What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here


To register for multiple webcasts, please check the box beside the item and click the submit button.


Reimagining Legacy Information Management and Protection

See how a next-generation scale-out storage solution seamlessly scales from a few TBs to PBs with zero configuration, delivers an all-flash storage solution for virtual environments and high performing backup/recovery at less than $.40/GB, and much more.

Date: 06/21/2017

Time: 11:00 am

Achieving Availability in an Always-On Data Center

Join Nick Cavalancia, industry expert and founder of Techvangelism, and experts from Cisco and Veeam as they discuss the availability challenge in the modern data center, how hyperconvergence can help to achieve availability, and why backups play an equally critical role in maintaining an available data center. Learn more.

Date: 06/06/2017

Time: 11:00 am

Catch It All: Adopt Office 365 With Modern Data Protection and Compliance Measures

Across organizations, Office 365 is accelerating the digital transformation. This transformation also includes many other popular SaaS applications. This means new ways of communication and collaboration. As employees feel empowered to achieve more, what new considerations does this means for you to ensure security, protect data, and mitigate compliance risk? Learn more and sign up now!

Date: 06/20/2017

Time: 10:00 AM

GDPR Compliance Planning for Microsoft Environments

This webinar looks at the General Data Protection Regulation (GDPR) and its impact on Microsoft environments. Specifically, we look at how GDPR along with other future compliance directives impact Microsoft cloud, on premise and hybrid environments, as well as what you can do to be prepared before the deadline.

Date: 06/22/2017

Time: 7:00 am

IT and Business Benefits of Cloud Faxing

Join us for this webinar to learn how you can deploy faxing for your entire organization — with features like real-time status updates and 24/7 availability — quickly, easily and cost-effectively. Plus, find out how cloud services lay the foundation for data capture, workflow tools, postal mail automation and business process improvements that go far beyond fax. Learn more.

Date: 06/15/2017

Time: 11:00 AM

Take Me Out of the Loop: Getting Rid of AD and Group Management

Remember how, when you were applying for your first IT job, you thought, “wow, I can’t wait to spend all day updating AD information and managing group memberships!” No? Microsoft MVP Don Jones is right there with you, and wonders why and how IT got saddled with this ridiculous, distinctly non-technical job task. Better yet, he’ll outline key capabilities you can implement (or acquire) to take yourself out of that rat race forever. Sign up now.

Date: 06/29/2017

Time: 11:00 am

Tales from the Trenches: How AD Groups Got Us Hacked

Join Microsoft MVP Don Jones for a harrowing, true-life tale of terror. Don shares the anonymized details of a colleague whose organization was hacked, costing them over a quarter million in damages and mitigations, all traceable to a specific problem with their AD group management. Learn more.

Date: 06/22/2017

Time: 11:00 am

Warned and Armed: How to Shield Your IT Infrastructure from Ransomware

Join our new webinar and learn how to detect the ransomware on time and stop it from spreading through your network!

Date: 05/25/2017

Time: 9:00 am

Predicting the Future of Endpoint Management in a Mobile World

Join Microsoft MVP Timothy Warner and KACE Sales Engineer Nick Morea to get a feel for looming changes in the endpoint management landscape over the next 6 months to 5 years and learn about imminent trends, risks and opportunities. Learn more.

Date: 06/15/2017

Time: 11:00 am

Live Webcast - VMware Backup: Best Practices and Strategies

Join Michael White and learn about the realities and challenges of the most widely used VMware backup strategies, the differences between image-based and file-based backups for VMware VMs and VMware backup best practices. Learn more.

Date: 06/28/2017

Time: 11:00 am

On Demand

How to Audit Office 365 and Exchange Online Privileged Operations and Mailbox Access

Moving Exchange to the cloud? It’s time to consider your compliance and security responsibilities. Watch this on-demand webcast for ways to keep your complex cloud or hybrid environment secure and in compliance. Watch now!

Office 365 Security - How to Secure Access Control in Office 365 Environments

Moving to the cloud empowers your business – but it may weaken security. In this on-demand webast, get best practices for minimizing the risks of moving to the cloud. Watch now!

How to Build a Hybrid-Cloud Edge Architecture

Learn how to easily and securely enable application deployment in hybrid cloud environments and how to make your infrastructure cloud ready. Find out how you can become a cloud enabler. Register now.

Address GDPR Requirements with Netwrix Auditor

Watch this webinar recording, which is all about the GDPR and practical tips on how Netwrix Auditor can help you address its requirements. View now!

Get Ahead of Your Windows 10 Migration

In this webinar, you’ll get practical advice on how to reduce complexity, ease migration challenges, and migrate users with minimal interruption during a Windows 10 migration. Learn more.

How to Rapidly Deploy Active Directory

Join Greg Shields, author evangelist with Pluralsight, in this exploration into rapid deployment for Active Directory. Greg will show you two easy-to-generate scripts that use PowerShell Desired State Configuration to swiftly hydrate a test-ready Active Directory into existence. Learn more.

The Rise of Office 365 and Cloud Apps: Expanding Protection to All End-User Data

Join Dan Canning, of Microsoft, who’ll share details on Office 365’s benefits, adoption rate, and enterprise use cases; and Seyi Verma, from Druva, on the need to protect, manage, centralized and backup fragmented information across cloud apps and services. Read on.

Tips, Best Practices and Pitfalls for AD Group Management

Join MVP and author Don Jones for a concise look at some of the best practices and tips the industry has developed in a decade-plus of AD group management…and to learn about the group management pitfalls that still plague so many companies. Learn more.

How Skype for Business and Enterprise Mobility are Redefining Workplace Collaboration

Join Brent Kelly, Ph.D., Principal Analyst at KelCor for an illustration on how the integration of enterprise mobility solutions with Microsoft Skype for Business can improve employee collaboration and productivity. Read on.

Too Many Threats. Not Enough Defenses.

This webcast takes a strategic approach to IT threats from spear phishing and fraud to targeted attacks to insider threats. You’ll learn how to evaluate your approach to protect your company.

Defeating the Encrypted Threat!

Once you have seen what the bad guys have been up to today, you will be exposed to a crash course of security policy management and network security architecture design that will help prevent the breach of tomorrow.

Email Archiving, Compliance and Ransomware: How to Reduce Risk, Cost and Complexity

In this webinar, we’ll look at the key cost, compliance and risk-based challenges for midsize and decentralized organizations, with solutions for midsize and ROBO environments. Learn more.

Endpoint Security vs. Ransomware: The 2017 State of the Battle

In this informative webcast, join industry expert Nick Cavalancia, and Stu Sjouwerman from KnowBe4, as they share the results of KnowBe4’s 2017 Endpoint Protection Ransomware Effectiveness Report. You will receive an overview of the current state of ransomware, learn the use and effectiveness of methods in use today and explore practical ways to stop ransomware. Learn more

Oracle, Hyperconvergence and Enterprise Cloud: Design and Technical Considerations

Whether you are virtualizing tier-1 Oracle databases, consolidating to improve software utilization, or looking to upgrade to the latest application version, the hyperconvergence based Nutanix Enterprise Cloud Platform brings the predictable performance, scalability, and cost benefits of web-scale IT to your transactional and analytical Oracle environments. Read on.

Best Practices for Windows 10 Migration

In this webcast Lenovo will equip you with the knowledge you need to plan a smooth transition to Windows 10. Learn more.

Freedom from Fax: Why IT Departments Love the Cloud

When old-school fax communications run amuck, IT people are often left to clean up the mess. Luckily, there’s a solution IT departments can turn to for help: cloud fax services. Attend this 30-minute webcast to discover how cloud faxing can benefit your business and IT department. Watch now!

SaaS-Based Print Management: Kill the Print Server

Join technology expert and founder of Techvangelism, Nick Cavalancia, and Jordan Pusey, Product Marketing Manager at PrinterLogic, as they explore and discuss the benefits of moving to the cloud to eliminate print servers and simplify print management.

Secure Your Active Directory

Active Directory plays a critical role in your company’s IT infrastructure. Microsoft published 300+ pages of guidance, but who has the time, money and resources to implement? Skyport will show you an easier way to secure facets of you AD infrastructure.

So You've Migrated to Office 365. Now What?

Join Microsoft Cloud & Datacenter MVP Tim Warner and Quest Product Manager Shawn Barker as they break down, in clear language and with hands-on demos, how you can reach your learning curve with the Office 365 platform while preserving your sanity. Learn more.

Office 365 Best Practices That You Are Not Thinking About: Managing Security and Compliance

In this webcast Microsoft MVP Mike Crowley from Baseline Technologies will explain how to translate your existing security and compliance requirements to Microsoft’s cloud-based tools.

Reducing Risk in Application Deployment Lifecycle

Microsoft MVP Tim Warner outlines the problem and offers practical strategies for transitioning your application publishing infrastructure from a reactive to a proactive position. You'll learn new methods for scanning and verifying software, and how to publish the vetted apps to System Center Configuration Manager (SCCM) or to an enterprise app store to facilitate self-service. Learn more.

5 Security Questions to Ask When Deploying Office 365

In this webinar, we'll detail the security gaps in Office 365 and explore how new approaches to cloud security can help mitigate the threat of data leakage with real-world use cases. Join our webinar to find out which questions you should be asking about Office 365 security.

Architectural Decisions that Maximize Office 365 Benefits

In this session, you will get a deep dive on common pitfalls when deploying Office 365, why they are overlooked and how to avoid similar challenges. You'll also learn about real world use cases architected around best-of-breed technologies that enabled and accelerated Office 365 deployments. Find out more.

Replacing Your Disaster Recovery Site with Microsoft Azure: How to Get Started

In this session, Microsoft MVP Tim Warner explains in plain language what you need to think about in planning disaster recovery sites in the Microsoft Azure public cloud. Learn more.

How Phishing and Social Engineering Became the #1 Attack Vector

Join Nathan O'Bryan and Stu Sjouwerman as they explore how phishing and social engineering have become the #1 attack vector all IT departments need to worry about, and what you can do to ensure your data remains in your control like mobilizing your end-users as your last line of defense. Learn more in this webcast.

Optimize Availability with Purpose-built Backup Appliances

Join experts from Storage Swiss and Veeam to learn more about the different types of PBBAs and how to choose industry-leading Availability solutions that’s storage-agnostic, cloud-ready and can support the demands of the always-on enterprise.

Enforcing Modern Authentication Factors for Microsoft Office 365

Over the last 20 years, cyber security has evolved and now dominates the headlines. More than ever, users are accessing their messaging and productivity tools from untrusted networks, devices and workstations and providing multi-factor and analytics has never been more critical. On this webinar, Okta's Marc Jordan and Anat Shiwak discuss how to remove the identity barriers for your Office 365 migration while building a modern, secure foundation for your Office 365 migration and future cloud strategy that doesn't rely on legacy security tools.

Office 365 Lifecycle Management Deep Dive

Customers migrating to Office 365 have complex requirements, such as having to work around unique user access and governance challenges that may involve their employees, customers, partners and providers. Solving these unique challenges while providing seamless access across your user populations is an issue many businesses face – but management can be achieved.

Seven Features to Investigate in a Cloud Fax Service

Savvy businesses understand that fax isn’t going away anytime soon‚ and for that reason‚ your organization should be reaping the benefits made possible by a cloud-based faxing service. Learn more in this webcast!

4 Homegrown AD Group Management Solutions I’ve Built (that Don’t Really Work)

Join AD group guru Greg Shields from Pluralsight in this exploration of what works – and what’s monstrously not worked – in group management over the years. You’ll learn the homegrown tricks as well as some of the more modern, and still cost-effective, solutions that IT orgs these days are using to solve this age-old problem.

Smart Tips for Active Directory Security

Simply locking down the Enterprise Admins group isn’t enough to ensure a safe AD environment. From configuration settings to group management, there’s a slew of quick fixes you can make, and some major process changes that you can implement. Join MVP and author Don Jones for a concise rundown of these high-impact tips and techniques.

Mitigating the Threat of Data Theft by Departing Employees

Every day, your employees access a wide variety of electronic information, ranging from trivial to important and highly confidential. However, your organization may be in jeopardy when one of these employees when leaving the company decides to grab sensitive data. Can you prevent this from happening? Register for this webcast and find out how!

How to Spot and Prevent Malware Infection

The war against malware attackers is real, and there are many ways you may become a target. Offense should inform your defense: understanding how, when and where you are vulnerable should shape your plan of action. Learn how to protect your organization from security expert Ian Trump. Watch now.

Beyond Simple Fax and FTP: Reasons to Deploy Intelligent Fax and Secure File Transfer Solutions

Join Will Robinson, Vice President at Biscom, and Tim Warner, Microsoft MVP, as they discuss concrete ways that organizations can modernize their fax and file-transfer solutions to save time and money.

Top Five Office 365 Migration Headaches and How to Avoid Them

In this on-demand webcast, discover the top five Microsoft Office 365 migration challenges – and how to avoid them – so you have a seamless transition to with little or no business impact.

Leveraging Virtualization to Simplify Disaster Recovery Planning

In this session you'll learn how virtualization in all its manifold forms can make BC/DR planning easier to manage and improve your infrastructure's flexibility. Watch now.

StarWind Storage Appliance: Highly Performing and Extremely Fault-Tolerant Storage

Learn about the StarWind Storage Appliance and see how you can benefit from cost-efficient and easily scalable storage.

SCCM Is Working For You—But Is It Working Hard Enough?

System Center Configuration Manager reaches across your enterprise and is effectively managing updates for Windows OS and Microsoft apps. The bad news? This addresses just 20 percent of your software vulnerabilities.

Ransomware Hostage Rescue Guide

Join Erich Kron CISSP, Technical Evangelist for a live webinar. We will look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and what to do when you are hit with ransomware. Learn more.

Power to the End User: Self Service Password Reset for Mobile Users

Watch this webcast to understand the different options available to allow users to reset passwords when away from the network, see the benefits of each password reset solution and more! Available on-demand.

Efficiently Provisioning Users in Active Directory, Office 365, and Google

There is no reason that user accounts should not be created in Google and Office 365 when you are creating users in Active Directory. Come see how you can efficiently create users and their group membership at the same time, all from one easy console.

Indications of Compromise: How to Spot and Prevent Malware Infection

Learn the key role of antivirus and patching in reducing the attack surface; how to build infrastructure that contains and isolates malware from infecting the rest of the network; and what to do once you have detected an infection to mitigate impact.

Protecting Your Valuable Office 365 Assets

In this Redmond supercast, you will learn not only how to implement effective disaster recovery in the Office 365 cloud, but also how to restore lost data confidently and efficiently. Learn more.

6 Reasons to Move to Cloud Faxing

When it comes to traditional faxing, there’s a lot left to be desired — which is why businesses are turning to desktop cloud faxing. Take part in our upcoming webinar to find out why cloud fax services are gaining popularity over traditional fax operations. Register now!

State of End User Computing

VDI and end-user application virtualization solutions have come a long way in recent years, allowing for rapid deployment, massive scaling, and high-definition user experiences. Participate in this webcast to discover breakthrough trends for EUC/VDI and learn how you can leverage the momentum for your organization in 2017. Find out more.

SharePoint Migration: A Three Step Plan for Your Success in 2017

Is 2017 the year your organization makes a SharePoint move? On this webinar, not only will you learn about these three actions, Microsoft MVP Levithan will also share his predictions about Microsoft, SharePoint and enterprise collaboration changes in 2017. Register now!

State of End User Computing

VDI and end-user application virtualization solutions have come a long way in recent years, allowing for rapid deployment, massive scaling, and high-definition user experiences. Participate in this webcast to discover breakthrough trends for EUC/VDI and learn how you can leverage the momentum for your organization in 2017. Find out more.