What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here


To register for multiple webcasts, please check the box beside the item and click the submit button.


Logo: Dell Software

A Reality Check on the Role of Clouds in Data Protection

Attend this webcast for an explanation of cloud-based disaster recovery, examples of hybrid private/cloud data protection models and ideas for preserving critical data while freeing up space in your storage infrastructure.

Date: 06/17/2015

Time: 11:00 am

Active Directory Groups and Insider Threats

Join industry experts as they talk about the current states of both insider threats and group management and why connecting the two is critical to the security of your organization.

Date: 06/16/2015

Time: 11:00 am


Planning and Executing Your Migration to Exchange Online

Join Nathan O’Bryan (MCSM: Messaging and MVP: Office 365) and Vadim Gringolts (CTO, Binary Tree) for an unscripted discussion about planning your migration to Exchange Online in Office 365.

Date: 06/24/2015

Time: 8:00 am


Moving Beyond Passwords with Mobile

This webinar looks at the role of mobile in creating more secure, more convenient, multi-purpose trusted identities and explores a variety of use cases where mobile will help you begin your journey to becoming a password-less enterprise. Learn more.

Date: 06/23/2015

Time: 11:00 am

Moving to Office 365 with Security in Mind

Industry experts will host an informal discussion about making the move to Office 365—with a focus on how to address security concerns and make the switch to Office 365 with security and compliance in mind. Register now!

Date: 06/16/2015

Time: 11:00 AM

Hyper-V: Enhance Your Virtualization Experience

Join industry expert Nick Cavalancia and Mike DiMeglio from Unitrends as they discuss key considerations for architecting a data protection and recovery strategy for a Hyper-V environment from the smallest VMs to large, mission-critical applications with short SLAs. Learn more.

Date: 06/04/2015

Time: 11:00 am

Logo: Dell Software

Highlights from an Active Directory Modernization Analysis

Cloud initiatives, mergers and acquisitions, compliance regulations and implementation of new systems, require an organized, consolidated and up to date Active Directory infrastructure. Learn how four corporations made the decision to modernize and realized a massive return on their investment.

Date: 06/09/2015

Time: 11:00 am


Understanding SSL/TLS Best Practices and Application Protection

Learn the latest techniques used to mitigate attacks on web based applications.

Date: 06/18/2015

Time: 9:00 am

Logo: Dell Software

5 Good Reasons Email Encryption Matters

This engaging webinar will provide a brief primer on encryption techniques, outline the expanding reach of data security regulations, and identify how adding email encryption can help your organization fearlessly face down the risks of non-compliance.

Date: 06/16/2015

Time: 11:00 am

The Great SharePoint Security and Insider Threat Survey – The Results!

This session will present the survey findings gathered from over 1,000 SharePoint IT professionals on how they are protecting their SharePoint content. Join us and learn some often overlooked SharePoint tips, tricks and best practices. Read on.

Date: 05/27/2015

Time: 11:00 am

The 1-2-3 Security Approach for Windows Server 2003 EOS

In this educational webcast, industry experts will discuss how to best apply security solutions across three paths to help customers deal with Windows Server 2003 EOS.

Date: 06/03/2015

Time: 11:00 am

Data Security in the Mobile Age

Business-savvy IT requires that we consider the dark side of technology strategy, including the threat surface it creates and the risk mitigation requirements that it spawns. Join storage guru Jon Toigo for the latest best practices and potential pitfalls of data protection in the agile age.

Date: 05/28/2015

Time: 11:00 am

Proven Practices for Office 365 Deployment, Security and Management

Join industry experts to learn how the single sign-on and automated account provisioning for Office365 can stop the cloud password sprawl, close security holes and free up IT time for new projects.

Date: 06/03/2015

Time: 11:00 am

On Demand

Managing AD Groups: Simple IT Headache or Security Hazard?

This webcast will discuss the challenges of AD group management, including how out of date is your group management, what’s really at risk and ways to automate common group management tasks.

Logo: Dell Software

Making Security a Business Enabler

Empower your business by transforming security into an enabler that provides users with access to the data and applications they need to be productive at work.

Logo: BridgeWays

Get Consistent and Consolidated Metrics With InterSystems Caché Management Pack for System Center Operations Manager

Attend InterSystems Cache Management Pack Webinar on May 21st, to see a live demo and to learn about the features and benefits of monitoring your InterSystems Caché database environment within the System Center Operations Manager (SCOM) console.

Cloud First, Mobile First SharePoint

In this webinar, Office 365 MVP Christian Buckley will discuss the future of mobility, the expanded vision of team and document collaboration, and the value of a productivity focus.

Freedom from Fax: Why IT Departments Love the Cloud

Fax isn’t exactly the most modern form of business communication. But what many IT departments are realizing is this: It’s not fax that’s behind the times, it’s the execution. Register for this webinar to discover why cloud faxing is catching on as a faster, cost-effective and more reliable alternative to fax machines and fax servers.

The Enterprise Application Lifecycle: It’s Costing You More Than You Know

In this informative webcast, join industry experts as they discuss how to gain control over applications, improve IT efficiency, lower cost, and reduce the dependence on Shadow IT.

Windows Server 2003 Migration

In this webcast Adam Bertram will cover how to discover current services on an older server, figuring out where to migrate these workloads to, how to build a plan for migration, and some common tools that will help in the process.

Microsoft TMG End of Life – How to Stay Secure

Attend this webcast for information on a Microsoft Threat Management Gateway replacement for reverse proxy and single sign on.

Logo: Dell Software

Unified Communications Best Practices

Attend this webcast to learn how to understand – and unlock – the value of your unified communications platform.

Logo: Dell Software

The Citrix Super Admin ― How to Simplify Your Work with X-ray Vision

In this educational session, you’ll discover how much easier your job can be with complete visibility into all aspects of your Citrix infrastructure running on VMware.

Non-Stop Data: Key Requirements for Agile and Always-On Business

This Redmond supercast will identify what non-stop data is all about and what are the best practices for enabling data for optimal usage by contemporary businesses.

Windows Server 2003 End of Life

In this webinar, we will take a deeper look at your options and break down the steps involved in each, with specific emphasis on available print server migration paths.

Webinar Recording

Want a More Secure Environment? See How Systems Management Can Help

You want a more secure environment. But while you’re likely employing some form of perimeter security, such as firewalls, intrusion detection, encrypted data transfer or other similar methods, are you paying attention to what is happening at the device level? Join this webcast and learn what IDC research manager Robert Young has to say about improving security through more comprehensive systems management of your connected endpoints.

5 Things to Know before Migrating to SharePoint 2013, Onedrive for Business and Office 365

Join Dr. Steve Marsh, Director of Product Marketing at Metalogix, as he shares the Metalogix experiences and expertise gathered from over a decade of migrations to Microsoft content platforms. Learn more.

Shattering SharePoint Storage Limitations: Addressing SharePoint Scalability, Reliability and Cost Issues

In this webcast Paul LaPorte explains the weaknesses in SharePoint storage architecture, and introduces Remote BLOB Storage and archiving solutions. Learn more.

Protecting FTP Servers Exposed to the Internet

While FTP is still widely used, it is also has lots of liabilities. In this technical webinar we’ll explore different aspects of running an FTP server on the Internet and how to protect it.

3 Ways Auditing Needs to Be a Part of Your Security Strategy

In this webcast, you will learn how auditing helps mitigate the risk of data breaches by being incorporated into your security strategy.

Office 365 Security

This webcast will discuss methods for securing the cloud-based suite, as well as delve into trends in next-generation technologies for digitally signing applications, binding people and documents, and assuring code integrity to wireless platforms.

Logo: Dell Software

De-Duplication: From Interesting to Indispensable in the Storage Administration Tool-kit

Join storage analyst and vendor watchdog, Jon Toigo, and Marc Mombourquette, Dell’s Data Protection guru, for this hype-free examination of data de-duplication and the benefits that Dell’s data reduction offerings. Learn more.

The Hybrid Content Dilemma

This webcast explores how the hybrid content dilemma causes end users, IT managers and CIOs to struggle when choosing on-premises or Cloud technologies as the best solution to support collaboration across the enterprise. Learn more.

Going to the Cloud to Get Over Fax: How IT and Business Benefit from Upgrading Your Old System

Register for the webcast to learn how your company can forget about the headaches and hassles of fax by moving your operations to the cloud! Learn more.

Virtual Data Protection: Which Way Is the Right Way?

Industry experts investigate the many ways to protect your virtual environment by looking at the various levels of backup and recovery granularity and their impact on your ability to protect your virtual environment.

Make Your Storage Work For You: VAAI and ODX offload up to 30% of disk operations to the SAN

Join Aidan Finn (Microsoft MVP) at this webinar dedicated to the use of Offloaded Data Transfer and APIs for Array Integration. He will explain exactly how you can greatly enhance the storage system performance and increase VM density with Hyper-V and vSphere. Learn more.

From Downgraded to Dead: Monitoring Application Performance

In this educational webcast, join industry experts as they discuss 10 tips for stopping performance problems before they start.

Advanced Endpoint Protection

Hackers are exploiting all potential infiltration points thus it is important to establish your defense structure and response and remediate strategy from all angles. But with so many solutions out there, where do you start? Find out in this webcast.

Free As In Beer – And Backup

Unitrends offers a number of FREE tools ranging from free backup of VMware vSphere (even for the free/unlicensed ESXi version) and Microsoft Hyper-V to disaster recovery planning services. Attend this webinar to learn about these tools.

Strategic Decisions for Active Directory Migrations and Consolidations

Join Greg Shields, author evangelist at Pluralsight, to learn about the end-state that fulfills a successful migration project and key tactics that protect your Active Directory core as it undergoes massive transformation.

Office 365 Deployment Challenges with Microsoft MVP Nathan O’Bryan

Join Microsoft MVP Nathan O'Bryan for a webcast on the identity and mobility management challenges associated with rolling out and adopting Office 365.

Understanding Data Protection

Join us to find out what are the biggest disaster recover (DR) traps to avoid, the best way to put together a successful DR plan, and how to do everything while working under a constrained timeline or budget. Register now.

Print Management in the Modern Era: Eliminate Print Servers, Enable Mobile / BYOD Printing, Empower Your Workforce and Reduce Costs

Join technology expert Nick Calavancia in a discussion with PrinterLogic, and investigate their claim that they can eliminate print servers and all print-related WAN traffic, and much more.

Running Windows Server 2003 in a Post-Support World

In this educational webcast, join industry experts as they discuss options to keep Windows Server 2003 secure.

Supporting Macs and Mobile Devices in the Enterprise: Balancing IT Control Vs. User Productivity

Guest speaker, Forrester Research Principal Analyst David K. Johnson will explore challenges and discuss techniques to allow enterprises to easily and seamlessly add Macs, tablets and smartphones to the corporate infrastructure leveraging tools, policies and processes that are already in place.

SQL, Active Directory, Exchange, SharePoint – Recover at a Granular Level

Join Nick Cavalancia of Techvangelism as he discusses the hype and reality of recovering your most critical Microsoft apps at a granular level, tools vs. backups, where virtualization fits in, and how to successfully protect your environment at an enterprise and granular level.

Office 365: When the Hype and Reality of Email Security & Availability Collide

In this webcast, join industry experts Nick Cavalancia and J. Peter Bruzzese, as they discuss the realities of messaging security and availability with Office 365.

Microsoft Hyper-V: 4 Things You Should Know to Ensure Storage HA and Security

Join Alex Karavanov and Max Kolomyeytsev to discover how to protect your storage, simplify administration, increase storage HA and reduce expenses with 5nine Cloud Security, 5nine Manager and StarWind Virtual SAN. Learn more.

Logo: Dell Software

Eliminate Active Directory Migration & Disaster Recovery Headaches the Virtual Way

In this educational webcast, join industry experts as they discuss why it’s so important to test the AD migration and disaster recovery plans prior to a disaster and where to find the easy button.

Logo: Dell Software

Roll with the Changes: See Clearly into Your Virtual Environment

Industry experts show you how to get full visibility into your enterprise infrastructure to easily determine who made what changes when.

‘No Limit’ Storage in SharePoint 2016: Play the Winning Hand

Get a jump on SharePoint 2016. Eliminate storage limitations that continue to impact SharePoint and implement a winning storage strategy that carries you from your current version through to 2015 and beyond.

Logo: Dell Software

Choosing a Systems Management Platform: An Independent Evaluation of Leading Management Suites

Enterprise Management Associates (EMA) has conducted a side-by-side functional and financial comparison of solution suites from four of the leading vendors. Join EMA Research Director, Steve Brasen, as he reveals key results from this objective evaluation along with guidance on what to look for in a systems management solution.

Get to the Root Cause of Performance Issues for Your Microsoft Applications – Quickly

In this webcast, learn what needs to be monitored and how to troubleshoot problems.

Servers, Storage, Virtualization and You: It’s Complicated

In this webcast, join industry experts as they discuss why today’s datacenters are overly complex, and what areas can be simplified.

Logo: Dell Software

Modernize Your Active Directory Toolset for Better Security, Delegation…and Virtually Everything!

In this live webcast, Active Directory expert Chris Ashley will show you how you can manage virtually every facet of Active Directory from a single console.

Drowning in Data – How to Backup More Than You Can Handle

In this webcast, join industry experts as they discuss ways to address the challenges of backing up more than you can handle.

The Evolution of the SSL Security Landscape

This webinar will review changing certificate policies and address new vulnerabilities in the SSL world that have recently been discovered requiring organizations to act quickly to maintain the highest levels of security.

Recovery That Always Works

In this on-demand presentation you will learn how policy-based Disaster Recovery planning, testing and automation will allow you to predictably guarantee recovery in any situation. You’ll see how RTAs or Recovery Time Actuals, can help you verify and ensure recoverability within SLAs on an ongoing basis. And lastly you’ll see how pushbutton failover, rollback and failback can take the manual effort out of responding to outage situations.

BCDR Link & the State of Disaster Recovery Preparedness

When you get that call about a data disaster at your site, whether it’s fire, flood, or power outage, you need to respond with a Business Continuity and Disaster Recovery (BC/DR) plan already in hand. BC/DR Link is a FREE online service tool provided by Unitrends to help you build that plan and confidently pave your way to an effective, efficient response and recovery.

Disaster Recovery as a Service

The experts have said it for years: when it comes to backing up and restoring your data and applications, it’s not just about data backup. What really counts is the ability to quickly recover from a local server failure, or more importantly, a catastrophic full site failure - because every minute you’re down, you’re losing business.

Purposing the Cloud for Disaster Recovery – Fact, Fiction & Survey Results

Join Unitrends for an hour-long deep dive into where your peers are storing their data, how they are addressing governance, DR testing, managing SLA’s, RTOs and RPOs to meet compliance, and what these testing and disaster recovery plans look like. Read on.

Dell Software

Consolidating Active Directory Domains and Forests

Consolidating domains and forests is a big job. View this webcast and learn how to merge or eliminate domains and forests and gain insight into common consolidation issues that can compromise security.

Active Directory Domain Controllers: Backup Recovery in Virtualised Infrastructure

Join Sander Berkouwer and Mike Resseler for this webinar to learn the best practices of backup and virtualization for Active Directory Domain Controllers. View now!

ESG Video: Best Practices in Virtualized Protection for 2014

Jason Buffington, ESG Sr. Analyst, discusses ESG's research findings on protecting highly virtualized environments, looking at such topics as server hypervisor adoption/preferences, general data protection trends, and specific approaches for protecting and recovering both VMware and Hyper-V environments.