What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here


To register for multiple webcasts, please check the box beside the item and click the submit button.


Logo: symtrax

Learn how to easily improve SAP Printing Management

Join us for a free webinar on Taking your Document Validation Workflow Digital - Tuesday, September 30th, 11:00 AM PST, USA

Date: 10/22/2015

Time: 11:00 am

Logo: Redmond Tech Advisor

TLS and SSL: What You Need To Know

Join Nathan O’Bryan (Office 365 MVP & MCSM: Messaging) on this exploration of SSL. Whether you’re a security professional, or you just want to learn how the internet works, this webcast is for you. Learn more.

Date: 11/12/2015

Time: 11:00 am

Logo: Redmond Tech Advisor

Understanding the Threats to Your Online Business

Join Nathan O’Bryan (Office 365 MVP & MCSM: Messaging) on this deep dive into web security. Whether you’re a security professional, or you just want to learn how the internet works, this webcast is for you. Learn more.

Date: 11/19/2015

Time: 11:00 am

Logo: Redmond Tech Advisor

Disaster Recovery Planning: Improving the Process

Hear from business continuity planning expert Jon Toigo as he moderates this Redmond Supercast covering the latest techniques for business continuity and disaster recovery planning. Learn more.

Date: 10/29/2015

Time: 11:00 am


Today's Mobile Security Threats and Tips to Enable Productivity Without Compromising Data Security

Join this webinar to understand today’s mobile threats and the risk they incur on the end-to-end mobile data workflow. Learn why securing the end-end mobile workflow is important to overall security and hear tips to uncover mobile threats and protect your data and network. Read on.

Date: 10/28/2015

Time: 11:00 am

Logo: Dell Software

Five Ways to Prepare for Exchange 2016, SharePoint 2016 and Office 365

In this session, experts from Dell Software will discuss how to get the most out of Microsoft’s 2016 versions of Exchange and SharePoint and five specific things that you can do now to properly prepare for the future. Read on.

Date: 10/28/2015

Time: 11:00 am

Logo: Dell Software

Enabling the Remote Worker: Improve Productivity with Unified Communications

In this webinar, you will learn how to effectively measure your Unified Communications usage and diagnose problems should problems arise to keep your remote workers satisfied and staying productive. Learn more.

Date: 10/27/2015

Time: 11:00 am

Logo: imation

Get the Most out of Your Microsoft Investment and Save Money – Up to 95% Less Than a Laptop

Join us for this informative webinar and learn about Windows To Go, applicable use cases and how it can be an integral part of your mobility mix, and cost considerations and comparisons of laptops, VDI and Windows To Go. Learn more.

Date: 10/14/2015

Time: 11:00 am


Future-Proofing Your Data Protection Strategy

In this webcast you'll learn how legacy thinking around recovery is stemming your protection potential, what aspects of data protection keep your organization future-proof, and how virtualization and the cloud can be used for more than just backup and recovery. Read more.

Date: 10/19/2015

Time: 9:30 am

Logo: Veeam -It Just Works!

Essential Hyper-V Backup and Recovery Tips

This webinar focuses on challenges IT professionals face when it comes to providing effective availability within Microsoft Hyper-V environments. We’ll provide you with a list of common recovery techniques and tips to help aid you in managing your Always on Business. Read on.

Date: 10/15/2015

Time: 11:00 am

On Demand


Monitoring the Cloud: Keeping an Eye on What You Can’t See

In this webcast, join industry experts as they discuss how a move to cloud and virtualization impacts a view of the network, what performance factors you should be monitoring and how to identify performance issues.

What Is Hyperconvergence and Why Aren't You Using It?

If you are overworked but your critical applications still need some major TLC, learn how you can reduce your infrastructure costs, help you gain instant high availability and help save time and brain space managing your HA environment. Learn more!

Logo: symtrax

Taking your Document Validation Workflow Digital

Join us for a free webinar on Taking your Document Validation Workflow Digital - Tuesday, September 30th, 11:00 AM PST, USA


Give Your Business a Fighting Chance Against Email-borne Threats

In this webinar, you'll hear how you can prevent spam or phishing emails getting into or out of your network. Learn more.

Logo: colligo

Language of Support Pages

Language is the easiest thing to change in customer support, and it’s quite possibly the most important thing you can do for your customers. Best of all, it’s free. Join Sarah Hatter, founder of CoSupport, as she explores the amazing benefits of using language that’s more friendly, open and — above all — human.

Logo: Box

Secure Mobile Collaboration with Sharepoint and Box

This session examines how Microsoft SharePoint environments handle file sharing and collaboration, and some of the challenges businesses face adapting these legacy technologies to a new, more mobile world.

Logo: Dell Software

Cost-effective disaster recovery without a DR site? You bet.

Achieve effective disaster recovery without a physical DR site or extending your DR footprint. View this Microsoft partner webcast and learn to manage the growth of your backup archives while enabling multiple disaster recovery options.

Logo: Dell Software

Ten tasks to automate in active directory to save time, prove compliance and ensure security

Explore key Active Directory topics, including user-logon naming conventions, why you should standardize department names and other organizational attributes, and how to approach provisioning and deprovisioning accounts.

Logo: Dell Software

Make smarter access control decisions - and boost productivity

See how to add adaptive security to an already powerful combination of single sign-on access for internal and cloud-based web applications.

Logo: Dell Software

Ensuring the success of your IAM Projects

Leverage Dell’s knowledge gleaned from partnering and supporting hundreds of companies and real-world projects. Discover the keys to a successful, affordable and sustainable IAM implementation.


Best Practices for Office 365 Data Protection

Join Nathan O’Bryan (Microsoft Certified Solutions Master: Messaging and MVP Office 365) for this interactive webcast on best practices to help you keep your data safe in a new IT landscape built on cloud services.


Removing the Identity Barriers for Office 365

Learn the basics of Office 365’s requirements for identity management, explore how Office 365 integrates with on-premises directory services, and see a few surprises (both pleasant and unpleasant!) that may await you as part of your ID management deployment for Office 365.

Logo: BridgeWays

Monitor your InterSystems Caché database and proactively reduce the risk of unexpected system downtime.

Learn about how you can leverage the power of Microsoft’s System Center Operations Manager (SCOM) to monitor your InterSystems Caché database environment, whether you have SCOM in use or not.

Logo: Dell Software

The New World Order of Data Protection – Focus on Recovery

Sr. Advisory Analyst Greg Schulz discussed data protection and recovery trends as well as common IT organization threats, risks, challenges and needs.

Logo: Dell Software

What to Know about Exchange 2016, SharePoint 2016 and Office 365

Join a panel of Exchange and SharePoint experts as they discuss the most interesting and valuable changes you should know about.

Logo: Dell Software

Why PCI DSS Compliance Is More Important than Ever: An Auditor's Point of View

Join independent auditor Joe Grettenberger for the latest news on PCI DSS compliance and learn why the PCI Security Standards Council (SSC) is resolving to make PCI DSS compliance a program in your organization, rather than a periodic exercise. Learn more.

Simplification and Security: Building Your Business Case for Cloud Fax

As budgeting season has arrived, now is the perfect time to join our live webinar to discover the many benefits of faxing as a cloud service, and how you can build your case for deploying it throughout your entire organization — quickly, easily and cost-effectively. Register now!

Logo: Centrify

Proven Practices for O365 Deployment, Security and Management

Join Centrify and Perficient, to gain insights from over 2.5 million implementations and innovations that earned Centrify top rating in the Network World hands-on review of Single-sign-on solutions. Learn more.

Logo: Dell Software

Password Hashing Has Evolved. Are You Ready to Prevent The Real Risk of a Security Breach?

Watch this on-demand webcast to learn about strategies and tools that make it easy to prevent hashes from being harvested, detect the use of harvested hashes and address the target of many attacks (privileged accounts). Learn more!

Logo: Dell Software

Understanding Privileged User Compliance Requirements for PCI, HIPAA, SOX and ISO 27001

Watch this on-demand webcast to learn about the scope and intent of PCI, HIPAA, SOX and ISO 27001, along with the controls specific to privileged user access for each of these regulations. Plus much more.

SharePoint Security: Bridging the Active Directory Gap

Join industry experts and fellow IT pros as they discuss the problem of group management from a decidedly SharePoint perspective, and look to you to provide anecdotes, color, and insight into this problem.

Active Directory Groups: Out of Sight, Out of Mind, Out of Control

In this interactive webcast, join Nick Cavalancia and Jonathan Blackwell as they discuss AD Group red flags and group management best practices. Learn more now.

The 4 Biggest Time Sinks for IT Ops

Learn about the four most common IT time sinks and easy ways to control these time-wasters and reclaim your time.

Eliminate Print Servers: VCPI Simplifies Printing Across 2,400 Locations

Learn how VCPI was able to create a printing environment that is seamless to both traditional and mobile users, that reduces print-related WAN traffic and empowers user self-service, all the while allowing centralized management and eliminates the need for print servers. Find out more.


Go Mobile: The Good, the Bad and the Secure of Mobile Identities

This webinar will help you understand how mobile can be incorporated into your existing enterprise environment and will take a deeper dive into mobile identity, system architecture and threats. Learn more.

Why Hypervisor Convergence Is Disrupting Traditional Virtualization

This session highlights the virtualization convergence continuum covering everything from the DIY virtualization model on one end of the spectrum to hypervisor convergence on the other; defining and comparing each of the approaches in the market along the way.


Don’t Be Duped by De-Duplication

In this webinar, IT veteran, DR expert and tech journalist Jon Toigo will kick things off with a brief discussion of the current state of de-duplication. Then Toigo will discuss both the challenges and the potential benefits of intelligent de-duplication. Learn more.

VDI Cheaper than PCs? Yes, with RDS, Hyper-V and Layering Innovations

In this educational webcast, desktop virtualization experts Tom Rose from Unidesk and Thomas Willingham from Microsoft explain how Hyper-V and RDS advancements, along with new application layering technology, make VDI simpler and more affordable than physical PCs. Get app mobility and lower costs at the same time. Learn more.

The Fax Survival Webcast: How to Avoid a Doomsday Disaster with Cloud Fax Services

Learn how your company can forget about the headaches and hassles of fax by moving your operations to the cloud! Learn more.

Logo: Redmond Tech Advisor

Clouds and Disaster Recovery Planning

In this Redmond Supercast, Jon Toigo will look at the grey areas of cloud-based disaster recovery services, and assess the silver lining that disaster recovery experts insist that clouds can deliver today.

Best Practices for Onboarding to Office 365

Join Damon Tompkins, Chris Kolodziejski, and a special guest to learn best practices for onboarding to Office 365. You'll gain insight into potential onboarding pain points, how to identify them in your source environment, avoid them, and even remediate them. Learn more.

Logo: Unidesk

Hyper-V Security and Management Essentials

Hyper-V is the best value in virtualization. With 5nine and Unidesk, it's the most powerful, too. Learn how these Microsoft ISV partners are joining forces to make Hyper-V the most secure, cost-effective, and easiest to manage platform for VDI and other virtual workloads.

Logo: Dell Software

Email Is the Biggest Risk in Your Organization…and What to Do About It

Michael Osterman addresses the email-related risks your organization faces everyday and what you can do to eliminate them.

Choose Your Authentication

During the webcast, you’ll learn how flexible multi-factor authentication overcomes these issues and how you can achieve it without having to introduce added complexity to your existing environment.

SharePoint High Availability or Disaster Recovery?

We examine the pros and cons of SharePoint high availability content versus traditional system wide disaster recovery. The end result are several ways on supporting your business critical content in the future. Register now for more!

How to Automate Common File-Based Tasks

In this webinar, Adam Bertram will go over a common scenario that IT pros are faced with: secure B2B file transfer.

Active Directory Groups: Out of Sight, Out of Mind, Out of Control

In this interactive webcast, join Nick Cavalancia and Jonathan Blackwell as they discuss AD Group red flags and group management best practices.

Logo: Redmond Tech Advisor

Benefits and Best Practices of Deploying SSL Certificates

Are you unsure as to whether or not you should use SSL certificates in your infrastructure, or to what extent you should use them? You’ll find answers to your questions in this informative Webcast featuring MVP Nathan O’Bryan.

The Seven Rules of IT Disaster Recovery

During this webinar, experts from Acronis and Disaster Recovery Journal will share seven best practices that IT organizations should consider when architecting and implementing disaster recovery solutions. Learn more.

Logo: Veeam -It Just Works!

Virtualizing Exchange: Protection Made Easy

Join Jason Acord, Veeam Inside Systems Engineer Manager for this educational webinar to learn about the key benefits of virtualizing your Exchange environment, identify best practices and pitfalls to avoid, as well as show you some free tools for agentless eDiscovery, backup and recovery. Learn more.

IT and Business Benefits of Cloud Faxing

Join us for this webinar to learn how you can deploy faxing for your entire organization — with features like real-time status updates and 24/7 availability — quickly, easily and cost-effectively. Register now!

Logo: Mimecast. Unified email management.

Webinar featuring Forrester Research: The Human Firewall – Strengthening Email Security

Listen to guest speaker Nick Hayes from Forrester Research and Steve Malone from Mimecast for insight into how technology and awareness together can strengthen defenses.

Logo: Mimecast. Unified email management.

Office 365 Email Migration Surprises – Rhetoric vs. Reality

During this 37 minute webinar, Microsoft Office365 MVP J. Peter Bruzzese, will reveal the post migration surprises he’s heard most frequently from companies that have already made the move. He’ll provide his realistic assessment of what to expect and what to plan for when moving to the cloud.


Discover the Key to Supercharging SharePoint

SharePoint can be frustrating. But did you know there’s an easy way to get more out of your installation? Learn how a social collaboration solution can help supercharge it.

Webinar Recording

Want a More Secure Environment? See How Systems Management Can Help

You want a more secure environment. But while you’re likely employing some form of perimeter security, such as firewalls, intrusion detection, encrypted data transfer or other similar methods, are you paying attention to what is happening at the device level? Join this webcast and learn what IDC research manager Robert Young has to say about improving security through more comprehensive systems management of your connected endpoints.