What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webcasts

To register for multiple webcasts, please check the box beside the item and click the submit button.

Upcoming

Driving Fax, Email and EDI Order Automation with AI

Join the live webinar to discover how organizations can stop relying on IT to fix issues like EDI errors and start leveraging AI-driven technology to automate the tedious parts of order processing. Learn more!

Date: 06/19/2018

Time: 11:00 AM


Mitigating IT Risks with Data Classification and Access Control

Join industry analyst Tim Warner and Netwrix Manager of Sales Engineering Jeff Melnick to learn how to start a corporate data classification and protection scheme right now. Ask Jeff and Tim questions and leave the webinar armed with practical advice and next step actions. Learn more.

Date: 06/21/2018

Time: 11:00 am


Netwrix Auditor Product Demo

Netwrix Auditor provides security intelligence to identify security holes, detect anomalies in user behavior and investigate threat patterns in time to prevent real damage. Sign up for the live demo now! Read on.

Date: 05/30/2018

Time: 10:00 AM


Windows as a Service – Resolving the Upgrade Versus Update Dilemma

Attend and learn about Windows as a service, how it will impact enterprises and get a cheat sheet for a hassle free transition to Windows as a service.

Date: 05/29/2018

Time: 11:00 am


Office 365: Expert Tips for Protecting the Parts that Microsoft Doesn’t Handle

Join Office 365 experts to learn about potential security risks present in O365 and how best to mitigate those risks.

Date: 05/30/2018

Time: 11:00 am


How to Simplify Your Migration to Windows 10

Learn tips that IT managers can use to streamline the OS migration process, while maintaining business productivity by leveraging endpoint data protection.

Date: 06/20/2018

Time: 11:00 am


Analyze Active Directory Security for Fun and Profit

Join Microsoft MVP Tim Warner to learn how to audit, analyze, configure, and report on AD DS by using Microsoft "in box" tools. We will then transition into the need for a third-party auditing and risk management solution.

Date: 06/19/2018

Time: 11:00am


Securing Virtual Machines in Azure

In this webcast Nathan O’Bryan (MCSM/MVP) will cover some simple steps you can take to secure your virtual machines hosted in Azure. Learn more.

Date: 06/12/2018

Time: 11:00 am


Multi-Cloud Governance at Your Finger Tips

Join us for a discussion about multi-cloud management and learn how Nutanix can enable you to drive better visibility, cost optimization and intelligent resource planning for hybrid and multi-cloud deployments. Learn more.

Date: 05/31/2018

Time: 11:00 am


Don’t Just Survive Office 365 Tenant Migration – Master It!

Find out about best practices for quick and easy Office 365 tenant to tenant migration.

Date: 06/13/2018

Time: 8:00 am


How Notre Dame Maintains Uptime on AWS: A Master Class

Join our upcoming webinar to hear Aaron Wright, Notre Dame Systems Engineer, discuss how the university maintains continuity when unforeseen circumstances arise. Read on.

Date: 06/13/2018

Time: 9:00 am


Branch Offices, United Security

See what certificate management in action looks like as we show you how one globally distributed company with thousands of remote offices secured its transactions, and improved the customer and employee experience. Read on.

Date: 06/12/2018

Time: 9:00am


Simplifying Cloud Access and Provisioning with a Federated Identity Service

This webcast explores how you can best manage identity in a hybrid environment that includes both on-prem and cloud-based identity sources, and how a federated identity service can simplify access and provisioning to the cloud. Read on.

Date: 06/14/2018

Time: 11:00 am


Making Awareness Stick: Secrets to a Successful Security Awareness Training Program

Join Erich Kron, Security Awareness Advocate at KnowBe4, as he shares results-focused strategies and practical insight on how to build a world-class security awareness and training program. Learn more.

Date: 06/14/2018

Time: 11:00 am


Fax Survival Guide: How to Avoid Disaster and Distress with Cloud Fax Services

Attend to learn how your company can forget about the headaches and hassles of fax by moving your operations to the cloud! Get the details.

Date: 05/31/2018

Time: 1:00 pm


4 Powerful Levers to Enable a Zero Trust Security Framework

Join experts from Forrester, Lenovo and Microsoft as they discuss Forrester’s newly updated Zero Trust Extended framework and how the four core components of Lenovo’s Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT assets. Read on.

Date: 06/28/2018

Time: 10:00 am


What Happens When Office 365 Fails: Backup & Recovery

There is a widespread misconception that data created and stored in the cloud does not need to be backed up. When data is deleted or corrupted, companies face three major problems: lost data, lost time and lost cash. Learn about cloud data recoverability and how to take control of your Office 365 data at this webinar.

Date: 05/31/2018

Time: 11:00 am


On Demand

Solved: Advanced Data Classification and Leak Prevention in Office 365

In this webinar, we will look at the built-in DLP capabilities and demonstrate how you can apply advanced data classification tools provided by Symantec, McAfee, GTB or any of the leading DLP vendors. We will show how you can integrate them into policy workflows that manage share policies, interact with users and even incorporate your choice of file encryption.


How to Leverage Endpoint Data to Better Detect, Analyze and Predict Attacks

Join us to learn how to leverage endpoint data to make sense of the software capabilities, capabilities of code in memory, and even the attacker’s capabilities in order to better detect, analyze and PREDICT attacks BEFORE they occur. Learn more.


Netwrix Auditor Product Demo

Netwrix Auditor provides security intelligence to identify security holes, detect anomalies in user behavior and investigate threat patterns in time to prevent real damage. Sign up for the live demo now! Read on.


Netwrix Auditor – Data Discovery and Classification Edition

In this webcast learn how to classify the sensitive data you store and how to prove the effectiveness of your data security controls to auditors with less effort and expense. Sign up today!


7 IT Pro Secrets for Backing Up Office 365 Data

During this editorial webcast, experts from Redmond magazine walk through the best practices organizations are using to manage the Office 365 backup process. Join us.


Deprovision Your Cloud Users Like a Pro

Your organization needs a comprehensive deprovisioning strategy to accompany your use of SaaS apps. In this session, Joe Ochs of Backupify shows you how easy user lifecycle management can be. Read on.


Top Tips for IT Pros in Education to Know

If you and your team are responsible for managing computers for students or faculty, you won't want to miss this webcast. We'll give you tips on managing 5+ computer models, remote devices, and multiple Windows versions, plus an imaging software comparison including Symantec Ghost, KACE, Acronis Snap Deploy, and Microsoft Deployment Toolkit. Learn more.


How to Survive Windows 10 Updates

Watch this Windows 10 Update survival guide, including the underlying technical realities, when to use WSUS (and when Microsoft will override your settings anyway), and "gotchyas" when building and maintaining your golden Windows 10 image. We’ll uncover the things Microsoft hasn’t told you and give you the information you need to develop a Windows 10 management strategy that will maximum user productivity and empower you to feel confident managing your Windows 10 environment. Learn more.


A Hacker Explains - How Your IT Environment Can Be Compromised

Join this practical webinar series about cybersecurity solutions, prepared by Liam Cleary, MVP, Associate Director and Solution Architect for Protiviti. These webinars walk you through the hacking process, the techniques hackers use once inside your network, and the tools and techniques you can use to defend your IT environment. At the end of the three-webinar series, you will have a better understanding of your organization’s cybersecurity posture and be able to improve your protection strategy. Learn more!


Best Practices for Pulling Identities Together: What Enterprises Are Doing Now to Stay Secure

Join Microsoft MVP Sander Berkouwer and come away from this session with actionable tactics for minimizing the gaps in your company's identity and authentication security posture. Learn more.


Ransomware: The Not So Good, Really Bad and Truly Ugly!

This session will educate attendees about the newest features of ransomware strains designed to evade detection and spread in new and creative ways. It will also discuss recent attacks and how the organizations could have better protected themselves.


IT Asset Management: It’s More than Just a Spreadsheet of Machines!

Hear Dale Meredith, Microsoft MVP and Quest KACE’s James Rico as they discuss approaches and best practices of IT asset management and how building a solid asset management foundation can lead you down a path of unified endpoint management. Watch it now.


Supplementing Backup Limitations in Office 365

Join Michael Osterman of Osterman Research to learn how to best protect your Office 365 data, including Office 365's potential data loss and security risks, the missing recovery functions in OneDrive, Exchange Online and SharePoint Online plus more! Watch it now!


Data Growth: Disaster Recovery’s Worst Nightmare

In this educational webcast, join backup experts as they discuss the greatest source of increased storage in backups; the hidden cost of data growth; decreasing storage with data deduplication; and more.


Windows 10 Migration Tips, Tricks and Strategies

In this webinar, learn best practices (and tricks) to reduce Windows 10 complexity, ease migration challenges, and migrate users with minimal interruption. Learn more.


Traditional Fax vs. Desktop Cloud Fax: 6 Reasons to Move to Cloud Faxing

Register now to discover all 6 reasons to move to cloud faxing and how making the move to cloud-based faxing can benefit your business! Even if you miss the live presentation, we’ll email you a recording of it.


Netwrix Auditor Product Demo

In this technical webinar, we will guide you through the key functionality of Netwrix Auditor 9.5. You’ll learn how to use Netwrix Auditor more effectively to audit critical systems such as Active Directory, Windows file servers, Microsoft SQL Server and many more.


5 Keys to Ensuring Your DRaaS Is Not a Disaster

With over 500 Disaster Recover as a Service (DRaaS) providers in the market the quality and services offered vary dramatically. Learn what to ask for when considering DRaaS for your organization. Find out what features are required by Gartner to rank as “Visionary” in their DRaaS Magic Quadrant.


Endpoint Management and IoT; The Sum Is Greater than the Parts

The IoT is fueling an explosion in endpoint proliferation causing management and security challenges of devices. Find out how an Unified Endpoint Management can help. Learn more.


Veeam’s Road to GDPR Compliancy – The 5 Lessons Learned

Please join Danny Allan, Veeam’s VP of Product Strategy and Greg Schulz, Founder and Sr. Advisor of the independent IT advisory and consultancy firm Server and StorageIO, as they discuss the challenges many organizations are facing around GDPR. They will review the five key lessons learned during Veeam’s road to GDPR compliancy and how Veeam’s software solutions played a critical role within our own data management and protection strategies. Learn more.


A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.


A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.


Benefits of Moving Hyper-V Disaster Recovery to the Cloud

By attending this session, you will learn how to plan a customized and right-sized DRaaS solution featuring Veeam Backup & Replication for your Hyper-V environment.


Protecting Exchange Online Mailboxes from Spam and Phishing Attacks

Industry experts will dive into the default features and functionality of your Office 365 subscription. Learn more.


The Signal in the Noise: Security Reporting and Dashboards

In the era of increased cyber-threats, GDPR, and proof of Compliance, up-to-the minute, meaningful and actionable IT security data is critical to every business. Join this webinar to learn how Ivanti reporting and dashboard solutions can help solve your security reporting challenges.


Identity Led Security and Strong Authentication

Join this webinar to learn why identity isn’t simply just a "first step" but also the foundation modern security should be built on. Then explore the characteristics that make a strong authentication solution. Learn more.


Phishing Attack Landscape and Industry Benchmarking

Join security advocate, Erich Kron, for a discussion of brand-new research based on what your users are clicking and how you compare to your peers with new phishing benchmarks by industry.


Protect Legacy Applications Without Touching Your Apps Using Okta and Palo Alto Networks

Learn how to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta.


Networking Superpowers for the Cloud Ninja

Watch Riverbed unveil the full power of a true software-defined WAN (SD-WAN) in the cloud with a detailed, demo and a candid conversation between Angelo Comazzeto, Riverbed’s Technical Director for Cloud Services, and Nick Matthews, AWS Partner Solutions Architect. Watch it now.


Cloud Networks Made Simple with Riverbed on AWS

AWS makes it simple to set up cloud-based resources. But do you have secure, high-capacity, high-performance connectivity to and between AWS cloud instances? That’s where Riverbed comes in. Riverbed’s SD-WAN solution enables cloud migration and performance, all managed via quick and simple workflows. Watch it.


Peer Advice: Active Directory Migrations

Drawing on vast experience in successfully performing Active Directory migrations in environments of all shapes and sizes, experts will dive into lessons learned from AD migrations.


Why a Cyber Resilience for Email Strategy Matters: Because the Most Used Application Is Often the Least Protected

In this webcast, JP Blaho, will provide insight into why a cyber resilience strategy for email is not just better, but necessary. Learn more.


Integrating Microsoft Azure into Your Disaster Recovery Strategy

Join Microsoft MVP Tim Warner to learn how incorporating Microsoft Azure into your BC/DR/IT resiliency strategy is not only attainable, but much more affordable and easy to undertake than you might have thought previously.


New Rules for Firewalls as More Applications, Infrastructure Hit the Cloud

In this Redmond webcast, we look at how IT pros are deploying, configuring, managing and paying for widely distributed firewalls to deal with the new challenges of blocking attackers in cloud-heavy environments.


Secure Access for Distributed Employees, Partners and Customers

Cloud-first is a philosophy and shift in how IT thinks about openness, security, and user trust with specific components that embody a cloud-first strategy. This webinar defines those components and the many benefits. Learn how 100% cloud and mobile IT meets all your users’ needs. Learn more.


Beyond the Hype: Achieving Security Value with AI, Machine Learning, and Behavior Analysis

Join experts to learn how to setup your vendor technology evaluations, properly identify and run real-world malware and attack scenarios, learn how to fool “Artificial Intelligence” and “Machine Learning” technologies using adversarial techniques, and ultimately walk away with a better understand of the real value beneath the hype. Learn more.


Availability On-Premises, In The Cloud And On The Go with Veeam Agent for Microsoft Windows

Are you looking to find out more about avoiding downtime and data loss quickly and easily for Windows-based physical or public-cloud workloads? How can you bring more Availability to these workloads? Learn more.


How the Cloud Drives Availability and Data Protection

Data is to this century what oil was to the last century – a driver of massive growth and change. This is not just about technology, but also new ways of doing business. And yet, Availability and data protection are among the biggest challenges facing IT leaders today, particularly with the recent increases in cyberattacks, such as ransomware, which have affected companies of all sizes. Learn more.


Availability Outside of the Data Center

Take a deep dive into how Veeam® Agents deliver Availability for Windows-based physical servers and Linux-based server instances. We’ll discuss how to meet RPOs and reduce the risk of data loss for laptops and tablets outside the corporate network. We will also discuss how you can solve key challenges like managing remote offices, offering Backup as a Service and Disaster Recovery as a Service, and more.


Hyper-V 2016: The Next Generation of Virtualization

Watch this interactive, demo-filled webinar that will provide all of the details on the largest announcements within Hyper-V 2016. Join Microsoft Cloud and Datacenter Management MVP, Clint Wyckoff, as he illustrates the pieces of Hyper-V 2016! Learn more.


Total Control and Protection of Email Data with Veeam Backup for Microsoft Office 365

Whether you have completely migrated to Microsoft Office 365, or have a hybrid exchange and Office 365 deployment, your business objectives remain the same. You must remain in control of your data and be able to backup and recover Microsoft Office 365 items at all times. Veeam® Backup for Microsoft Office 365 enables you to mitigate the risk of losing access to Office 365 email data and ensure Availability for users. Learn more.


To The Cloud, From The Cloud, Within The Cloud

Learn from Mike Jones on what modern approaches exist to do what you want with your data in the cloud. Whether you are starting your cloud journey, already underway or not sure how to meet your technical and business requirements in a cloud-ready world, there is something for everyone on this webinar. Watch it now.


Windows 10 Servicing and the New Reality

The initial shock of Microsoft's new Windows release cadence might be over, as might be the stages of grief in knowing you'll now be updating far more regularly. How do you focus on the solution? In a world where the next update is always just around the corner, what approaches are others using to actually get the job done? Learn more from Greg Shields.


Windows 10 Migration: Greater security, more responsive IT and reduced support costs

Join us to hear Lenovo and Microsoft experts discuss how companies are realizing the benefits of Windows 10 migration. You’ll also get valuable tips on how to ensure your migration efforts are on track, on budget, and focused on achieving results. Learn more.


Enhancing Remote Collaboration in the Modern Workplace

In this webinar, you’ll hear how Lenovo, Microsoft and other partners are helping businesses adapt to a changing workplace with solutions that make remote collaboration a seamless experience. Register now!