On Demand
The year 2019 is drawing to a close, and what a year it for backup, recovery, business continuity and disaster recovery. Attend this special year-end webcast in which Redmond Editor Scott Bekker and Unitrends expert Adam Marget will recap what happened during the year, what trends emerged and what it all suggests about the year ahead. Learn more.
Active Directory (AD) is the personnel file of Microsoft Windows—the library that manages password policy and access to enterprise resources like applications or devices. Learn more.
Join this webinar where Veeam explores the benefits that orchestration and automation bring to not only executing a disaster recovery plan, but also ensuring that the plan is maintained, updated and validated to work in a time of need. Learn more.
Join experts to learn about the hidden benefits, savings, and support from Microsoft and its partners through CSP, as well as how the CSP model differs from the Enterprise Agreement/Software Assurance model. Learn more.
As an MSP business owner or small business owner, you know how important it is to maintain strict controls around password management—all while staying efficient. Join the panel discussion with Passportal’s founder, Colin Knox, where he explains today’s password best practices. Learn more.
Enterprise organizations are increasingly trying to simplify their journey to public cloud. Join us as we follow the journey of an enterprise organization as they move towards Microsoft Azure, using Nutanix Enterprise Cloud to bridge their on-premises infrastructure to the public cloud. Learn more.
Join IT veteran Howard M. Cohen and experts from Unitrends as they explore the "all-in-one" approach that assures restorable backups of all data, virtual machines, cloud contents, user devices, servers .and the most effective solutions in the industry. Learn more.
During this editorial webcast, experts from Redmond magazine will present several modern tactics to help your organization ensure that any self-service capabilities it extends have the highest degree of security. Read on.
Build Group’s IT team set out to implement a modern, cloud-based backup and restore solution. The company now leverages Druva Phoenix, powered by Amazon Web Services (AWS) infrastructure, to back up its virtual machines to Amazon S3, simplifying its backup environment, reducing costs, and driving efficiencies with recovery and restore. By deduplicating its data by more than 40x and backing up only changes in the data, backups can now run faster, and during off-hours. Learn more.
The Windows event log contains a lot of information about what’s happening on your network. However, that information is only useful if you can remove the noise and focus on what is truly important. In this webinar, Windows Server expert Russell Smith will detail the event types you should collect to secure your servers and network from attacks, and how to view and process the event log data so that you can respond effectively.
Join KnowBe4 Security Awareness Advocate Erich Kron as he discusses the frightening advancement in digital deception techniques and the growing popularity of recent threats known as DeepFakes. Learn more.
In this educational webcast, join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Sr. Product Manager Keri Farrell from Quest Software, as they discuss the real risk of your hybrid AD data, who' s responsibility and how you can protect your hybrid AD for the future. Find out more.
Join us for this webinar and learn about the gaps left by Microsoft’s Office 365 protection, the risks posed and how to overcome them. You'll also find out how to get the Office 365 backup and recovery strategy you need and want. Get the details.
Data volume is on the rise. At the same time, 60% of all workloads will be hosted or born in the cloud by 2022. But data risks are increasing – and enterprises cannot ignore the potential for critical data loss or new regulatory requirements. A strong eDiscovery is necessary to maintain a competitive edge on the global stage. Watch this webinar today.
Join the editors of Redmond magazine for this educational webcast exploring how to get your ransomware defense operations in shape for 2020. Find out more.
Join Milan Patel, former CTO and Senior Special Agent of the FBI's Cyber Division, for a discussion on winning ransomware approaches for your organization. Learn more.
Join Nutanix's EUC design expert, Brian Suhr, to learn how to overcome challenges like poor user experience, unpredictable availability and security, long cycles from pilot to production, and unexpected costs and complexities. Read on..
Join CISSP and Strategic Solutions Consultant, Bryan Patton and Senior Product Marketing Manager, Jennifer LuPiba from Quest, as they discuss the nature of this new cold war and explore the tools you can use to protect your critical assets and national security. Learn more.
Backup specialists have long engaged the "belt & suspenders" metaphor to describe solutions that provide multiple layers of protection. Learn more.
In this webinar, we will take an in-depth look into the automation policies and DevOps best practices that cloud admins need to implement, especially from the perspective of controlling runaway cloud spend, across both public and private clouds. Learn more.
Today’s users expect data to be available to them 24.7.365, but not everyone knows exactly how to ensure this in a multi-site and multi-cloud environments. Learn more.
As more businesses look to move workloads to the cloud, they can encounter challenges and constraints with their current data management solutions. In fact, 47% of IT leaders are concerned that their cloud workloads are not as portable as intended. It is your mission as an IT guru to obtain workload portability in the cloud. Watch now.
Join this session with Rick Vanover to know more about how to what capabilities exist today for physical server and endpoint backup and off-site data backup and restore options. Watch this today!
In this webinar, industry experts discuss strategies for a modern Office 365 data protection solution that enables continuous user productivity and collaboration. You will learn about Microsoft’s shared responsibility model and best practices for protecting against common Office 365 data loss risks. Watch now!
Learn how Nutanix provides the industry’s best HCI platform for running database workloads with exceptional performance, security, reliability, resiliency and an integrated automation framework that brings one-click operational simplicity to database provisioning, copy data, and lifecycle management. Find out more.
Microsoft Office 365 is the top productivity tool for today’s modern workforce. But did you know that Office 365 native capabilities may not be enough to protect your organization from accidental and malicious data loss -- as well as meet strict data compliance and regulatory requirements? Learn more.
In this session, technology industry veteran Howard M. Cohen joins with experts from Unitrends to discuss restoration challenges beyond just the data, highlighting strategies including automated DR testing, DRaaS, orchestration and resilience against ransomware. Learn more.
In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way! Then, learn the six reasons why phishing still might get through to your inbox and what you can do to maximize your defenses Learn more.
Do you know of any companies whose data was held hostage by a ransomware attack? You don't want to gamble with your data, and endpoint security is crucial because malware infections occur there so frequently. Learn more.
Do you see your Azure cloud costs growing out of control as your usage goes up? In this webinar, we will cover everything you need to know about Azure Reservations and share best practices to help you master reservation management.
82% of companies want an integrated security portfolio. Why? Our networks no longer have edges, so our security approach must be borderless. Solutions must work in concert, and seamlessly integrate with other tools. And today, an integrated portfolio does not mean giving up best-in-class features. Cisco’s architectural approach to security integrates security across all borders to incorporate the network, cloud, Internet, email, and rapidly expanding endpoints.
Private cloud solutions, powered by the industry’s most advanced Hyperconverged Infrastructure (HCI) technology, deliver applications, services, and data at any scale, with advanced automation and built-in self-service capabilities that bring true cloud-like simplicity to enterprise datacenters. Learn more.
.
As more enterprises migrate mission-critical applications to the cloud and begin to make use of containers and Kubernetes, they remain wary of lock-in to a single cloud vendor. Both fear of escalating costs and a single point of failure are causing enterprises to look at strategies that span multiple cloud environments. Find out more.
Small to medium enterprises are top targets for cybercriminals. Verizon reports that 43% of all breaches target SMBs. Why? Because most SMBs are under-protected and offer the least resistance and quickest return for threat actors. Today’s attacks are sophisticated, fast-moving and continuously evolving. Security teams need to be equally sophisticated, fast-moving and continuously evolving. Learn more.
Spot insider threats and external attacks with user behavior analytics. In this webinar, IT security expert Jay explains how to perform instant threat detection and prevention by detecting suspicious activities in your network. Learn more.
So, what’s the best approach to making the migration to Windows 10 as easy and future-proof as possible? In this interactive webcast, join in on the conversation with Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Brian Suhr. Please attend!
Data availability is crucial to your business success – are you making the most out of it to drive growth? Today many organizations continue to use legacy data backup and recovery, while not utilizing an intelligent system that responds to your application and data behaviors. Learn more.
One of the biggest mistakes that organizations tend to make in their fight against ransomware is that of basing their defenses around a product rather than a strategy. Learn more.
We're a little over halfway through the 2019 Atlantic Hurricane Season, and this peak period has been true to form with the unprecedented devastation of Category 5 Hurricane Dorian. Learn more.
Data protection is your responsibility, not matter where your data resides—including the cloud. Learn more.
This webcast takes you through findings from a recent ESG research study exploring the problems caused by massive unstructured data growth, the growth in the number of data accessors and creators, and how new methods of unstructured storage management and data management are helping IT leaders realize their digital transformation goals. Watch now!
It's been a summer of ransomware, with devastating incidents shutting down governments in Florida and Texas, ongoing fallout from the Baltimore attack and reports of increased targeting elsewhere. Watch now!
Did you just unpack your shiny new Office 365 tenant? Now that your migration is complete, did you think it was time for some R&R? Learn more.
There’s more to migrating workloads to Azure or AWS than simply “lifting and shifting”. Organizations need to plan for performance impacts, changes in operating costs, and making certain the right workloads are hosted in the right cloud. Learn more.
Data breaches have become commonplace, and despite significant investments in perimeter and endpoint security, breaches typically begin at the desktop and server layers of an organization’s IT infrastructure. Learn more.
McAfee helps customers adopt Microsoft Azure and Office 365 with the same security controls available in a private data center. McAfee understands the complexity of the cloud and has designed a security architecture and multiple integration points to enhance your overall security posture. This includes new processes and techniques to protect the entire stack and capabilities to inspect north-south as well as east-west traffic, in addition to the ability to manage across hybrid environments with one management tool and with one security policy.
In this webinar, Zerto Solutions Architect and Microsoft Azure SME Kyle Bromley, will discuss how to “right size” your workloads in Azure with Zerto and what hyperscale-level IT resilience really looks like. Learn more!
The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. Learn more.
Join this webinar to discover the business necessities of private cloud and how it’s a stepping stone to hybrid cloud.
Microsoft’s Office 365 is now the most widely used enterprise cloud service by user count. While Office 365 is a robust, secure platform with extensive compliance and governance capabilities, it is essential that organizations lay the groundwork for a cyber secure Office 365 adoption. Learn more.
In this webcast, Redmond editors explore the best way to make sure your data estate is fully protected in this mixed cloud reality. Learn more!
Join experts to learn about the challenges and best practices to ensure your users have unfettered access to online games that drive your business. Watch now!
Nearly all commerce, communications, and data traffic going over the web is encrypted. As organizations transform operations, leverage more of the cloud, expanding locations, and utilizing remote workforces, IT’s lack of visibility into encrypted traffic puts the organization at risk for a cyberattack, data breach and compliance failures. Learn more.
End of support for Windows 2008 servers is only 6 short months away. The good news is it’s not too late to build your plan and take action before January 14, 2020. Learn more.
Digital transformation is top of mind for nearly all IT decision makers. Data is the lifeblood of that process. IT leaders struggle to simultaneously manage the exponential growth of unstructured data while leveraging this data drive greater business value. Legacy infrastructure impedes the access and use of data as it was not built to handle either the new volume of data or the use cases that enterprises are taking on. Learn more.
Many organizations are moving to a database as a service (DBaaS) model for managing and operating their databases because DBaaS model is efficient, agile, cost-effective and scalable. What if copying a database were as easy as the copy and paste operations on your computer? Learn how to automate and simplify database management.
With a growing number of computer imaging solutions to choose from, IT teams now have the ability to hand-pick a tool that meets the exact requirements of their modern computing environment. This 30-minute technical discussion includes tips for managing a Windows 10 environment, a comparison of leading imaging solutions and considerations when evaluating a computer provisioning solution. Watch now.
Cybersecurity threats are increasing, becoming more sophisticated, and creating more damage. 44% percent of legitimate alerts are not investigated*. Security Operations are inundated with a deluge of alerts from disparate security solutions. Learn more.
When it comes to data loss, natural disasters and ransomware grab the most headlines. Yet the exact incident that's most likely to cause you problems on a day-to-day basis tends to be much more mundane. Learn more.
You know that "security awareness" is key to a comprehensive security strategy. But just because someone is aware doesn't mean they care. So how can you design programs that work with, rather than against, human nature? View now!
If you’re using Office 365, don’t ignore your data protection responsibilities — or you may be putting your critical data at risk. Making assumptions about how cloud applications protect your data can be a huge oversight, and with limited built-in data recovery capabilities, Office 365 is an app that’s commonly overlooked.
Commonly used and highly successful credential compromise techniques like Pass-the-Hash and Pass-the-Ticket are notoriously difficult to detect amidst the noise of everyday activities within Active Directory. To an observer, they appear to be legitimate authentication events and to Active Directory, they are.
Microsoft extended end of support for Windows 7 to January 14, 2020. This may seem far away, but migrations occur slowly for many organizations due to a lack of automated user state and data provisioning, resource requirements, and remote workforce deployment. So, how can you alleviate the stress of migrating and gain critical insights into your business data?
Microsoft extended end of support for Windows 7 to January 14, 2020. This may seem far away, but migrations occur slowly for many organizations due to a lack of automated user state and data provisioning, resource requirements, and remote workforce deployment. So, how can you alleviate the stress of migrating and gain critical insights into your business data?
In this recorded virtual summit, you will hear from Stephen Gee from Zix and Michael Osterman of Osterman Research to learn about the issues and complexities involved with running hybrid and MS Office 365 environments and why organizations of all sizes may need to supplement the native features with third-party solutions, especially in the security, archiving, and encryption areas.
The cloud expands organizations' options for robust offsite recovery. Learn more.
The Cybersecurity and Infrastructure Security Agency (CISA) of the Department of Homeland Security (DHS) recently issued the AR19-133A report to help admins address the vulnerabilities and risks their organizations face after an Office 365 transition, so they can protect their Office 365 service from attacks. Learn more.
Your organization is only as strong as its weakest link—which is often weak passwords—and hackers know this, meaning they always are on the lookout for user accounts with passwords that can be easily compromised. Learn more.
Learn why bare-metal backups are usually NOT the best option for disaster recovery from cyberattacks. Learn more.
In today’s competitive world, using new technology to set your business apart can make the difference between getting ahead or falling behind. But staying in control of the growing complexity is tough. Learn more.
In this educational webcast, join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, and Rob Tovar, from Quest Software, as they discuss the best way to simplify auditing to meet security and compliance requirements. Learn more.
A rash of ransomware attacks has hit small and local governments in recent months. From a trio of municipalities in Florida, to the ongoing problems in Baltimore to the expensive remediation in Atlanta, city governments falling victim to ransomware has become all too common. Learn more.
Stolen credentials and passwords are a lingering security loophole these days. Learn more.
In this webinar, you'll learn why companies are migrating to Office 365 and hear about their experiences, including delays, cost overages, problem applications, and more. Watch now!
Join Microsoft MVP, VMware vExpert and IT analyst Greg Schulz of Server StorageIO along with Michael Gogos, Data Protection expert from Quest, as they discuss how to become hybrid and cloud data protection ready, and much more. Read on.
It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. Learn more.
How can you protect your content from the very people that have access and either accidentally or intentionally delete important information? Learn more.
In this on-demand webcast, experts from the Spiceworks Community and Quest review how you can tackle your security challenges. Learn more.
Backup and recovery has its origins in a structured world. As always, the key business assets that cry out for backup are the order databases, the payroll systems, ERP and the like. Learn more.
Join us in this webcast for an in-depth look at how to address your most pressing needs when it comes to protecting Office 365 data and all the common pitfalls to avoid when implementing backup for this important data source. Sign up.
Register now for a dynamic panel discussion. Register Now!
Join us at this webcast as we discuss two early stage attack activities: LDAP reconnaissance and Password Spraying – that allow attackers to map out the target infrastructure to plan out their attack and begin to take over accounts. Detection strategies and mitigation steps will also be explained. Sign up.
Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, as he explores techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. Roger won't just cover one angle. He'll come at it from all angles! Read on.
In this webinar, MVP Derek Melber will guide you through how you can configure your SIEM to detect direct attacks and also improve your SIEM with technologies such as user behavior analytics. Find out more.
Don't let Active Directory fall victim to a cyber attack! When it comes to protecting your Active Directory, there is no room for error. In this On Demand Webcast , join Dale Meredith, cyber security expert as he explores ways to protect AD from cyber criminals. Watch now!
In this discussion, Dave Russell Vice President of Enterprise Strategy of Veeam reviews the considerations for adopting cloud-based object storage and how to leverage cloud object storage for the best outcome. Learn more.
Join experts from Redmondmag.com as they share backup and recovery horror stories. You'll hear about business that thought they did everything right, only to find out about their data was not recoverable due planning mistakes, technical limitations or glitches.
Learn more.
In this webinar, we'll offer you best practices and key trends to help you maximize the return on your Azure cloud investment and gain control of your scaling cloud infrastructure. Learn more.
Join iland's Justin Augat, VP of Product Marketing and Will Urban, Senior Cloud Technologist, to learn more about how Veeam and iland are changing data protection for your business. Learn more.
Data backup and recovery programs are often not prioritized until there is a problem and then it’s everyone’s problem. Many IT leaders believe they have an adequate backup strategy in place but they are often missing key components that would ensure success. Learn more.
Join David Etue, cybersecurity expert from BlueVoyant, as he delivers valuable insight into the risks your SMB organization faces and provides guidance on how to achieve the optimum level of cybersecurity. Learn more.
Learn from the first-hand experience of the CIO of Central Arizona College. Register Now!
In today’s competitive world, using new technology to set your business apart can make the difference between getting ahead or falling behind. But staying in control of the growing complexity is tough. Learn more.
It's been said that North America has some of the wildest weather on Earth. With the summer months approaching, it's the season for thunderstorms, tornados, hurricanes, wildfires and floods. Is your business data prepared to weather any approaching storms? Learn more.
More than half of enterprises report that they've experienced at least one ransomware attack during the previous 12 months* and most were attacked more than once. Learn more.
When attempting to protect your organization, you’re being pulled in a million directions, trying to secure every possible attack vector. Learn more.
The shift to the cloud always seems to focus on enhanced productivity for an organization overall. But cloud adoption also means IT must figure out how to integrate “all-things-cloud” with on-prem Active Directory. Learn more.
If there's one silver lining to the emergence of ransomware in the last few years, it's this -- it's brought into sharp relief how interrelated security, backup and recovery, disaster recovery, business continuity, training and organizational policies are in a solid defense strategy. Learn more.
Industry analysts and leaders agree that you need to add backup and recovery tools to Office 365 for more comprehensive data management and retention. Learn more!
If you’re using Office 365, don’t ignore your data protection responsibilities — or you may be putting your critical data at risk. Industry analysts and leaders agree that you need to add backup and recovery tools to Office 365 for more comprehensive data management in protection. Watch now!
When it comes to end-user security, hard-drive encryption is a key pillar to consider for your security strategy. Yet while it adds a layer of security and can be required for compliance, it also adds some challenges and creates risks of accidental data loss on individual PCs. Learn more.
Using your Veeam solution for backup and replication to the Microsoft Azure cloud is a great start, but did you know it’s possible to make it better and faster? Read on.
Active Directory is the living heart of most IT organizations. No matter if your organization is on-premises, in the cloud, or in some hybrid situation somewhere in-between your on-premises Active Directory is most likely the most important part of your IT infrastructure. Read on.
Many organizations need to provide network access to their extended enterprise -- contractors, temp workers, partners, vendors, and others -- to effectively run their business. However, these users create unique challenges and introduce new cybersecurity risks. Join us to learn the top five questions IT must address to successfully manage the extended enterprise. Learn more.
The data estate that organizations have to protect in 2019 is more complicated than ever. The old concept of a network perimeter is gone, bulldozed by cloud storage, Software as a Service applications, bring your own device practices, data on mobile phones and many employees who never really go off the clock no matter where they are. Learn more.
Understanding where your sensitive data resides, who can access it, who is using it, and what’s being done to it is a relatively tall order for any organization. But compliance mandates, security initiatives, and just keeping the business running demands it. Learn more.
Watch this video to learn about key considerations for ensuring the portability of workloads to the cloud, built-in Veeam features for successful workload recovery into AWS and more! Watch this today!
If you're using Office 365, don't ignore your data protection responsibilities—or you may be putting your critical data at risk. Making assumptions about how cloud applications protect your data can be a huge oversight, and with limited built-in data recovery capabilities, Office 365 is an app that's commonly overlooked.
No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding. Learn more.
Success in the cloud hinges on effective cloud management. In this webinar, we’ll offer ways to help you maximize the return on your Azure cloud investment and gain control of your scaling cloud infrastructure. Read more.
Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads, but has also introduced a host of new security threats and challenges. Read on.
In this fast-moving world of cybersecurity, it seems a week doesn’t go by without another company making headlines with a data breach or attack that compromise their data. Read on.
Migrating to Microsoft Office 365 can be complicated. Even with careful planning, deploying Office 365 and delivering a fast user and application experience can be a challenge. While most organizations assume their traditional networks are ready for the migration, many don’t realize that Microsoft recommends a different strategy. Read on.
Join Quest Software and Microsoft MVP Tim Warner for a thoughtful discussion how you can reduce risk, optimize spend and gain full visibility of your on-premises and cloud infrastructure. Learn more!
Join us for a 30-minute deep dive into Netwrix Auditor’s abnormal user behavior analytics. Register today!
Want to eliminate passwords? We all do. WebAuthn is a new web standard published by the World Wide Web Consortium (W3C) for users in the era of passwordless authentication for web applications. Learn more.
Jan. 14, 2020 is a huge day in the IT world. That's when Windows 7, which was in many ways Microsoft's most popular operating system to date, falls out of support. Learn more.
You got into IT because you enjoy working with cutting edge technology and you love working hands-on with powerful cool boxes that, unlike humans, do what they are programmed to do. Read on.
Ransomware remains a massive threat to businesses and the number of ransomware attacks are not expected to decrease any time soon. Backupify’s 2019 ransomware report* provides unique visibility into the state of ransomware from the perspective of IT professionals and their clients dealing with infections on a daily basis. Learn more
This webcast provides an in-depth look at Backupify’s report. You’ll gain useful insight into preparing your first line of defense, developing a multiple solution approach to prepare for the worst, and implementing recommendations to ensure recovery and continuity after an attack. Learn more!
A vital part of your company’s cloud-adoption story is moving valuable data to Office 365. As an IT professional you recognize the need for vigorous data protection. It must mitigate threats including ill-intentioned insiders, accidental deletions, and even Office 365 outages preventing your workforce from working. Learn more.
Join as NewCloud Networks and Veeam Software explore Ransomware preparedness best practices and how to fight ransomware. Learn more.
Ransomware continues to be a top of mind problem for IT professionals and IT decision makers worldwide as they face the potential disastrous aftermath of successful attacks from losing critical data on a certain endpoint to suffering brand reputation damage. Join our session to learn more!
While Hybrid messaging and collaboration with MS Office 365 offers compelling benefits to larger organizations and the enterprises, it comes with new security and compliance risks. Learn more.
The nature of the senior data center executive’s job is evolving from delivery executive to IT business executive. The webinar will cover the increasingly changing landscape of infrastructure and processes of multi-cloud environments. Learn more!
Do you think the native capabilities of Office 365 are enough to protect your business? Would you bet your career on it? We wouldn’t - and neither would industry expert, Michael Osterman. Sign up to learn why!
This editorial webcast, presented by Redmond magazine, will explore the viability of the NIST password framework, and provide some updated techniques and tactics for ensuring a rock-solid password policy. Read on.
Modern IT environments are so large and dynamic that it has become extremely difficult to keep track of all the critical and sensitive data stored there. Register now to find out how Netwrix Auditor — Data Discovery and Classification Edition can help. Register today!
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years of experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite 2FA solution. Learn more!
Today’s modern, mobile workforce needs advanced technology that keeps them connected, collaborative and, most of all, productive. In this engaging webinar, three Lenovo experts — Alli Heeter, Brand Ambassador, Jimmy Smith, ThinkVision Product Manager and Aaron Buckner, ThinkPad Mobile Workstation Product Manager — sit down to discuss how to support enterprise users working at full capacity in the office and on the move.
Join Netwrix expert Bob Cordisco in the new 25-minute deep dive demo to learn how to be notified about high-risk insider threat patterns and more. Register today!
In this webinar, IT consultant and author Russell Smith will show you how to use PowerShell to manage Active Directory and track configuration changes. Learn more.
Enroll in our free online course created by PowerShell experts Russell Smith and Jaap Brasser and learn how to automate common tasks in Active Directory and Windows file servers. Plus, you’ll find out how to investigate and resolve security incidents in Office 365 using short PowerShell scripts. Learn more.
Join Liam Cleary and Jeff Melnick as they discuss a real-world attack that involved credentials issued to a third party and learn how to keep your sensitive data safe. Learn more.
So, how do you make sense of and protect this constantly moving hybrid AD target? In this interactive webcast, join Microsoft Cloud & Data Center MVP Nick Cavalancia, and Matthew Vinton from Quest, as they discuss how.
Register now!
If you’re using Office 365, don’t ignore your data protection responsibilities — or you may be putting your critical data at risk. Industry analysts and leaders agree that you need to add backup and recovery tools to Office 365 for more comprehensive data management in protection. Read on!
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert as he explores 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Read on.
The GDPR grace period for businesses to get themselves compliant ends on May 25, 2018, which touches over 500 million EU residents your company might be working with. Your inaccurate GDPR compliance might result in €20 million of fines or even more. Learn more.
Take part in a 25-minute session as Roy Lopez of Netwrix explains how to keep your IT infrastructure secure with Netwrix Auditor. Learn more.
Successfully migrating and modernizing content to SharePoint, OneDrive for Business, and Teams can establish the first milestones in the digital transformation process. Learn more.