What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here


To register for multiple webcasts, please check the box beside the item and click the submit button.


Windows 10 as a Service, Keeping Up with the Changing Landscape

In recent years, Microsoft has changed its strategy and its business model. Microsoft, the world’s largest software company, is no longer interested in selling software. What does that mean for IT and how can the enterprise adapt to the changing IT landscape? Find out in this webcast.

Date: 07/25/2017

Time: 11:00 am

Hyperconvergence and Managing the Modern Data Center: More Workloads, Less Work

The need for IT to provide always-on, ever-scalable delivery of data and applications brings with it an assumption of an equal amount of additional work as the business grows and needs change. Traditional data center models simply can’t keep up with business demands without heavily taxing IT. So, how can organizations ensure manageability as the modern data center grows? Learn more now.

Date: 07/19/2017

Time: 11:00 AM

Enterprise Applications: Going From Workload Worry to Predictable Performance

It’s no secret your tier-1 applications need to run efficiently and be highly available. But as your business grows and changes the requirements put on data center infrastructure, scaling application performance and operational efficiency – all while keeping management simplified – is a really tall order. What IT needs is predictability, regardless of how the business – and the data center – change over time. So, how do you get predictable performance out of your Enterprise Applications? Learn more now.

Date: 07/11/2017

Time: 11:00 AM

Improving End-User Computing in a Data Center World: Protection, Performance and Productivity

Users just want to have a consistent and functional working environment. But, as business needs change, and the focus shifts to anytime, anywhere, always-on access to data, and applications, IT needs to go beyond traditional VDI solutions and find a means to provide users with the working environment they need, while doing so using a secure, scalable, and yet simplified means to deliver it. So, how do you give users protection, performance and productivity without increasing the burden on IT? Learn more now.

Date: 07/25/2017

Time: 11:00 AM

Ensuring Rock Solid Unified Endpoint Management

Join Microsoft MVP Nathan O’Bryan to learn how you can implement unified endpoint management (UEM) strategies that will allow you to manage all the devices connecting to your infrastructure.

Date: 07/26/2017

Time: 11:00 am

How To Social Engineer Your End Users Into More Secure Behavior

In spite of all the spectacular news stories about advanced persistent threats and targeted hacks from nation-states, the most common security challenge facing enterprises today continues to be social engineering. In this webinar, you’ll learn the strategies and techniques that social engineers are finding success with. You’ll also learn how to implement an effective security awareness program that focuses on preventing socially engineered attacks and how to validate the results of your training with simulate phishing campaigns. Register now!

Date: 06/29/2017

Time: 11:00 AM

Learn How To Protect Against Ransomware

One of the largest threats to IT departments today is ransomware. Join us for this Redmond webcast to learn how to protect your organization against these attacks. Microsoft MVP Nathan O'Bryan will discuss actionable tips you can use to ensure your data is protected from ransomware attacks. Read on.

Date: 06/27/2017

Time: 8:00 am

Beyond the Basics: Migrating to Office 365 with Advanced Tools

In this webcast, Microsoft MVP Mike Crowley will describe the tools and techniques used to tackle these types of projects. Join Mike and Quest Software's Tri Nguyen as they share their deep knowledge and experiences off the beaten path of the typical email migration. Learn more.

Date: 06/27/2017

Time: 11:00 am

NEED FOR SPEED: Data Recovery in a Non-Stop World

This presentation by Jon Toigo, veteran DR planner and author of five books on disaster recovery and data protection, will provide a level set on the state of data recovery. Toigo will be joined by Quest to learn more about their leading edge data protection and rapid recovery solutions. Learn more.

Date: 06/29/2017

Time: 11:00 am

Take Me Out of the Loop: Getting Rid of AD and Group Management

Remember how, when you were applying for your first IT job, you thought, “wow, I can’t wait to spend all day updating AD information and managing group memberships!” No? Microsoft MVP Don Jones is right there with you, and wonders why and how IT got saddled with this ridiculous, distinctly non-technical job task. Better yet, he’ll outline key capabilities you can implement (or acquire) to take yourself out of that rat race forever. Sign up now.

Date: 06/29/2017

Time: 11:00 am

Live Webcast - VMware Backup: Best Practices and Strategies

Join Michael White and learn about the realities and challenges of the most widely used VMware backup strategies, the differences between image-based and file-based backups for VMware VMs and VMware backup best practices. Learn more.

Date: 06/28/2017

Time: 11:00 am

On Demand

Solving Your Top Database Security Challenges

Did you know that by 2020 1.7 megabytes of new information will be created every second for every human being on the planet?But with that volume of data comes great risk - both personal and organizational. Therefore, it is essential to understand the variety of data threats and solutions available. During this session, we will break down database security essentials and the various features and functionalities available to us in Microsoft SQL Server 2016 and how they can be employed to better secure your data and help you create a complete and proactive data security strategy.

4 Ways Identity Can Improve Your Security Posture

Join this webinar to learn why identity must not simply be a "first step" but the foundation for the future of security as well as 4 ways to leverage identity to enhance your security posture. Learn more.

Reimagining Legacy Information Management and Protection

See how a next-generation scale-out storage solution seamlessly scales from a few TBs to PBs with zero configuration, delivers an all-flash storage solution for virtual environments and high performing backup/recovery at less than $.40/GB, and much more.

Achieving Availability in an Always-On Data Center

Join Nick Cavalancia, industry expert and founder of Techvangelism, and experts from Cisco and Veeam as they discuss the availability challenge in the modern data center, how hyperconvergence can help to achieve availability, and why backups play an equally critical role in maintaining an available data center. Learn more.

Catch It All: Adopt Office 365 With Modern Data Protection and Compliance Measures

Across organizations, Office 365 is accelerating the digital transformation. This transformation also includes many other popular SaaS applications. This means new ways of communication and collaboration. As employees feel empowered to achieve more, what new considerations does this means for you to ensure security, protect data, and mitigate compliance risk? Learn more and sign up now!

GDPR Compliance Planning for Microsoft Environments

This webinar looks at the General Data Protection Regulation (GDPR) and its impact on Microsoft environments. Specifically, we look at how GDPR along with other future compliance directives impact Microsoft cloud, on premise and hybrid environments, as well as what you can do to be prepared before the deadline.

IT and Business Benefits of Cloud Faxing

Join us for this webinar to learn how you can deploy faxing for your entire organization — with features like real-time status updates and 24/7 availability — quickly, easily and cost-effectively. Plus, find out how cloud services lay the foundation for data capture, workflow tools, postal mail automation and business process improvements that go far beyond fax. Learn more.

Migrate and Protect Workloads in Azure - What You Need to Know

Join Microsoft Cloud & Datacenter MVP Tim Warner and Zerto for an informal conversation on how you can use Azure as a disaster recovery site. Questions from the audience are welcome! Learn more.

Tales from the Trenches: How AD Groups Got Us Hacked

Join Microsoft MVP Don Jones for a harrowing, true-life tale of terror. Don shares the anonymized details of a colleague whose organization was hacked, costing them over a quarter million in damages and mitigations, all traceable to a specific problem with their AD group management. Learn more.

How to Audit Office 365 and Exchange Online Privileged Operations and Mailbox Access

Moving Exchange to the cloud? It’s time to consider your compliance and security responsibilities. Watch this on-demand webcast for ways to keep your complex cloud or hybrid environment secure and in compliance. Watch now!

Office 365 Security - How to Secure Access Control in Office 365 Environments

Moving to the cloud empowers your business – but it may weaken security. In this on-demand webast, get best practices for minimizing the risks of moving to the cloud. Watch now!

Warned and Armed: How to Shield Your IT Infrastructure from Ransomware

Join our new webinar and learn how to detect the ransomware on time and stop it from spreading through your network!

How to Build a Hybrid-Cloud Edge Architecture

Learn how to easily and securely enable application deployment in hybrid cloud environments and how to make your infrastructure cloud ready. Find out how you can become a cloud enabler. Register now.

Predicting the Future of Endpoint Management in a Mobile World

Join Microsoft MVP Timothy Warner and KACE Sales Engineer Nick Morea to get a feel for looming changes in the endpoint management landscape over the next 6 months to 5 years and learn about imminent trends, risks and opportunities. Learn more.

Address GDPR Requirements with Netwrix Auditor

Watch this webinar recording, which is all about the GDPR and practical tips on how Netwrix Auditor can help you address its requirements. View now!

Get Ahead of Your Windows 10 Migration

In this webinar, you’ll get practical advice on how to reduce complexity, ease migration challenges, and migrate users with minimal interruption during a Windows 10 migration. Learn more.

How to Rapidly Deploy Active Directory

Join Greg Shields, author evangelist with Pluralsight, in this exploration into rapid deployment for Active Directory. Greg will show you two easy-to-generate scripts that use PowerShell Desired State Configuration to swiftly hydrate a test-ready Active Directory into existence. Learn more.

The Rise of Office 365 and Cloud Apps: Expanding Protection to All End-User Data

Join Dan Canning, of Microsoft, who’ll share details on Office 365’s benefits, adoption rate, and enterprise use cases; and Seyi Verma, from Druva, on the need to protect, manage, centralized and backup fragmented information across cloud apps and services. Read on.

Tips, Best Practices and Pitfalls for AD Group Management

Join MVP and author Don Jones for a concise look at some of the best practices and tips the industry has developed in a decade-plus of AD group management…and to learn about the group management pitfalls that still plague so many companies. Learn more.

How Skype for Business and Enterprise Mobility are Redefining Workplace Collaboration

Join Brent Kelly, Ph.D., Principal Analyst at KelCor for an illustration on how the integration of enterprise mobility solutions with Microsoft Skype for Business can improve employee collaboration and productivity. Read on.

Too Many Threats. Not Enough Defenses.

This webcast takes a strategic approach to IT threats from spear phishing and fraud to targeted attacks to insider threats. You’ll learn how to evaluate your approach to protect your company.

Defeating the Encrypted Threat!

Once you have seen what the bad guys have been up to today, you will be exposed to a crash course of security policy management and network security architecture design that will help prevent the breach of tomorrow.

Email Archiving, Compliance and Ransomware: How to Reduce Risk, Cost and Complexity

In this webinar, we’ll look at the key cost, compliance and risk-based challenges for midsize and decentralized organizations, with solutions for midsize and ROBO environments. Learn more.

Endpoint Security vs. Ransomware: The 2017 State of the Battle

In this informative webcast, join industry expert Nick Cavalancia, and Stu Sjouwerman from KnowBe4, as they share the results of KnowBe4’s 2017 Endpoint Protection Ransomware Effectiveness Report. You will receive an overview of the current state of ransomware, learn the use and effectiveness of methods in use today and explore practical ways to stop ransomware. Learn more.

Oracle, Hyperconvergence and Enterprise Cloud: Design and Technical Considerations

Whether you are virtualizing tier-1 Oracle databases, consolidating to improve software utilization, or looking to upgrade to the latest application version, the hyperconvergence based Nutanix Enterprise Cloud Platform brings the predictable performance, scalability, and cost benefits of web-scale IT to your transactional and analytical Oracle environments. Read on.

Best Practices for Windows 10 Migration

In this webcast Lenovo will equip you with the knowledge you need to plan a smooth transition to Windows 10. Learn more.

Freedom from Fax: Why IT Departments Love the Cloud

When old-school fax communications run amuck, IT people are often left to clean up the mess. Luckily, there’s a solution IT departments can turn to for help: cloud fax services. Attend this 30-minute webcast to discover how cloud faxing can benefit your business and IT department. Watch now!

SaaS-Based Print Management: Kill the Print Server

Join technology expert and founder of Techvangelism, Nick Cavalancia, and Jordan Pusey, Product Marketing Manager at PrinterLogic, as they explore and discuss the benefits of moving to the cloud to eliminate print servers and simplify print management.

Secure Your Active Directory

Active Directory plays a critical role in your company’s IT infrastructure. Microsoft published 300+ pages of guidance, but who has the time, money and resources to implement? Skyport will show you an easier way to secure facets of you AD infrastructure.

So You've Migrated to Office 365. Now What?

Join Microsoft Cloud & Datacenter MVP Tim Warner and Quest Product Manager Shawn Barker as they break down, in clear language and with hands-on demos, how you can reach your learning curve with the Office 365 platform while preserving your sanity. Learn more.

Office 365 Best Practices That You Are Not Thinking About: Managing Security and Compliance

In this webcast Microsoft MVP Mike Crowley from Baseline Technologies will explain how to translate your existing security and compliance requirements to Microsoft’s cloud-based tools.

Reducing Risk in Application Deployment Lifecycle

Microsoft MVP Tim Warner outlines the problem and offers practical strategies for transitioning your application publishing infrastructure from a reactive to a proactive position. You'll learn new methods for scanning and verifying software, and how to publish the vetted apps to System Center Configuration Manager (SCCM) or to an enterprise app store to facilitate self-service. Learn more.

5 Security Questions to Ask When Deploying Office 365

In this webinar, we'll detail the security gaps in Office 365 and explore how new approaches to cloud security can help mitigate the threat of data leakage with real-world use cases. Join our webinar to find out which questions you should be asking about Office 365 security.

Architectural Decisions that Maximize Office 365 Benefits

In this session, you will get a deep dive on common pitfalls when deploying Office 365, why they are overlooked and how to avoid similar challenges. You'll also learn about real world use cases architected around best-of-breed technologies that enabled and accelerated Office 365 deployments. Find out more.

Replacing Your Disaster Recovery Site with Microsoft Azure: How to Get Started

In this session, Microsoft MVP Tim Warner explains in plain language what you need to think about in planning disaster recovery sites in the Microsoft Azure public cloud. Learn more.

How Phishing and Social Engineering Became the #1 Attack Vector

Join Nathan O'Bryan and Stu Sjouwerman as they explore how phishing and social engineering have become the #1 attack vector all IT departments need to worry about, and what you can do to ensure your data remains in your control like mobilizing your end-users as your last line of defense. Learn more in this webcast.

Optimize Availability with Purpose-built Backup Appliances

Join experts from Storage Swiss and Veeam to learn more about the different types of PBBAs and how to choose industry-leading Availability solutions that’s storage-agnostic, cloud-ready and can support the demands of the always-on enterprise.

Enforcing Modern Authentication Factors for Microsoft Office 365

Over the last 20 years, cyber security has evolved and now dominates the headlines. More than ever, users are accessing their messaging and productivity tools from untrusted networks, devices and workstations and providing multi-factor and analytics has never been more critical. On this webinar, Okta's Marc Jordan and Anat Shiwak discuss how to remove the identity barriers for your Office 365 migration while building a modern, secure foundation for your Office 365 migration and future cloud strategy that doesn't rely on legacy security tools.

Office 365 Lifecycle Management Deep Dive

Customers migrating to Office 365 have complex requirements, such as having to work around unique user access and governance challenges that may involve their employees, customers, partners and providers. Solving these unique challenges while providing seamless access across your user populations is an issue many businesses face – but management can be achieved.

Seven Features to Investigate in a Cloud Fax Service

Savvy businesses understand that fax isn’t going away anytime soon‚ and for that reason‚ your organization should be reaping the benefits made possible by a cloud-based faxing service. Learn more in this webcast!

4 Homegrown AD Group Management Solutions I’ve Built (that Don’t Really Work)

Join AD group guru Greg Shields from Pluralsight in this exploration of what works – and what’s monstrously not worked – in group management over the years. You’ll learn the homegrown tricks as well as some of the more modern, and still cost-effective, solutions that IT orgs these days are using to solve this age-old problem.

Smart Tips for Active Directory Security

Simply locking down the Enterprise Admins group isn’t enough to ensure a safe AD environment. From configuration settings to group management, there’s a slew of quick fixes you can make, and some major process changes that you can implement. Join MVP and author Don Jones for a concise rundown of these high-impact tips and techniques.

Mitigating the Threat of Data Theft by Departing Employees

Every day, your employees access a wide variety of electronic information, ranging from trivial to important and highly confidential. However, your organization may be in jeopardy when one of these employees when leaving the company decides to grab sensitive data. Can you prevent this from happening? Register for this webcast and find out how!

How to Spot and Prevent Malware Infection

The war against malware attackers is real, and there are many ways you may become a target. Offense should inform your defense: understanding how, when and where you are vulnerable should shape your plan of action. Learn how to protect your organization from security expert Ian Trump. Watch now.

Beyond Simple Fax and FTP: Reasons to Deploy Intelligent Fax and Secure File Transfer Solutions

Join Will Robinson, Vice President at Biscom, and Tim Warner, Microsoft MVP, as they discuss concrete ways that organizations can modernize their fax and file-transfer solutions to save time and money.

Top Five Office 365 Migration Headaches and How to Avoid Them

In this on-demand webcast, discover the top five Microsoft Office 365 migration challenges – and how to avoid them – so you have a seamless transition to with little or no business impact.

Leveraging Virtualization to Simplify Disaster Recovery Planning

In this session you'll learn how virtualization in all its manifold forms can make BC/DR planning easier to manage and improve your infrastructure's flexibility. Watch now.

StarWind Storage Appliance: Highly Performing and Extremely Fault-Tolerant Storage

Learn about the StarWind Storage Appliance and see how you can benefit from cost-efficient and easily scalable storage.

SCCM Is Working For You—But Is It Working Hard Enough?

System Center Configuration Manager reaches across your enterprise and is effectively managing updates for Windows OS and Microsoft apps. The bad news? This addresses just 20 percent of your software vulnerabilities.

Ransomware Hostage Rescue Guide

Join Erich Kron CISSP, Technical Evangelist for a live webinar. We will look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and what to do when you are hit with ransomware. Learn more.

Power to the End User: Self Service Password Reset for Mobile Users

Watch this webcast to understand the different options available to allow users to reset passwords when away from the network, see the benefits of each password reset solution and more! Available on-demand.

Efficiently Provisioning Users in Active Directory, Office 365, and Google

There is no reason that user accounts should not be created in Google and Office 365 when you are creating users in Active Directory. Come see how you can efficiently create users and their group membership at the same time, all from one easy console.

Indications of Compromise: How to Spot and Prevent Malware Infection

Learn the key role of antivirus and patching in reducing the attack surface; how to build infrastructure that contains and isolates malware from infecting the rest of the network; and what to do once you have detected an infection to mitigate impact.

Protecting Your Valuable Office 365 Assets

In this Redmond supercast, you will learn not only how to implement effective disaster recovery in the Office 365 cloud, but also how to restore lost data confidently and efficiently. Learn more.

6 Reasons to Move to Cloud Faxing

When it comes to traditional faxing, there’s a lot left to be desired — which is why businesses are turning to desktop cloud faxing. Take part in our upcoming webinar to find out why cloud fax services are gaining popularity over traditional fax operations. Register now!

State of End User Computing

VDI and end-user application virtualization solutions have come a long way in recent years, allowing for rapid deployment, massive scaling, and high-definition user experiences. Participate in this webcast to discover breakthrough trends for EUC/VDI and learn how you can leverage the momentum for your organization in 2017. Find out more.

SharePoint Migration: A Three Step Plan for Your Success in 2017

Is 2017 the year your organization makes a SharePoint move? On this webinar, not only will you learn about these three actions, Microsoft MVP Levithan will also share his predictions about Microsoft, SharePoint and enterprise collaboration changes in 2017. Register now!

State of End User Computing

VDI and end-user application virtualization solutions have come a long way in recent years, allowing for rapid deployment, massive scaling, and high-definition user experiences. Participate in this webcast to discover breakthrough trends for EUC/VDI and learn how you can leverage the momentum for your organization in 2017. Find out more.