When it comes to traditional faxing, there’s a lot left to be desired — which is why businesses are turning to desktop cloud faxing. Take part in our upcoming webinar, 6 Reasons to Move to Cloud Faxing, to find out why cloud fax services are gaining popularity over traditional fax operations. Register now!
Time: 11:00 AM
Active Directory is an often-overlooked vulnerability and many organizations don’t realize there is a risk. Join us to learn the most common threats going into 2017, how to strengthen your total Active Directory infrastructure and how to protect your most privileged credentials against the growing threat of attack. Read on.
Time: 10:00 am
Windows 10 migration projects are highly complex and incredibly disruptive. In this webinar you’ll learn how to migrate faster, easier, and with no impact to the end user.
Time: 11:00 AM
VDI and end-user application virtualization solutions have come a long way in recent years, allowing for rapid deployment, massive scaling, and high-definition user experiences. Participate in this webcast to discover breakthrough trends for EUC/VDI and learn how you can leverage the momentum for your organization in 2017. Find out more.
Time: 9:00 am
Is 2017 the year your organization makes a SharePoint move? On this webinar, not only will you learn about these three actions, Microsoft MVP Levithan will also share his predictions about Microsoft, SharePoint and enterprise collaboration changes in 2017. Register now!
Time: 11:00 AM
In this live webcast, Microsoft MVP, Nathan O'Bryan will identify some of the pitfalls you may encounter when securing your hybrid Office 365 and Azure environments. Learn more.
Time: 11:00 am
For efficiency and simplicity, an organization’s Identity and Access Management (IAM) solution needs to provide an aggregated view of identities across all systems. Plus, it should enable managers to easily define and enforce the policies of their governance initiatives. Learn more.
Time: 11:00 am
Microsoft Active Directory is under siege by cyber criminals. Join us to discover why Active Directory is targeted so often, the attack techniques and tools used today, and a modern architecture that secures Active Directory. Learn more.
Security researcher and advocate Brook Chelmo will talk about ways to stop ransomware and other advanced persistent threats such as zero-day attacks and how you don’t have to be a security expert to protect your IT ecosystem.
Join two Microsoft MVPs as they explain where Office 365’s features stop and 3rd party tools may succeed by filling in some gaps around topics such as phishing, ransomware protection and monitoring. Learn more.
The Ransomware epidemic is frightening and making weekly headlines, but are you doing all that you can to protect yourself and your organization? In this webcast, Microsoft MVP Mike Crowley will explain what can be done to lower your attack surface as well as how to be respond in the event ransomware has penetrated your network. Don't wait until it’s too late to learn about this threat!
In this webinar, we discuss developing a strong information security foundation at the user and application level, creating a perimeter of defense by limiting access to systems through whitelisting/blacklisting and much more. Watch it!
Attend this 30-minute webinar and learn how the just-released CyberArk Endpoint Privilege Manager solution can: strengthen your existing endpoint protection to contain threats early in the attack life cycle; enforce least privilege on the endpoint without negative usability impact; mitigate the risks of ransomware; get a "privileged" view of this critical layer of protection and learn how you can block and contain attacks at the endpoint before they stop your business.
In this webinar, MVP and author Don Jones explores some of the ways your AD groups can be used against you, examining real-world hacks and attacks that almost every organization is susceptible to. He’ll also explore some of the capabilities and countermeasures you can deploy to protect and harden your AD group infrastructure. Learn more.
Join our new webcast and learn what you need to keep in mind when your data resides in the cloud.
Join technology expert and founder of Techvangelism, Nick Cavalancia, and Jordan Pusey, Product Marketing Manager at PrinterLogic, as they explore and discuss three print architectures in an effort to help you determine how to eliminate print servers and simplify print management. Learn more.
In this Redmond supercast, join industry experts as they discuss some very important backup economies of scale you should consider as part of your strategic planning to ensure you can deliver, no matter the demand put on IT. Register now!
Fax isn’t exactly the most modern form of business communication. But what many IT departments are realizing is this: It’s not fax that’s behind the times, it’s the execution. Register for our live webinar to discover why cloud faxing is catching on as a faster, cost-effective and more reliable alternative to fax machines and fax servers. Register now!
This webinar will identify the attack vectors against Active Directory domain controllers using the Microsoft STRIDE threat model approach and give you the confidence to ensure your Active Directory environment will survive a pen test and be safeguarded against an actual attack.
In this webcast Nathan O’Bryan (MVP Office Servers and Services, MCSM: Messaging) will walk through the important planning steps that can make your migration into Office 365 successful.
Learn how ransomware attackers are successful in delivering their malicious software and what techniques are the most common. You’ll also learn how to reduce the risk of becoming a ransomware victim through the use of process, procedure, and advanced technology. Finally, you’ll better understand how to recover from a successful ransomware attack and learn how to implement additional protection measures for added safety. Learn more.
Not a week goes by without hearing about a network breach of some major corporation, agency or public figure, including government officials! If these powerful entities have been compromised, what chance do you have? Hear industry experts describe today's threat landscape and offer some practical, every-day protections. Register now!
A significant portion of data access interruptions, data corruption events and downtime is the result of phishing, ransomware and social engineering attacks. Mobile devices, telework and cloud computing have expanded the attack, and it will take a hybrid strategy of data protection, secure computing practices and end-user education to meet the challenge. Get tips from data protection guru Jon Toigo.
In this webinar Microsoft MVP Greg Schulz will look at trends and issues including how different threat risk challenges impact your evolving environment, as well as opportunities to address them. He'll cover the 4-3-2-1 data protection and security rule. Join us!
Join Microsoft MVP, J. Peter Bruzzese, for his expertise and perspective on migrating to Office 365. Learn from the 1,000’s of organizations that he has helped transition to the cloud. Learn the positives and the potential pitfalls. Learn more.
It’s inevitable, you’re going to need to migrate to Windows 10 at some point. But making the move to the new OS isn’t as simple as putting new machines in place, or by running UPGRADE.EXE. There’s so much more to consider. So, what will it take to simplify the migration so it’s done right the first time? Register now and learn more!
As more companies adopt Office 365 and OneDrive, CISOs need to carefully consider the risks and vulnerabilities. Data leakage, compromised credentials, compliance exposure, and malware are just a few of the threats. Today, however, it is possible to make your data in the cloud more secure than in your data center. Learn more in this webcast.
Join Derek Melber, Active Directory MVP, as he guides you through the correct methods to set up Active Directory Change Monitoring. Derek will give you an inside scoop on the best way to report and setup alerts on the changes that you are tracking. Never miss key security changes in AD again! Read on.
Your journey to a flexible, scalable and secure IT universe begins now. Join virtualization experts for an interactive discussion empowering you to become the master of your software defined and virtual data center. Watch now!
Encrypting your data is becoming more important in a world where IT services are moving toward the cloud. In this 30-minute session, we’ll explore cloud encryption strategies and what they mean to your organization. Register now!
In this informative webcast, hear industry expert Nick Cavalancia as he discusses what defines the user lifecycle and who, why and how to automate it.
In this Redmond Tech Advisor webinar, learn how to embed security into your automated software deployment and management process. We'll cover what to look out for, the biggest patching and security compliance pain points, as well as strategies to adhere to Application Readiness best practices. Learn more.
Encrypting your data is becoming more important in a world where IT services are moving toward the cloud. In this 30-minute session, Nathan O'Bryan will explore cloud encryption strategies and what they mean to your organization. Register now!
Encrypting your data is becoming more important in a world where IT services are moving toward the cloud. In this 30-minute session, Nathan O'Bryan explores cloud encryption strategies and what they mean to your organization. Watch it now!