On Demand

Solving The Microsoft Support Problem: How to Choose the Right Alternative to Microsoft Unified

In this information-packed Tech Talk, enterprise software support experts Mike Jones and Josh Arras talk with veteran technology journalist John K. Waters about the challenges enterprises are facing in this potentially costly Premier-to-Unified transition.

Securing Azure Virtual Desktop with Remote Desktop Protocol Settings

Join us for a deep dive into Azure Virtual Desktop (AVD) security, where we will explore essential strategies to safeguard your virtual desktop environment. Register now!

Coffee Talk: Top Ransomware Lessons for IT Leaders

In this session, we'll discuss ransomware attacks in the context of a comprehensive program leveraging recovery strategies against attacks you can’t always prevent. Keep the data safe and keep the users working. Attend to learn how.

A Look at Group Policy Attack Paths

In today’s technological landscape, Active Directory (AD) is a constant attack point for attackers. A common vector of attack against Active Directory is via group policy. Group policy can be used as a very effective direct or indirect method of executing remote code, modifying security settings, changing user permissions, and much more.

Movers, Joiners, and Leavers: Managing personnel changes and external users in Microsoft 365

In this 45-minute, on-demand webinar, learn how to (safely) manage and secure licenses and user access. Learn more!

4 new ways to intelligently transform ITOps using AIOps-driven automation

Most enterprise ITOps organizations desire a state of self-healing systems capable of identifying and resolving issues without human intervention. While the allure of eliminating known, repeatable incident response workflows offers immense promise, these initiatives often fail to get off the ground. Learn how IT operations can jumpstart automation programs that tie together BigPanda Incident Intelligence with Red Hat® Ansible® Automation Platform – so you can go from knowledge to automated response.

Enhancing Cybersecurity in Education with Datto: Safeguarding Data and Learning Environments

This webinar aims to equip educational IT professionals, administrators, and decision-makers with the knowledge and strategies needed to protect student data, ensure uninterrupted learning, and navigate the cybersecurity landscape effectively using Datto's powerful tools. Join us to fortify your educational institution's cybersecurity defenses and ensure a safe learning environment for all.

Strategies for Implementing Simulation Training

Join some of the industry's top security experts for this three-hour crash course on how to foster a culture of cybersecurity vigilance in your organization.

End User Ransomware Training Tips, Tricks and Pitfalls

Join this webinar for a new approach to building cyber resilience for the employees on the front lines of your organization.

Why You Need End User Ransomware Training (and How To Do It So They Listen) Summit

Join some of the industry's top security experts for this three-hour crash course on how to foster a culture of cybersecurity vigilance in your organization.

Microsoft 365 Backup & Recovery 101: What To Avoid, What To Do and How To Manage It Summit

Join us for this free, half-day summit where some of the industry’s top independent experts will share their tried-and-true methods for designing, implementing and managing a disaster-proof Microsoft 365 backup and recovery plan. Make sure your Microsoft 365 data doesn’t get lost to the ether if (or when) disaster strikes – register today!

Top 7 Microsoft 365 Backup & Recovery Challenges (and How To Overcome Them)

If you are an IT professional or a business leader, and you use Exchange, SharePoint, Teams, or other Microsoft 365 applications, you will benefit from this session. This session will help you ensure the security and availability of your Microsoft 365 data and services.

Modern Microsoft 365 Backup & Recovery Best Practices for Modern Disasters

Microsoft 365 creates a far more granular environment in which users and their resources are often far more isolated than before, potentially creating far greater resilience than ever if managed properly. In this session, Senior Resultant Howard M. Cohen looks forward to suggest how we can better prepare our networks, our data, our devices, and our people to survive and successfully recover from all these modern disasters and more.

Open-Source Intelligence (OSINT): Learn the Methods Bad Actors Use to Hack Your Organization

Join Rosa Smothers, former CIA Cyber Threat Analyst and Technical Intelligence Officer, now KnowBe4’s SVP of Cyber Operations, as she reveals the OSINT techniques employed by cybercriminals that can help you protect your organization before disaster strikes.

Coffee Talk: End User Experience Monitoring 101

Are you struggling to understand user complaints about application performance? Register Now to learn how monitoring end user experience can help you better optimize your applications and more! thank you