What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here


To register for multiple webcasts, please check the box beside the item and click the submit button.


Mitigating the Threat of Data Theft by Departing Employees

Every day, your employees access a wide variety of electronic information, ranging from trivial to important and highly confidential. However, your organization may be in jeopardy when one of these employees when leaving the company decides to grab sensitive data. Can you prevent this from happening? Register for this webcast and find out how!

Date: 02/28/2017

Time: 8:00 AM

How to Spot and Prevent Malware Infection

The war against malware attackers is real, and there are many ways you may become a target. Offense should inform your defense: understanding how, when and where you are vulnerable should shape your plan of action. Learn how to protect your organization from security expert Ian Trump.

Date: 03/15/2017

Time: 11:00 am

Leveraging Virtualization to Simplify Disaster Recovery Planning

In this session you'll learn how virtualization in all its manifold forms can make BC/DR planning easier to manage and improve your infrastructure's flexibility. Learn more.

Date: 03/14/2017

Time: 11:00 am

Patch for SCCM, Application Control and Xtraction

System Center Configuration Manager reaches across your enterprise and is effectively managing updates for Windows OS and Microsoft apps. The bad news? This addresses just 20 percent of your software vulnerabilities.

Date: 03/30/2017

Time: 11:00 am

Ransomware Hostage Rescue Guide

Join Erich Kron CISSP, Technical Evangelist at KnowBe4 for a live webinar “Ransomware Hostage Rescue Guide”. We will look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and what to do when you are hit with ransomware. Learn more.

Date: 03/01/2017

Time: 11:00 am

Power to the End User: Self Service Password Reset for Mobile Users

Attend this free webcast to understand the different options available to allow users to reset passwords when away from the network, see the benefits of each password reset solution and more!

Date: 03/09/2017

Time: 10:00 am

Efficiently Provisioning Users in Active Directory, Office 365, and Google

There is no reason that user accounts should not be created in Google and Office 365 when you are creating users in Active Directory. Come see how you can efficiently create users and their group membership at the same time, all from one easy console.

Date: 02/21/2017

Time: 10:00 am

Indications of Compromise: How to Spot and Prevent Malware Infection

Learn the key role of antivirus and patching in reducing the attack surface; how to build infrastructure that contains and isolates malware from infecting the rest of the network; and what to do once you have detected an infection to mitigate impact.

Date: 02/21/2017

Time: 11:00 am

Protecting Your Valuable Office 365 Assets

In this Redmond supercast, you will learn not only how to implement effective disaster recovery in the Office 365 cloud, but also how to restore lost data confidently and efficiently. Learn more.

Date: 02/28/2017

Time: 11:00 am

6 Reasons to Move to Cloud Faxing

When it comes to traditional faxing, there’s a lot left to be desired — which is why businesses are turning to desktop cloud faxing. Take part in our upcoming webinar to find out why cloud fax services are gaining popularity over traditional fax operations. Register now!

Date: 02/21/2017

Time: 11:00 AM

5 Ways to Migrate Thousands of Users to Windows 10 Fast

Windows 10 migration projects are highly complex and incredibly disruptive. In this webinar you’ll learn how to migrate faster, easier, and with no impact to the end user.

Date: 02/22/2017

Time: 11:00 AM

On Demand

Top Five Office 365 Migration Headaches and How to Avoid Them

In this on-demand webcast, discover the top five Microsoft Office 365 migration challenges – and how to avoid them – so you have a seamless transition to with little or no business impact.

StarWind Storage Appliance: Highly Performing and Extremely Fault-Tolerant Storage

Learn about the StarWind Storage Appliance and see how you can benefit from cost-efficient and easily scalable storage.

Active Directory – To Secure or not to Secure? No longer a question

Active Directory is an often-overlooked vulnerability and many organizations don’t realize there is a risk. Join us to learn the most common threats going into 2017, how to strengthen your total Active Directory infrastructure and how to protect your most privileged credentials against the growing threat of attack. Read on.

State of End User Computing

VDI and end-user application virtualization solutions have come a long way in recent years, allowing for rapid deployment, massive scaling, and high-definition user experiences. Participate in this webcast to discover breakthrough trends for EUC/VDI and learn how you can leverage the momentum for your organization in 2017. Find out more.

State of End User Computing

VDI and end-user application virtualization solutions have come a long way in recent years, allowing for rapid deployment, massive scaling, and high-definition user experiences. Participate in this webcast to discover breakthrough trends for EUC/VDI and learn how you can leverage the momentum for your organization in 2017. Find out more.

SharePoint Migration: A Three Step Plan for Your Success in 2017

Is 2017 the year your organization makes a SharePoint move? On this webinar, not only will you learn about these three actions, Microsoft MVP Levithan will also share his predictions about Microsoft, SharePoint and enterprise collaboration changes in 2017. Register now!

State of End User Computing

VDI and end-user application virtualization solutions have come a long way in recent years, allowing for rapid deployment, massive scaling, and high-definition user experiences. Participate in this webcast to discover breakthrough trends for EUC/VDI and learn how you can leverage the momentum for your organization in 2017. Find out more.

Why You Should Protect Active Directory in 2017

Microsoft Active Directory is under siege by cyber criminals. Join us to discover why Active Directory is targeted so often, the attack techniques and tools used today, and a modern architecture that secures Active Directory. Learn more.

Securing your Hybrid Office 365 and Azure Environments

In this webcast, Microsoft MVP, Nathan O'Bryan will identify some of the pitfalls you may encounter when securing your hybrid Office 365 and Azure environments. Learn more.

Innovate and Transform and Become the Next Uber or Amazon

For efficiency and simplicity, an organization’s Identity and Access Management (IAM) solution needs to provide an aggregated view of identities across all systems. Plus, it should enable managers to easily define and enforce the policies of their governance initiatives. Learn more.

Securing Your Organization from Ransomware

Security researcher and advocate Brook Chelmo will talk about ways to stop ransomware and other advanced persistent threats such as zero-day attacks and how you don’t have to be a security expert to protect your IT ecosystem.

Do You Need Built-in or Bolt-on Security for Office 365?

Join two Microsoft MVPs as they explain where Office 365’s features stop and 3rd party tools may succeed by filling in some gaps around topics such as phishing, ransomware protection and monitoring. Learn more.

The Cost of Doing Nothing: A Ransomware Backup Story

The Ransomware epidemic is frightening and making weekly headlines, but are you doing all that you can to protect yourself and your organization? In this webcast, Microsoft MVP Mike Crowley will explain what can be done to lower your attack surface as well as how to be respond in the event ransomware has penetrated your network. Don't wait until it’s too late to learn about this threat!

Are Your Active Directory Groups a Security Exploit Waiting to Happen?

In this webinar, MVP and author Don Jones explores some of the ways your AD groups can be used against you, examining real-world hacks and attacks that almost every organization is susceptible to. He’ll also explore some of the capabilities and countermeasures you can deploy to protect and harden your AD group infrastructure. Learn more.

Cloud Security: Who's Responsible for Your Critical Assets?

Join our new webcast and learn what you need to keep in mind when your data resides in the cloud.

Simplifying Print Management: Kill the Print Server

Join technology expert and founder of Techvangelism, Nick Cavalancia, and Jordan Pusey, Product Marketing Manager at PrinterLogic, as they explore and discuss three print architectures in an effort to help you determine how to eliminate print servers and simplify print management. Learn more.

Improve Backup Capabilities With Limited Resources

In this Redmond supercast, join industry experts as they discuss some very important backup economies of scale you should consider as part of your strategic planning to ensure you can deliver, no matter the demand put on IT. Watch now!

Freedom From Fax: Why IT Departments Love the Cloud

Fax isn’t exactly the most modern form of business communication. But what many IT departments are realizing is this: It’s not fax that’s behind the times, it’s the execution. Register for our live webinar to discover why cloud faxing is catching on as a faster, cost-effective and more reliable alternative to fax machines and fax servers. Register now!

Will Your Active Directory Environment Survive a Penetration Test?

This webinar will identify the attack vectors against Active Directory domain controllers using the Microsoft STRIDE threat model approach and give you the confidence to ensure your Active Directory environment will survive a pen test and be safeguarded against an actual attack.

Planning Your Migration to the Microsoft Cloud

In this webcast Nathan O’Bryan (MVP Office Servers and Services, MCSM: Messaging) will walk through the important planning steps that can make your migration into Office 365 successful.

The Ransomware Epidemic: Preventing, Mitigating, and Recovering from Ransomware Attacks

Learn how ransomware attackers are successful in delivering their malicious software and what techniques are the most common. You’ll also learn how to reduce the risk of becoming a ransomware victim through the use of process, procedure, and advanced technology. Finally, you’ll better understand how to recover from a successful ransomware attack and learn how to implement additional protection measures for added safety. Learn more.

Preventing and Mitigating Ransomware Infections

Not a week goes by without hearing about a network breach of some major corporation, agency or public figure, including government officials! If these powerful entities have been compromised, what chance do you have? Hear industry experts describe today's threat landscape and offer some practical, every-day protections. Register now!

The Expanding IT Attack Surface

A significant portion of data access interruptions, data corruption events and downtime is the result of phishing, ransomware and social engineering attacks. Mobile devices, telework and cloud computing have expanded the attack, and it will take a hybrid strategy of data protection, secure computing practices and end-user education to meet the challenge. Get tips from data protection guru Jon Toigo.

Next Steps to Enhance Your Data Protection Infrastructure

In this webinar Microsoft MVP Greg Schulz will look at trends and issues including how different threat risk challenges impact your evolving environment, as well as opportunities to address them. He'll cover the 4-3-2-1 data protection and security rule. Join us!

Office 365 Migration War Stories

Join Microsoft MVP, J. Peter Bruzzese, for his expertise and perspective on migrating to Office 365. Learn from the 1,000’s of organizations that he has helped transition to the cloud. Learn the positives and the potential pitfalls. Learn more.

Migrating to Windows 10: Starting Fast, Finishing Strong

It’s inevitable, you’re going to need to migrate to Windows 10 at some point. But making the move to the new OS isn’t as simple as putting new machines in place, or by running UPGRADE.EXE. There’s so much more to consider. So, what will it take to simplify the migration so it’s done right the first time? Register now and learn more!

What Every CISO Needs to Know About Office 365 Security

As more companies adopt Office 365 and OneDrive, CISOs need to carefully consider the risks and vulnerabilities. Data leakage, compromised credentials, compliance exposure, and malware are just a few of the threats. Today, however, it is possible to make your data in the cloud more secure than in your data center. Learn more in this webcast.

Active Directory Monitoring: Go From Novice to Pro in Under 45 Minutes

Join Derek Melber, Active Directory MVP, as he guides you through the correct methods to set up Active Directory Change Monitoring. Derek will give you an inside scoop on the best way to report and setup alerts on the changes that you are tracking. Never miss key security changes in AD again! Read on.

The O.A.R. of Virtualization Scaling

Your journey to a flexible, scalable and secure IT universe begins now. Join virtualization experts for an interactive discussion empowering you to become the master of your software defined and virtual data center. Watch now!