In this educational webcast, join industry experts as they discuss SharePoint BLOBs, making the case for Remote BLOB Storage, getting RBS done right and more.
Time: 11:00 am
Register for the webinar, to learn how your company can forget about the headaches and hassles of fax by moving your operations to the cloud! Learn more and register!
Time: 9:00 AM
In this Redmond Supercast, Jon Toigo will look at the grey areas of cloud-based disaster recovery services, and assess the silver lining that disaster recovery experts insist that clouds can deliver today.
Time: 10:00 am
Join Damon Tompkins, Chris Kolodziejski, and a special guest to learn best practices for onboarding to Office 365. You'll gain insight into potential onboarding pain points, how to identify them in your source environment, avoid them, and even remediate them. Learn more.
Join Michael Osterman for a Webinar that will address the email-related risks your organization faces everyday and what you can do to eliminate them.
During the webcast, you’ll learn how flexible multi-factor authentication overcomes these issues and how you can achieve it without having to introduce added complexity to your existing environment.
Hyper-V is the best value in virtualization. With 5nine and Unidesk, it's the most powerful, too. Learn how these Microsoft ISV partners are joining forces to make Hyper-V the most secure, cost-effective, and easiest to manage platform for VDI and other virtual workloads.
Guest speaker, Forrester Research Principal Analyst David K. Johnson will explore challenges and discuss techniques to allow enterprises to easily and seamlessly add Macs, tablets and smartphones to the corporate infrastructure leveraging tools, policies and processes that are already in place.
We examine the pros and cons of SharePoint high availability content versus traditional system wide disaster recovery. The end result are several ways on supporting your business critical content in the future. Register now for more!
In this webinar, Adam Bertram will go over a common scenario that IT pros are faced with: secure B2B file transfer.
In this interactive webcast, join Nick Cavalancia and Jonathan Blackwell as they discuss AD Group red flags and group management best practices.
Are you unsure as to whether or not you should use SSL certificates in your infrastructure, or to what extent you should use them? You’ll find answers to your questions in this informative Webcast featuring MVP Nathan O’Bryan.
During this webinar, experts from Acronis and Disaster Recovery Journal will share seven best practices that IT organizations should consider when architecting and implementing disaster recovery solutions. Learn more.
Compliance is a major concern to many organizations in a variety of industries - financial, healthcare, governmental and more. Meeting compliance must be a systemic endeavor that touches all aspects of organizational assets, processes and IT infrastructure in particular.
Join Jason Acord, Veeam Inside Systems Engineer Manager for this educational webinar to learn about the key benefits of virtualizing your Exchange environment, identify best practices and pitfalls to avoid, as well as show you some free tools for agentless eDiscovery, backup and recovery. Learn more.
Join us for this webinar to learn how you can deploy faxing for your entire organization — with features like real-time status updates and 24/7 availability — quickly, easily and cost-effectively. Register now!
During this 37 minute webinar, Microsoft Office365 MVP J. Peter Bruzzese, will reveal the post migration surprises he’s heard most frequently from companies that have already made the move. He’ll provide his realistic assessment of what to expect and what to plan for when moving to the cloud.
Listen to guest speaker Nick Hayes from Forrester Research and Steve Malone from Mimecast for insight into how technology and awareness together can strengthen defenses.
SharePoint can be frustrating. But did you know there’s an easy way to get more out of your installation? Learn how a social collaboration solution can help supercharge it.
Everything you ever wanted to know about public clouds, but couldn’t find someone to answer honestly. Bring your toughest questions!
PrinterLogic eliminates the need for print servers and enables centrally managed direct IP printing. With its Mobile Printing solution, mobile, BYOD users and guests can easily print, whether they are on or off network. Learn more.
Our panel of vExperts discusses VMware vSphere 6, it's features and enhancements and debates what it means for the future of virtualization.
We surveyed 1600 respondents from the IT community on their usage of cloud backup solutions for computing, storage and business continuity including preferred vendors.
Docker is hot. Almost as hot as Taylor Swift right now. But not since VMware’s early hypervisors has a product been so hyped with so little means of protection.
Learn about backup and disaster recovery best practices for preventing the menace of ransomware and recovering if infected.
Learn the reasons why including physical appliances in your disaster recovery plan may be preferable to a virtual only solution. Watch our webinar now!
Learn from the experts what’s on the horizon and how to effectively use the latest technologies to cope with security threats from the inside out and the outside in.
Join this live webinar and discover how automating fax and email orders in the cloud can help your company.
Tony Bradley and Michael Keenan will talk about some of the challenges organizations face with unified communications and how to manage disparate UC platforms, like Microsoft Lync / Skype for Business and Cisco UC, effectively and efficiently.
All kinds of federal organizations must be compliant with FISMA regulation. During this webinar we will talk about NIST security controls and mechanisms for implementation, continuous compliance and Netwrix, and a case study: FISMA Compliance established with Netwrix. Learn more.
Attend this webcast for an explanation of cloud-based disaster recovery, examples of hybrid private/cloud data protection models and ideas for preserving critical data while freeing up space in your storage infrastructure.
Join industry experts as they talk about the current states of both insider threats and group management and why connecting the two is critical to the security of your organization.
This webcast will discuss the challenges of AD group management, including how out of date is your group management, what’s really at risk and ways to automate common group management tasks.
Join Nathan O’Bryan (MCSM: Messaging and MVP: Office 365) and Vadim Gringolts (CTO, Binary Tree) for an unscripted discussion about planning your migration to Exchange Online in Office 365.
This webinar looks at the role of mobile in creating more secure, more convenient, multi-purpose trusted identities and explores a variety of use cases where mobile will help you begin your journey to becoming a password-less enterprise. Learn more.
Industry experts will host an informal discussion about making the move to Office 365—with a focus on how to address security concerns and make the switch to Office 365 with security and compliance in mind. Register now!
Watch industry experts Nick Cavalancia and Mike DiMeglio as they discuss key considerations for architecting a data protection and recovery strategy for a Hyper-V environment from the smallest VMs to large, mission-critical applications with short SLAs. Learn more.
Cloud initiatives, mergers and acquisitions, compliance regulations and implementation of new systems, require an organized, consolidated and up to date Active Directory infrastructure. Learn how four corporations made the decision to modernize and realized a massive return on their investment.
Learn the latest techniques used to mitigate attacks on web based applications.
Empower your business by transforming security into an enabler that provides users with access to the data and applications they need to be productive at work.
This engaging webinar will provide a brief primer on encryption techniques, outline the expanding reach of data security regulations, and identify how adding email encryption can help your organization fearlessly face down the risks of non-compliance.
This session will present the survey findings gathered from over 1,000 SharePoint IT professionals on how they are protecting their SharePoint content. Watch and learn some often overlooked SharePoint tips, tricks and best practices.
In this webinar, Office 365 MVP Christian Buckley will discuss the future of mobility, the expanded vision of team and document collaboration, and the value of a productivity focus.
In this educational webcast, industry experts will discuss how to best apply security solutions across three paths to help customers deal with Windows Server 2003 EOS.
Business-savvy IT requires that we consider the dark side of technology strategy, including the threat surface it creates and the risk mitigation requirements that it spawns. Join storage guru Jon Toigo for the latest best practices and potential pitfalls of data protection in the agile age.
In this informative webcast, join industry experts as they discuss how to gain control over applications, improve IT efficiency, lower cost, and reduce the dependence on Shadow IT.
In this webcast Adam Bertram will cover how to discover current services on an older server, figuring out where to migrate these workloads to, how to build a plan for migration, and some common tools that will help in the process.
Attend this webcast for information on a Microsoft Threat Management Gateway replacement for reverse proxy and single sign on.
Attend this webcast to learn how to understand – and unlock – the value of your unified communications platform.
In this educational session, you’ll discover how much easier your job can be with complete visibility into all aspects of your Citrix infrastructure running on VMware.
Join industry experts to learn how the single sign-on and automated account provisioning for Office365 can stop the cloud password sprawl, close security holes and free up IT time for new projects.
This Redmond supercast will identify what non-stop data is all about and what are the best practices for enabling data for optimal usage by contemporary businesses.
You want a more secure environment. But while you’re likely employing some form of perimeter security, such as firewalls, intrusion detection, encrypted data transfer or other similar methods, are you paying attention to what is happening at the device level? Join this webcast and learn what IDC research manager Robert Young has to say about improving security through more comprehensive systems management of your connected endpoints.
While FTP is still widely used, it is also has lots of liabilities. In this technical webinar we’ll explore different aspects of running an FTP server on the Internet and how to protect it.
This webcast will discuss methods for securing the cloud-based suite, as well as delve into trends in next-generation technologies for digitally signing applications, binding people and documents, and assuring code integrity to wireless platforms.