Secure Your Active Directory

Active Directory plays a critical role in your company’s IT infrastructure. Microsoft published 300+ pages of guidance, but who has the time, money and resources to implement? Skyport will show you an easier way to secure facets of you AD infrastructure.

Date: 04/05/2017

Time: 11:00 am

Office 365 Best Practices That You Are Not Thinking About: Managing Security and Compliance

In this webcast Microsoft MVP Mike Crowley from Baseline Technologies will explain how to translate your existing security and compliance requirements to Microsoft’s cloud-based tools.

Date: 04/04/2017

Time: 11:00 am

Reducing Risk in Application Deployment Lifecycle

Microsoft MVP Tim Warner outlines the problem and offers practical strategies for transitioning your application publishing infrastructure from a reactive to a proactive position. You'll learn new methods for scanning and verifying software, and how to publish the vetted apps to System Center Configuration Manager (SCCM) or to an enterprise app store to facilitate self-service. Learn more.

Date: 04/19/2017

Time: 11:00 am

5 Security Questions to Ask When Deploying Office 365

In this webinar, we'll detail the security gaps in Office 365 and explore how new approaches to cloud security can help mitigate the threat of data leakage with real-world use cases. Join our webinar to find out which questions you should be asking about Office 365 security.

Date: 04/12/2017

Time: 11:00 am

Architectural Decisions that Maximize Office 365 Benefits

In this session, you will get a deep dive on common pitfalls when deploying Office 365, why they are overlooked and how to avoid similar challenges. You'll also learn about real world use cases architected around best-of-breed technologies that enabled and accelerated Office 365 deployments. Find out more.

Date: 04/11/2017

Time: 11:00 am

Best Practices for Windows 10 Migration

In this webcast Lenovo will equip you with the knowledge you need to plan a smooth transition to Windows 10. Learn more.

Date: 03/28/2017

Time: 8:00 am

Duration: 1 hour

Replacing Your Disaster Recovery Site with Microsoft Azure: How to Get Started

In this session, Microsoft MVP Tim Warner explains in plain language what you need to think about in planning disaster recovery sites in the Microsoft Azure public cloud. Learn more.

Date: 04/18/2017

Time: 11:00 am

Duration: 1.5 hours

Optimize Availability with Purpose-built Backup Appliances

Join experts from Storage Swiss and Veeam to learn more about the different types of PBBAs and how to choose industry-leading Availability solutions that’s storage-agnostic, cloud-ready and can support the demands of the always-on enterprise.

Date: 03/30/2017

Time: 11:00 am

Duration: 1 hour

What Hypervisor Should You Chose?

Join Scale Computing co-founder, Jason Collier, as he discusses how the landscape of virtualization is evolving, and why many are choosing solutions based on hypervisors like KVM over the long-time market leader, VMware.

Date: 03/28/2017

Time: 11:00 am

Duration: 1 hour

SCCM Is Working For You—But Is It Working Hard Enough?

System Center Configuration Manager reaches across your enterprise and is effectively managing updates for Windows OS and Microsoft apps. The bad news? This addresses just 20 percent of your software vulnerabilities.

Date: 03/30/2017

Time: 11:00 am

On Demand

How Phishing and Social Engineering Became the #1 Attack Vector

Join Nathan O'Bryan and Stu Sjouwerman as they explore how phishing and social engineering have become the #1 attack vector all IT departments need to worry about, and what you can do to ensure your data remains in your control like mobilizing your end-users as your last line of defense. Learn more in this webcast.

Duration: 1 hour

Enforcing Modern Authentication Factors for Microsoft Office 365

Over the last 20 years, cyber security has evolved and now dominates the headlines. More than ever, users are accessing their messaging and productivity tools from untrusted networks, devices and workstations and providing multi-factor and analytics has never been more critical. On this webinar, Okta's Marc Jordan and Anat Shiwak discuss how to remove the identity barriers for your Office 365 migration while building a modern, secure foundation for your Office 365 migration and future cloud strategy that doesn't rely on legacy security tools.

Duration: 1 Hour

Office 365 Lifecycle Management Deep Dive

Customers migrating to Office 365 have complex requirements, such as having to work around unique user access and governance challenges that may involve their employees, customers, partners and providers. Solving these unique challenges while providing seamless access across your user populations is an issue many businesses face – but management can be achieved.

Duration: 1 Hour

Seven Features to Investigate in a Cloud Fax Service

Savvy businesses understand that fax isn’t going away anytime soon‚ and for that reason‚ your organization should be reaping the benefits made possible by a cloud-based faxing service. Learn more in this live webcast!

Duration: 1 Hour

4 Homegrown AD Group Management Solutions I’ve Built (that Don’t Really Work)

Join AD group guru Greg Shields from Pluralsight in this exploration of what works – and what’s monstrously not worked – in group management over the years. You’ll learn the homegrown tricks as well as some of the more modern, and still cost-effective, solutions that IT orgs these days are using to solve this age-old problem.

Smart Tips for Active Directory Security

Simply locking down the Enterprise Admins group isn’t enough to ensure a safe AD environment. From configuration settings to group management, there’s a slew of quick fixes you can make, and some major process changes that you can implement. Join MVP and author Don Jones for a concise rundown of these high-impact tips and techniques.

Duration: 1 Hour

Mitigating the Threat of Data Theft by Departing Employees

Every day, your employees access a wide variety of electronic information, ranging from trivial to important and highly confidential. However, your organization may be in jeopardy when one of these employees when leaving the company decides to grab sensitive data. Can you prevent this from happening? Register for this webcast and find out how!

Duration: 1 Hour

How to Spot and Prevent Malware Infection

The war against malware attackers is real, and there are many ways you may become a target. Offense should inform your defense: understanding how, when and where you are vulnerable should shape your plan of action. Learn how to protect your organization from security expert Ian Trump. Watch now.

Beyond Simple Fax and FTP: Reasons to Deploy Intelligent Fax and Secure File Transfer Solutions

Join Will Robinson, Vice President at Biscom, and Tim Warner, Microsoft MVP, as they discuss concrete ways that organizations can modernize their fax and file-transfer solutions to save time and money.

Top Five Office 365 Migration Headaches and How to Avoid Them

In this on-demand webcast, discover the top five Microsoft Office 365 migration challenges – and how to avoid them – so you have a seamless transition to with little or no business impact.

Duration: 1 Hour

Leveraging Virtualization to Simplify Disaster Recovery Planning

In this session you'll learn how virtualization in all its manifold forms can make BC/DR planning easier to manage and improve your infrastructure's flexibility. Watch now.

StarWind Storage Appliance: Highly Performing and Extremely Fault-Tolerant Storage

Learn about the StarWind Storage Appliance and see how you can benefit from cost-efficient and easily scalable storage.

Ransomware Hostage Rescue Guide

Join Erich Kron CISSP, Technical Evangelist for a live webinar. We will look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and what to do when you are hit with ransomware. Learn more.

Power to the End User: Self Service Password Reset for Mobile Users

Watch this webcast to understand the different options available to allow users to reset passwords when away from the network, see the benefits of each password reset solution and more! Available on-demand.

Efficiently Provisioning Users in Active Directory, Office 365, and Google

There is no reason that user accounts should not be created in Google and Office 365 when you are creating users in Active Directory. Come see how you can efficiently create users and their group membership at the same time, all from one easy console.

Indications of Compromise: How to Spot and Prevent Malware Infection

Learn the key role of antivirus and patching in reducing the attack surface; how to build infrastructure that contains and isolates malware from infecting the rest of the network; and what to do once you have detected an infection to mitigate impact.

Protecting Your Valuable Office 365 Assets

In this Redmond supercast, you will learn not only how to implement effective disaster recovery in the Office 365 cloud, but also how to restore lost data confidently and efficiently. Learn more.

6 Reasons to Move to Cloud Faxing

When it comes to traditional faxing, there’s a lot left to be desired — which is why businesses are turning to desktop cloud faxing. Take part in our upcoming webinar to find out why cloud fax services are gaining popularity over traditional fax operations. Register now!

Duration: 1 Hour

Active Directory – To Secure or not to Secure? No longer a question

Active Directory is an often-overlooked vulnerability and many organizations don’t realize there is a risk. Join us to learn the most common threats going into 2017, how to strengthen your total Active Directory infrastructure and how to protect your most privileged credentials against the growing threat of attack. Read on.

5 Ways to Migrate Thousands of Users to Windows 10 Fast

Windows 10 migration projects are highly complex and incredibly disruptive. In this webinar you’ll learn how to migrate faster, easier, and with no impact to the end user.

Duration: 1 hour

State of End User Computing

VDI and end-user application virtualization solutions have come a long way in recent years, allowing for rapid deployment, massive scaling, and high-definition user experiences. Participate in this webcast to discover breakthrough trends for EUC/VDI and learn how you can leverage the momentum for your organization in 2017. Find out more.

SharePoint Migration: A Three Step Plan for Your Success in 2017

Is 2017 the year your organization makes a SharePoint move? On this webinar, not only will you learn about these three actions, Microsoft MVP Levithan will also share his predictions about Microsoft, SharePoint and enterprise collaboration changes in 2017. Register now!

Duration: 1 Hour

Why You Should Protect Active Directory in 2017

Microsoft Active Directory is under siege by cyber criminals. Join us to discover why Active Directory is targeted so often, the attack techniques and tools used today, and a modern architecture that secures Active Directory. Learn more.

Securing your Hybrid Office 365 and Azure Environments

In this webcast, Microsoft MVP, Nathan O'Bryan will identify some of the pitfalls you may encounter when securing your hybrid Office 365 and Azure environments. Learn more.

Innovate and Transform and Become the Next Uber or Amazon

For efficiency and simplicity, an organization’s Identity and Access Management (IAM) solution needs to provide an aggregated view of identities across all systems. Plus, it should enable managers to easily define and enforce the policies of their governance initiatives. Learn more.

Securing Your Organization from Ransomware

Security researcher and advocate Brook Chelmo will talk about ways to stop ransomware and other advanced persistent threats such as zero-day attacks and how you don’t have to be a security expert to protect your IT ecosystem.

The Cost of Doing Nothing: A Ransomware Backup Story

The Ransomware epidemic is frightening and making weekly headlines, but are you doing all that you can to protect yourself and your organization? In this webcast, Microsoft MVP Mike Crowley will explain what can be done to lower your attack surface as well as how to be respond in the event ransomware has penetrated your network. Don't wait until it’s too late to learn about this threat!

Duration: 1 Hour

Are Your Active Directory Groups a Security Exploit Waiting to Happen?

In this webinar, MVP and author Don Jones explores some of the ways your AD groups can be used against you, examining real-world hacks and attacks that almost every organization is susceptible to. He’ll also explore some of the capabilities and countermeasures you can deploy to protect and harden your AD group infrastructure. Learn more.

Duration: 1 Hour

Cloud Security: Who's Responsible for Your Critical Assets?

Join our new webcast and learn what you need to keep in mind when your data resides in the cloud.

Simplifying Print Management: Kill the Print Server

Join technology expert and founder of Techvangelism, Nick Cavalancia, and Jordan Pusey, Product Marketing Manager at PrinterLogic, as they explore and discuss three print architectures in an effort to help you determine how to eliminate print servers and simplify print management. Learn more.

Freedom From Fax: Why IT Departments Love the Cloud

Fax isn’t exactly the most modern form of business communication. But what many IT departments are realizing is this: It’s not fax that’s behind the times, it’s the execution. Register for our live webinar to discover why cloud faxing is catching on as a faster, cost-effective and more reliable alternative to fax machines and fax servers. Register now!

Duration: 1 Hour

Will Your Active Directory Environment Survive a Penetration Test?

This webinar will identify the attack vectors against Active Directory domain controllers using the Microsoft STRIDE threat model approach and give you the confidence to ensure your Active Directory environment will survive a pen test and be safeguarded against an actual attack.

Planning Your Migration to the Microsoft Cloud

In this webcast Nathan O’Bryan (MVP Office Servers and Services, MCSM: Messaging) will walk through the important planning steps that can make your migration into Office 365 successful.

The Ransomware Epidemic: Preventing, Mitigating, and Recovering from Ransomware Attacks

Learn how ransomware attackers are successful in delivering their malicious software and what techniques are the most common. You’ll also learn how to reduce the risk of becoming a ransomware victim through the use of process, procedure, and advanced technology. Finally, you’ll better understand how to recover from a successful ransomware attack and learn how to implement additional protection measures for added safety. Learn more.

Duration: 1 hour

The Ransomware Epidemic: Preventing, Mitigating, and Recovering from Ransomware Attacks

Learn how ransomware attackers are successful in delivering their malicious software and what techniques are the most common. You’ll also learn how to reduce the risk of becoming a ransomware victim through the use of process, procedure, and advanced technology. Finally, you’ll better understand how to recover from a successful ransomware attack and learn how to implement additional protection measures for added safety. Learn more.

Duration: 1 hour

Preventing and Mitigating Ransomware Infections

Not a week goes by without hearing about a network breach of some major corporation, agency or public figure, including government officials! If these powerful entities have been compromised, what chance do you have? Hear industry experts describe today's threat landscape and offer some practical, every-day protections. Register now!

Duration: 1 Hour

The Expanding IT Attack Surface

A significant portion of data access interruptions, data corruption events and downtime is the result of phishing, ransomware and social engineering attacks. Mobile devices, telework and cloud computing have expanded the attack, and it will take a hybrid strategy of data protection, secure computing practices and end-user education to meet the challenge. Get tips from data protection guru Jon Toigo.

Next Steps to Enhance Your Data Protection Infrastructure

In this webinar Microsoft MVP Greg Schulz will look at trends and issues including how different threat risk challenges impact your evolving environment, as well as opportunities to address them. He'll cover the 4-3-2-1 data protection and security rule. Join us!

Office 365 Migration War Stories

Join Microsoft MVP, J. Peter Bruzzese, for his expertise and perspective on migrating to Office 365. Learn from the 1,000’s of organizations that he has helped transition to the cloud. Learn the positives and the potential pitfalls. Learn more.

Duration: 1 hour

Migrating to Windows 10: Starting Fast, Finishing Strong

It’s inevitable, you’re going to need to migrate to Windows 10 at some point. But making the move to the new OS isn’t as simple as putting new machines in place, or by running UPGRADE.EXE. There’s so much more to consider. So, what will it take to simplify the migration so it’s done right the first time? Register now and learn more!

Duration: 1 Hour

What Every CISO Needs to Know About Office 365 Security

As more companies adopt Office 365 and OneDrive, CISOs need to carefully consider the risks and vulnerabilities. Data leakage, compromised credentials, compliance exposure, and malware are just a few of the threats. Today, however, it is possible to make your data in the cloud more secure than in your data center. Learn more in this webcast.

Duration: 1 Hour

Active Directory Monitoring: Go From Novice to Pro in Under 45 Minutes

Join Derek Melber, Active Directory MVP, as he guides you through the correct methods to set up Active Directory Change Monitoring. Derek will give you an inside scoop on the best way to report and setup alerts on the changes that you are tracking. Never miss key security changes in AD again! Read on.

Duration: 1 hour

The O.A.R. of Virtualization Scaling

Your journey to a flexible, scalable and secure IT universe begins now. Join virtualization experts for an interactive discussion empowering you to become the master of your software defined and virtual data center. Watch now!

Duration: 1 Hour