webinars/5-steps-to-secure-cloud-migration/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 25 Mar 2025 14:18:41 +0000</pubDate>
				<category><![CDATA[Business Cyber Security]]></category>
		<category><![CDATA[Networking Infrastructure]]></category>
		<category><![CDATA[Software-Defined Segmentation]]></category>
		<category><![CDATA[Unified IT Environments]]></category>
		<category><![CDATA[Webinars]]></category>
		<guid isPermaLink="false">https://gcc.net.gr/?p=489</guid>

					<description><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/5-steps-to-secure-cloud-migration/">5 Steps to Secure Cloud Migration</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/5-steps-to-secure-cloud-migration/">5 Steps to Secure Cloud Migration</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why choose software based segmentation for security?</title>
		<link>https://gcc.net.gr/webinars/why-choose-software-based-segmentation-for-security-2/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 25 Mar 2025 14:18:30 +0000</pubDate>
				<category><![CDATA[Business Cyber Security]]></category>
		<category><![CDATA[Networking Infrastructure]]></category>
		<category><![CDATA[Software-Defined Segmentation]]></category>
		<category><![CDATA[Unified IT Environments]]></category>
		<category><![CDATA[Webinars]]></category>
		<guid isPermaLink="false">https://gcc.net.gr/?p=488</guid>

					<description><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/why-choose-software-based-segmentation-for-security-2/">Why choose software based segmentation for security?</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/why-choose-software-based-segmentation-for-security-2/">Why choose software based segmentation for security?</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why choose software based segmentation for security?</title>
		<link>https://gcc.net.gr/webinars/why-choose-software-based-segmentation-for-security/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 25 Mar 2025 14:18:18 +0000</pubDate>
				<category><![CDATA[Business Cyber Security]]></category>
		<category><![CDATA[Networking Infrastructure]]></category>
		<category><![CDATA[Software-Defined Segmentation]]></category>
		<category><![CDATA[Unified IT Environments]]></category>
		<category><![CDATA[Webinars]]></category>
		<guid isPermaLink="false">https://gcc.net.gr/?p=487</guid>

					<description><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/why-choose-software-based-segmentation-for-security/">Why choose software based segmentation for security?</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://gcc.net.gr/webinars/why-choose-software-based-segmentation-for-security/">Why choose software based segmentation for security?</a> appeared first on <a href="https://gcc.net.gr">GCC HELLAS - ICT DISTRIBUTION</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
