Webcasts


On Demand

Encryption for End Users: What IT Managers Need to Know

When it comes to end-user security, hard-drive encryption is a key pillar to consider for your security strategy. Yet while it adds a layer of security and can be required for compliance, it also adds some challenges and creates risks of accidental data loss on individual PCs. Learn more.


How to Accelerate Your Veeam Backups to Azure

Using your Veeam solution for backup and replication to the Microsoft Azure cloud is a great start, but did you know it’s possible to make it better and faster? Read on.


The Extended Enterprise: Top 5 Things IT Must Know

Many organizations need to provide network access to their extended enterprise -- contractors, temp workers, partners, vendors, and others -- to effectively run their business. However, these users create unique challenges and introduce new cybersecurity risks. Join us to learn the top five questions IT must address to successfully manage the extended enterprise. Learn more.


Active Directory Migration Planning

Active Directory is the living heart of most IT organizations. No matter if your organization is on-premises, in the cloud, or in some hybrid situation somewhere in-between your on-premises Active Directory is most likely the most important part of your IT infrastructure. Read on.


10 Ways to Fail at Enterprise Data Protection in 2019

The data estate that organizations have to protect in 2019 is more complicated than ever. The old concept of a network perimeter is gone, bulldozed by cloud storage, Software as a Service applications, bring your own device practices, data on mobile phones and many employees who never really go off the clock no matter where they are. Learn more.


No Passwords, No Problem: Using WebAuthn to Stop Account Takeover

Want to eliminate passwords? We all do. WebAuthn is a new web standard published by the World Wide Web Consortium (W3C) for users in the era of passwordless authentication for web applications. Learn more.


Live Demo: Netwrix Auditor – Data Discovery & Classification Edition

Modern IT environments are so large and dynamic that it has become extremely difficult to keep track of all the critical and sensitive data stored there. Register now to find out how Netwrix Auditor — Data Discovery and Classification Edition can help. Register today!


Citrix Virtual Tech Summit

As your environment grows more diverse—more clouds, more devices, more types of apps—you need a more efficient and secure approach to management. At this technical online event for hands-on IT leaders, we’ll discuss the building blocks of a modern digital workspace. Register now!


How to Spend Your Security Budget in a DevOps World

In this session, Threat Stack Security Engineer, Mark Moore, and CFO, Kevin Durkin, will discuss the current state of security processes and investments as organizations shift to the cloud. Learn how to build a scalable security program that fits your organization’s budget. Join us on November 8th at 1pm ET! Sign up today!


Gain Control Over Windows 10 Updates

There’s no doubt about it, Windows 10 upgrades have caused disruption across IT departments. Our team of Windows 10 specialists will share stories from the field and tips for successful management of Windows 10 in this technical discussion. We’ll highlight the latest best practices that every company should follow and explore the usability of unified endpoint management toolsets from VMware, Citrix, and Microsoft asking, “Do they really solve the need?”


IT Security Horrors that Keep You Up at Night

One reason companies continue to get breached is that they are too focused on the wrong things. You lose sleep over the “shock and awe” security headlines in the news — while your executives and directors use a password of monkey123 without 2-factor authentication for their email. The good news is you can greatly increase the security of your network without spending thousands of dollars on shiny new boxes with pretty blinking lights!


Top Nine Insider Attacks and How to Spot Them

In this live webcast, Quest experts Shawn Barker and Ghazwan Khairi will be introducing our brand new product Change Auditor Threat Detection — a powerful solution for proactively detecting anomalous behavior based on user activity. You will discover ways to minimize your insider threat risk. Learn more.


Session 1 - The Human Factor: Malicious Insiders vs. Negligent End Users

Breaches resulting from insider misdeeds are front-page news on a regular basis. Unfortunately, the average employee misses a critical common thread across many these stories. It’s up to IT pros to understand the techniques attackers use, educate their users to avoid common traps, and take the necessary steps to avoid breaches. Learn more.


Reduce Your Security and Compliance Risks with IT Asset Inventory Management

To minimize security and compliance risks, as well as reduce costs on under-utilized hardware and software, IT pros need to inventory all IT assets their organization has and track changes to them. If done manually, these tasks require hours of tedious work, so many organizations seek tools that streamline the process. Learn more.


Align HR and IT to Streamline Employee Onboarding

Growing companies onboard 30 new employees, on average, each month. This is no small challenge for the HR and IT teams. Now is the time for onboarding processes that are automatic, efficient and secure. Learn more.