What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webcasts

To register for multiple webcasts, please check the box beside the item and click the submit button.

Upcoming

Get Ahead of Your Windows 10 Migration

In this webinar, you’ll get practical advice on how to reduce complexity, ease migration challenges, and migrate users with minimal interruption during a Windows 10 migration. Learn more.

Date: 05/16/2017

Time: 8:00 am


The Rise of Office 365 and Cloud Apps: Expanding Protection to All End-User Data

Join Dan Canning, of Microsoft, who’ll share details on Office 365’s benefits, adoption rate, and enterprise use cases; and Seyi Verma, Product Marketing, from Druva, on the need to protect, manage, centralized and backup fragmented information across cloud apps and services. Read on.

Date: 05/10/2017

Time: 11:00 am


Tips, Best Practices and Pitfalls for AD Group Management

Join MVP and author Don Jones for a concise look at some of the best practices and tips the industry has developed in a decade-plus of AD group management…and to learn about the group management pitfalls that still plague so many companies. Learn more.

Date: 05/09/2017

Time: 11:00 am


How Skype for Business and Enterprise Mobility are Redefining Workplace Collaboration

Join Brent Kelly, Ph.D., Principal Analyst at KelCor and Martin Præst, Spectralink’s Business Director, as they illustrate how the integration of enterprise mobility solutions with Microsoft Skype for Business can improve employee collaboration and productivity. Read on.

Date: 05/03/2017

Time: 8:00 am


Too Many Threats. Not Enough Defenses.

This webcast takes a strategic approach to IT threats from spear phishing and fraud to targeted attacks to insider threats. You’ll learn how to evaluate your approach to protect your company.

Date: 05/09/2017

Time: 11:00 am


Defeating the Encrypted Threat!

Once you have seen what the bad guys have been up to today, you will be exposed to a crash course of security policy management and network security architecture design that will help prevent the breach of tomorrow.

Date: 05/10/2017

Time: 11:00 am


Email Email Archiving, Compliance and Ransomware: How to Reduce Risk, Cost and Complexity

In this webinar, we’ll look at the key cost, compliance and risk-based challenges for midsize and decentralized organizations, with solutions for midsize and ROBO environments. Learn more.

Date: 05/11/2017

Time: 11:00 am


Freedom from Fax: Why IT Departments Love the Cloud

When old-school fax communications run amuck, IT people are often left to clean up the mess. Luckily, there’s a solution IT departments can turn to for help: cloud fax services. Attend this 30-minute webcast to discover how cloud faxing can benefit your business and IT department. Sign up now!

Date: 04/27/2017

Time: 11:00 AM


On Demand

Address GDPR Requirements with Netwrix Auditor

Watch this webinar recording, which is all about the GDPR and practical tips on how Netwrix Auditor can help you address its requirements. View now!


How to Rapidly Deploy Active Directory

Join Greg Shields, author evangelist with Pluralsight, in this exploration into rapid deployment for Active Directory. Greg will show you two easy-to-generate scripts that use PowerShell Desired State Configuration to swiftly hydrate a test-ready Active Directory into existence. Learn more.


Endpoint Security vs. Ransomware: The 2017 State of the Battle

In this informative webcast, join industry expert Nick Cavalancia, and Stu Sjouwerman from KnowBe4, as they share the results of KnowBe4’s 2017 Endpoint Protection Ransomware Effectiveness Report. You will receive an overview of the current state of ransomware, learn the use and effectiveness of methods in use today and explore practical ways to stop ransomware. Learn more


Best Practices for Windows 10 Migration

In this webcast Lenovo will equip you with the knowledge you need to plan a smooth transition to Windows 10. Learn more.


SaaS-Based Print Management: Kill the Print Server

Join technology expert and founder of Techvangelism, Nick Cavalancia, and Jordan Pusey, Product Marketing Manager at PrinterLogic, as they explore and discuss the benefits of moving to the cloud to eliminate print servers and simplify print management.


Secure Your Active Directory

Active Directory plays a critical role in your company’s IT infrastructure. Microsoft published 300+ pages of guidance, but who has the time, money and resources to implement? Skyport will show you an easier way to secure facets of you AD infrastructure.


So You've Migrated to Office 365. Now What?

Join Microsoft Cloud & Datacenter MVP Tim Warner and Quest Product Manager Shawn Barker as they break down, in clear language and with hands-on demos, how you can reach your learning curve with the Office 365 platform while preserving your sanity. Learn more.


Office 365 Best Practices That You Are Not Thinking About: Managing Security and Compliance

In this webcast Microsoft MVP Mike Crowley from Baseline Technologies will explain how to translate your existing security and compliance requirements to Microsoft’s cloud-based tools.


Reducing Risk in Application Deployment Lifecycle

Microsoft MVP Tim Warner outlines the problem and offers practical strategies for transitioning your application publishing infrastructure from a reactive to a proactive position. You'll learn new methods for scanning and verifying software, and how to publish the vetted apps to System Center Configuration Manager (SCCM) or to an enterprise app store to facilitate self-service. Learn more.


5 Security Questions to Ask When Deploying Office 365

In this webinar, we'll detail the security gaps in Office 365 and explore how new approaches to cloud security can help mitigate the threat of data leakage with real-world use cases. Join our webinar to find out which questions you should be asking about Office 365 security.


Architectural Decisions that Maximize Office 365 Benefits

In this session, you will get a deep dive on common pitfalls when deploying Office 365, why they are overlooked and how to avoid similar challenges. You'll also learn about real world use cases architected around best-of-breed technologies that enabled and accelerated Office 365 deployments. Find out more.


Replacing Your Disaster Recovery Site with Microsoft Azure: How to Get Started

In this session, Microsoft MVP Tim Warner explains in plain language what you need to think about in planning disaster recovery sites in the Microsoft Azure public cloud. Learn more.


How Phishing and Social Engineering Became the #1 Attack Vector

Join Nathan O'Bryan and Stu Sjouwerman as they explore how phishing and social engineering have become the #1 attack vector all IT departments need to worry about, and what you can do to ensure your data remains in your control like mobilizing your end-users as your last line of defense. Learn more in this webcast.


Optimize Availability with Purpose-built Backup Appliances

Join experts from Storage Swiss and Veeam to learn more about the different types of PBBAs and how to choose industry-leading Availability solutions that’s storage-agnostic, cloud-ready and can support the demands of the always-on enterprise.


Enforcing Modern Authentication Factors for Microsoft Office 365

Over the last 20 years, cyber security has evolved and now dominates the headlines. More than ever, users are accessing their messaging and productivity tools from untrusted networks, devices and workstations and providing multi-factor and analytics has never been more critical. On this webinar, Okta's Marc Jordan and Anat Shiwak discuss how to remove the identity barriers for your Office 365 migration while building a modern, secure foundation for your Office 365 migration and future cloud strategy that doesn't rely on legacy security tools.


Office 365 Lifecycle Management Deep Dive

Customers migrating to Office 365 have complex requirements, such as having to work around unique user access and governance challenges that may involve their employees, customers, partners and providers. Solving these unique challenges while providing seamless access across your user populations is an issue many businesses face – but management can be achieved.


Seven Features to Investigate in a Cloud Fax Service

Savvy businesses understand that fax isn’t going away anytime soon‚ and for that reason‚ your organization should be reaping the benefits made possible by a cloud-based faxing service. Learn more in this webcast!


4 Homegrown AD Group Management Solutions I’ve Built (that Don’t Really Work)

Join AD group guru Greg Shields from Pluralsight in this exploration of what works – and what’s monstrously not worked – in group management over the years. You’ll learn the homegrown tricks as well as some of the more modern, and still cost-effective, solutions that IT orgs these days are using to solve this age-old problem.


Smart Tips for Active Directory Security

Simply locking down the Enterprise Admins group isn’t enough to ensure a safe AD environment. From configuration settings to group management, there’s a slew of quick fixes you can make, and some major process changes that you can implement. Join MVP and author Don Jones for a concise rundown of these high-impact tips and techniques.


Mitigating the Threat of Data Theft by Departing Employees

Every day, your employees access a wide variety of electronic information, ranging from trivial to important and highly confidential. However, your organization may be in jeopardy when one of these employees when leaving the company decides to grab sensitive data. Can you prevent this from happening? Register for this webcast and find out how!


How to Spot and Prevent Malware Infection

The war against malware attackers is real, and there are many ways you may become a target. Offense should inform your defense: understanding how, when and where you are vulnerable should shape your plan of action. Learn how to protect your organization from security expert Ian Trump. Watch now.


Beyond Simple Fax and FTP: Reasons to Deploy Intelligent Fax and Secure File Transfer Solutions

Join Will Robinson, Vice President at Biscom, and Tim Warner, Microsoft MVP, as they discuss concrete ways that organizations can modernize their fax and file-transfer solutions to save time and money.


Top Five Office 365 Migration Headaches and How to Avoid Them

In this on-demand webcast, discover the top five Microsoft Office 365 migration challenges – and how to avoid them – so you have a seamless transition to with little or no business impact.


Leveraging Virtualization to Simplify Disaster Recovery Planning

In this session you'll learn how virtualization in all its manifold forms can make BC/DR planning easier to manage and improve your infrastructure's flexibility. Watch now.


StarWind Storage Appliance: Highly Performing and Extremely Fault-Tolerant Storage

Learn about the StarWind Storage Appliance and see how you can benefit from cost-efficient and easily scalable storage.


SCCM Is Working For You—But Is It Working Hard Enough?

System Center Configuration Manager reaches across your enterprise and is effectively managing updates for Windows OS and Microsoft apps. The bad news? This addresses just 20 percent of your software vulnerabilities.


Ransomware Hostage Rescue Guide

Join Erich Kron CISSP, Technical Evangelist for a live webinar. We will look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and what to do when you are hit with ransomware. Learn more.


Power to the End User: Self Service Password Reset for Mobile Users

Watch this webcast to understand the different options available to allow users to reset passwords when away from the network, see the benefits of each password reset solution and more! Available on-demand.


Efficiently Provisioning Users in Active Directory, Office 365, and Google

There is no reason that user accounts should not be created in Google and Office 365 when you are creating users in Active Directory. Come see how you can efficiently create users and their group membership at the same time, all from one easy console.


Indications of Compromise: How to Spot and Prevent Malware Infection

Learn the key role of antivirus and patching in reducing the attack surface; how to build infrastructure that contains and isolates malware from infecting the rest of the network; and what to do once you have detected an infection to mitigate impact.


Protecting Your Valuable Office 365 Assets

In this Redmond supercast, you will learn not only how to implement effective disaster recovery in the Office 365 cloud, but also how to restore lost data confidently and efficiently. Learn more.


6 Reasons to Move to Cloud Faxing

When it comes to traditional faxing, there’s a lot left to be desired — which is why businesses are turning to desktop cloud faxing. Take part in our upcoming webinar to find out why cloud fax services are gaining popularity over traditional fax operations. Register now!


Active Directory – To Secure or not to Secure? No longer a question

Active Directory is an often-overlooked vulnerability and many organizations don’t realize there is a risk. Join us to learn the most common threats going into 2017, how to strengthen your total Active Directory infrastructure and how to protect your most privileged credentials against the growing threat of attack. Read on.


State of End User Computing

VDI and end-user application virtualization solutions have come a long way in recent years, allowing for rapid deployment, massive scaling, and high-definition user experiences. Participate in this webcast to discover breakthrough trends for EUC/VDI and learn how you can leverage the momentum for your organization in 2017. Find out more.


5 Ways to Migrate Thousands of Users to Windows 10 Fast

Windows 10 migration projects are highly complex and incredibly disruptive. In this webinar you’ll learn how to migrate faster, easier, and with no impact to the end user.


State of End User Computing

VDI and end-user application virtualization solutions have come a long way in recent years, allowing for rapid deployment, massive scaling, and high-definition user experiences. Participate in this webcast to discover breakthrough trends for EUC/VDI and learn how you can leverage the momentum for your organization in 2017. Find out more.


SharePoint Migration: A Three Step Plan for Your Success in 2017

Is 2017 the year your organization makes a SharePoint move? On this webinar, not only will you learn about these three actions, Microsoft MVP Levithan will also share his predictions about Microsoft, SharePoint and enterprise collaboration changes in 2017. Register now!


State of End User Computing

VDI and end-user application virtualization solutions have come a long way in recent years, allowing for rapid deployment, massive scaling, and high-definition user experiences. Participate in this webcast to discover breakthrough trends for EUC/VDI and learn how you can leverage the momentum for your organization in 2017. Find out more.


Why You Should Protect Active Directory in 2017

Microsoft Active Directory is under siege by cyber criminals. Join us to discover why Active Directory is targeted so often, the attack techniques and tools used today, and a modern architecture that secures Active Directory. Learn more.


Securing your Hybrid Office 365 and Azure Environments

In this webcast, Microsoft MVP, Nathan O'Bryan will identify some of the pitfalls you may encounter when securing your hybrid Office 365 and Azure environments. Learn more.


Innovate and Transform and Become the Next Uber or Amazon

For efficiency and simplicity, an organization’s Identity and Access Management (IAM) solution needs to provide an aggregated view of identities across all systems. Plus, it should enable managers to easily define and enforce the policies of their governance initiatives. Learn more.


Securing Your Organization from Ransomware

Security researcher and advocate Brook Chelmo will talk about ways to stop ransomware and other advanced persistent threats such as zero-day attacks and how you don’t have to be a security expert to protect your IT ecosystem.


The Cost of Doing Nothing: A Ransomware Backup Story

The Ransomware epidemic is frightening and making weekly headlines, but are you doing all that you can to protect yourself and your organization? In this webcast, Microsoft MVP Mike Crowley will explain what can be done to lower your attack surface as well as how to be respond in the event ransomware has penetrated your network. Don't wait until it’s too late to learn about this threat!


Are Your Active Directory Groups a Security Exploit Waiting to Happen?

In this webinar, MVP and author Don Jones explores some of the ways your AD groups can be used against you, examining real-world hacks and attacks that almost every organization is susceptible to. He’ll also explore some of the capabilities and countermeasures you can deploy to protect and harden your AD group infrastructure. Learn more.


Cloud Security: Who's Responsible for Your Critical Assets?

Join our new webcast and learn what you need to keep in mind when your data resides in the cloud.


Next Steps to Enhance Your Data Protection Infrastructure

In this webinar Microsoft MVP Greg Schulz will look at trends and issues including how different threat risk challenges impact your evolving environment, as well as opportunities to address them. He'll cover the 4-3-2-1 data protection and security rule. Join us!