What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here


To register for multiple webcasts, please check the box beside the item and click the submit button.


Logo: Esker. Document Process Automation.

Traditional Fax vs. Desktop Cloud Fax: 6 Reasons to Move to Cloud Faxing

When it comes to traditional faxing, there’s a lot left to be desired — which is why businesses are turning to desktop cloud faxing. Take part in our upcoming webinar, 6 Reasons to Move to Cloud Faxing, to find out why cloud fax services are gaining popularity over traditional fax operations. Register now!

Date: 02/21/2017

Time: 11:00 AM

Active Directory – To Secure or not to Secure? No longer a question

Active Directory is an often-overlooked vulnerability and many organizations don’t realize there is a risk. Join us to learn the most common threats going into 2017, how to strengthen your total Active Directory infrastructure and how to protect your most privileged credentials against the growing threat of attack. Read on.

Date: 01/31/2017

Time: 10:00 am

5 Ways to Migrate Thousands of Users to Windows 10 Fast

Windows 10 migration projects are highly complex and incredibly disruptive. In this webinar you’ll learn how to migrate faster, easier, and with no impact to the end user.

Date: 02/22/2017

Time: 11:00 AM

State of End User Computing

VDI and end-user application virtualization solutions have come a long way in recent years, allowing for rapid deployment, massive scaling, and high-definition user experiences. Participate in this webcast to discover breakthrough trends for EUC/VDI and learn how you can leverage the momentum for your organization in 2017. Find out more.

Date: 02/14/2017

Time: 9:00 am


SharePoint Migration: A Three Step Plan for Your Success in 2017

Is 2017 the year your organization makes a SharePoint move? On this webinar, not only will you learn about these three actions, Microsoft MVP Levithan will also share his predictions about Microsoft, SharePoint and enterprise collaboration changes in 2017. Register now!

Date: 01/31/2017

Time: 11:00 AM


Securing your Hybrid Office 365 and Azure Environments

In this live webcast, Microsoft MVP, Nathan O'Bryan will identify some of the pitfalls you may encounter when securing your hybrid Office 365 and Azure environments. Learn more.

Date: 01/26/2017

Time: 11:00 am

Innovate and Transform and Become the Next Uber or Amazon

For efficiency and simplicity, an organization’s Identity and Access Management (IAM) solution needs to provide an aggregated view of identities across all systems. Plus, it should enable managers to easily define and enforce the policies of their governance initiatives. Learn more.

Date: 01/24/2017

Time: 11:00 am

On Demand

Why You Should Protect Active Directory in 2017

Microsoft Active Directory is under siege by cyber criminals. Join us to discover why Active Directory is targeted so often, the attack techniques and tools used today, and a modern architecture that secures Active Directory. Learn more.


Securing Your Organization from Ransomware

Security researcher and advocate Brook Chelmo will talk about ways to stop ransomware and other advanced persistent threats such as zero-day attacks and how you don’t have to be a security expert to protect your IT ecosystem.


Do You Need Built-in or Bolt-on Security for Office 365?

Join two Microsoft MVPs as they explain where Office 365’s features stop and 3rd party tools may succeed by filling in some gaps around topics such as phishing, ransomware protection and monitoring. Learn more.


The Cost of Doing Nothing: A Ransomware Backup Story

The Ransomware epidemic is frightening and making weekly headlines, but are you doing all that you can to protect yourself and your organization? In this webcast, Microsoft MVP Mike Crowley will explain what can be done to lower your attack surface as well as how to be respond in the event ransomware has penetrated your network. Don't wait until it’s too late to learn about this threat!

Logo: CloudFlare

5 Ways to Secure Your Cloud Investment

In this webinar, we discuss developing a strong information security foundation at the user and application level, creating a perimeter of defense by limiting access to systems through whitelisting/blacklisting and much more. Watch it!

Logo: CyberArk

Containing Attacks on the Endpoint

Attend this 30-minute webinar and learn how the just-released CyberArk Endpoint Privilege Manager solution can: strengthen your existing endpoint protection to contain threats early in the attack life cycle; enforce least privilege on the endpoint without negative usability impact; mitigate the risks of ransomware; get a "privileged" view of this critical layer of protection and learn how you can block and contain attacks at the endpoint before they stop your business.


Are Your Active Directory Groups a Security Exploit Waiting to Happen?

In this webinar, MVP and author Don Jones explores some of the ways your AD groups can be used against you, examining real-world hacks and attacks that almost every organization is susceptible to. He’ll also explore some of the capabilities and countermeasures you can deploy to protect and harden your AD group infrastructure. Learn more.

Logo: Netwrix

Cloud Security: Who's Responsible for Your Critical Assets?

Join our new webcast and learn what you need to keep in mind when your data resides in the cloud.


Simplifying Print Management: Kill the Print Server

Join technology expert and founder of Techvangelism, Nick Cavalancia, and Jordan Pusey, Product Marketing Manager at PrinterLogic, as they explore and discuss three print architectures in an effort to help you determine how to eliminate print servers and simplify print management. Learn more.

Logo: Redmond Tech Advisor

Improve Backup Capabilities With Limited Resources

In this Redmond supercast, join industry experts as they discuss some very important backup economies of scale you should consider as part of your strategic planning to ensure you can deliver, no matter the demand put on IT. Register now!

Logo: Esker. Document Process Automation.

Freedom From Fax: Why IT Departments Love the Cloud

Fax isn’t exactly the most modern form of business communication. But what many IT departments are realizing is this: It’s not fax that’s behind the times, it’s the execution. Register for our live webinar to discover why cloud faxing is catching on as a faster, cost-effective and more reliable alternative to fax machines and fax servers. Register now!

Will Your Active Directory Environment Survive a Penetration Test?

This webinar will identify the attack vectors against Active Directory domain controllers using the Microsoft STRIDE threat model approach and give you the confidence to ensure your Active Directory environment will survive a pen test and be safeguarded against an actual attack.

Logo: Redmond Tech Advisor

Planning Your Migration to the Microsoft Cloud

In this webcast Nathan O’Bryan (MVP Office Servers and Services, MCSM: Messaging) will walk through the important planning steps that can make your migration into Office 365 successful.

Logo: Redmond Tech Advisor

The Ransomware Epidemic: Preventing, Mitigating, and Recovering from Ransomware Attacks

Learn how ransomware attackers are successful in delivering their malicious software and what techniques are the most common. You’ll also learn how to reduce the risk of becoming a ransomware victim through the use of process, procedure, and advanced technology. Finally, you’ll better understand how to recover from a successful ransomware attack and learn how to implement additional protection measures for added safety. Learn more.

Preventing and Mitigating Ransomware Infections

Not a week goes by without hearing about a network breach of some major corporation, agency or public figure, including government officials! If these powerful entities have been compromised, what chance do you have? Hear industry experts describe today's threat landscape and offer some practical, every-day protections. Register now!

Logo: Redmond Tech Advisor

The Expanding IT Attack Surface

A significant portion of data access interruptions, data corruption events and downtime is the result of phishing, ransomware and social engineering attacks. Mobile devices, telework and cloud computing have expanded the attack, and it will take a hybrid strategy of data protection, secure computing practices and end-user education to meet the challenge. Get tips from data protection guru Jon Toigo.


Next Steps to Enhance Your Data Protection Infrastructure

In this webinar Microsoft MVP Greg Schulz will look at trends and issues including how different threat risk challenges impact your evolving environment, as well as opportunities to address them. He'll cover the 4-3-2-1 data protection and security rule. Join us!


Office 365 Migration War Stories

Join Microsoft MVP, J. Peter Bruzzese, for his expertise and perspective on migrating to Office 365. Learn from the 1,000’s of organizations that he has helped transition to the cloud. Learn the positives and the potential pitfalls. Learn more.


Migrating to Windows 10: Starting Fast, Finishing Strong

It’s inevitable, you’re going to need to migrate to Windows 10 at some point. But making the move to the new OS isn’t as simple as putting new machines in place, or by running UPGRADE.EXE. There’s so much more to consider. So, what will it take to simplify the migration so it’s done right the first time? Register now and learn more!

What Every CISO Needs to Know About Office 365 Security

As more companies adopt Office 365 and OneDrive, CISOs need to carefully consider the risks and vulnerabilities. Data leakage, compromised credentials, compliance exposure, and malware are just a few of the threats. Today, however, it is possible to make your data in the cloud more secure than in your data center. Learn more in this webcast.

Active Directory Monitoring: Go From Novice to Pro in Under 45 Minutes

Join Derek Melber, Active Directory MVP, as he guides you through the correct methods to set up Active Directory Change Monitoring. Derek will give you an inside scoop on the best way to report and setup alerts on the changes that you are tracking. Never miss key security changes in AD again! Read on.


The O.A.R. of Virtualization Scaling

Your journey to a flexible, scalable and secure IT universe begins now. Join virtualization experts for an interactive discussion empowering you to become the master of your software defined and virtual data center. Watch now!

Logo: Redmond Tech Advisor

Using SSL Certificates To Secure Your Email Part 2

Encrypting your data is becoming more important in a world where IT services are moving toward the cloud. In this 30-minute session, we’ll explore cloud encryption strategies and what they mean to your organization. Register now!


User Lifecycle Mismanagement: Why It’s Killing Your Company

In this informative webcast, hear industry expert Nick Cavalancia as he discusses what defines the user lifecycle and who, why and how to automate it.

Logo: Redmond Tech Advisor

Embedding Security Best Practices in Software Deployments and Management

In this Redmond Tech Advisor webinar, learn how to embed security into your automated software deployment and management process. We'll cover what to look out for, the biggest patching and security compliance pain points, as well as strategies to adhere to Application Readiness best practices. Learn more.

Logo: Redmond Tech Advisor

How Public Key Encryption Works

Encrypting your data is becoming more important in a world where IT services are moving toward the cloud. In this 30-minute session, Nathan O'Bryan will explore cloud encryption strategies and what they mean to your organization. Register now!

Logo: Redmond Tech Advisor

Using SSL Certificates To Secure Your Email Part 1

Encrypting your data is becoming more important in a world where IT services are moving toward the cloud. In this 30-minute session, Nathan O'Bryan explores cloud encryption strategies and what they mean to your organization. Watch it now!