Webcasts


Upcoming

Logo: Esker. Document Process Automation.

7 Features to Investigate in a Cloud Fax Service

Savvy businesses understand that fax isn’t going away anytime soon‚ and for that reason‚ your organization should be reaping the benefits made possible by a cloud-based faxing service. Register now to learn more!

Date: 10/25/2016

Time: 11:00 AM

Duration: 1 Hour


Logo: Redmond Tech Advisor

How Public Key Encryption Works

Encrypting your data is becoming more important in a world where IT services are moving toward the cloud. In this 30-minute session, we’ll explore cloud encryption strategies and what they mean to your organization. Register now!

Date: 12/08/2016

Time: 11:00 AM

Duration: 1 Hour


Logo: Redmond Tech Advisor

Using SSL Certificates To Secure Your Email Part 2

Encrypting your data is becoming more important in a world where IT services are moving toward the cloud. In this 30-minute session, we’ll explore cloud encryption strategies and what they mean to your organization. Register now!

Date: 11/15/2016

Time: 11:00 AM

Duration: 1 Hour


Logo: Redmond Tech Advisor

Using SSL Certificates To Secure Your Email Part 1

Encrypting your data is becoming more important in a world where IT services are moving toward the cloud. In this 30-minute session, we’ll explore cloud encryption strategies and what they mean to your organization. Register now!

Date: 10/20/2016

Time: 11:00 AM

Duration: 1 Hour


Data in Jeopardy: The Importance of Protecting Data In-Motion

In many cases data is transferred outside protected business applications and systems between users, systems, partners, and organizations. This puts the security of potentially sensitive information at risk of human error, network failures, insecure file sharing, and malicious actions. How can you ensure data in motion is secure? Join us to find out.

Date: 10/05/2016

Time: 11:00 am


Logo

Tools and Techniques for Securing Against Cyber Criminal Attacks

It’s not always about hackers and malware; and the list of bad things keeps getting longer. From the cyber threats of today and tomorrow, to the crazy user and insane customer, IT is frequently called upon to sort the situation out. Join Ian Trump, Global Security Lead for keys to success. Register now!

Date: 09/27/2016

Time: 10:00 AM

Duration: 1 Hour


Logo: Dell Software

Secure Active Directory to Mitigate Risk in the Cloud

In this webcast, learn what to expect from Active Directory when embarking on your journey to the cloud.

Date: 10/04/2016

Time: 11:00 am


LogicNow

Ensuring Recovery Succeeds When Hardware Fails

Join us and be a part of the interactive discussion as Nick provides color and insight into the proper way to protect your business against "acts of hardware." Learn more.

Date: 10/06/2016

Time: 11:00 am


How Phishing Has Become Office 365's #1 Security Risk

Join this live webinar to learn why hackers prefer targeting Office 365 users, why phishing is their weapon of choice, and how big the problem really is. Find out just how protected your users really are with Office 365 Advanced Threat Protection (ATP) activated, and why phishing attackers aren't the least bit deterred. Register now!

Date: 09/28/2016

Time: 11:00 AM

Duration: 1 Hour


Planning to Succeed: Executing a BC/DR Strategy during a Digital Transformation

Join us for part 3 of our 3 part series. All too often, the changes in technology, environments, and business needs keep BC/DR somewhat stuck in the planning phase, never seeing the light of day. Without ever executing on and testing a plan, your organization’s availability is at risk.So, how do you move from planning to actually building and executing a strategy? Find out in this webcast. Register now.

Date: 10/11/2016

Time: 9:00 AM

Duration: 1 Hour


BC/DR & the Digital Transformation: Hope for the Best, Plan for the Worst

Join us for part 2 of our 3 part series. As businesses undergo the Digital Transformation, changes in environment, infrastructure, and the use of the cloud have created the need to shift the backup & recovery strategy. What was once a focus on recovering files or a server image now is more concerned with availability of services.o, what is the best way to leverage the transformation, ensuring business continuity? Register now to find out how!

Date: 09/27/2016

Time: 9:00 AM

Duration: 1 Hour


Bridging the Office 365 Security Gap

Migrating to the cloud poses new security challenges. Where does native Office 365 security fall short? How can you best address these gaps in O365 security? In this webinar we answer those questions and more. Read more!

Date: 09/28/2016

Time: 11:00 AM

Duration: 1 Hour


On Demand

AppSense

You’re Doing It Wrong: Easing Windows 10 Migration

How are you currently managing your end user computing implementation? Are you using scripts for logon and data collection? Are you planning to use the same methods when you move to Windows 10? If you are, you’re doing it wrong. Use your migration to transform how you manage users. Attend this webinar and we’ll show you how!

Duration: 1 Hour


Microsoft Monitoring Reimagined

Join us to learn how reimagined Microsoft monitoring can improve your infrastructure’s health and help you find and fix problems fast. Register now!

Duration: 1 Hour


Logo: Flexera Software

10 Steps to Simplify Your Windows 10 Migration

Watch this webinar to learn 10 tips and tricks to simplify your Windows 10 migration, including reducing the number of applications to migrate, knowing which applications have compatibility issues, and empowering users to migrate when they are ready.


Logo: Dell Software

Modernizing Active Directory for Azure and Office 365

Moving to the cloud can drastically reduce maintenance costs of IT infrastructures. But how easy is it to get there? In this webcast, you’ll learn why modernizing your AD is key to a successful migration.


Logo: Dell Software

Hybrid Directory Governance: Understanding How Security Works in a Hybrid Active Directory Environment of On-Premises AD/Azure AD and Office 365

Microsoft’s security for Office 365 and Azure AD can be ineffective if your on-premise AD protection isn’t tight. Join Randy Franklin Smith for tips on how to integrate on-premises and Azure ADs for better security.


Logo: Dell Software

Active Directory Disasters — Plan Ahead! Five Dreaded Days that Can Ruin Your Whole Vacation

Watch this on-demand webcast to hear experts explain and rank common AD disasters using a scale of vacation nightmares. Then discover how you can easily prevent them with AD disaster recovery solutions.


Logo: Dell Software

The Cloud, Office 365, Azure – It’s Time. Are you and your Active Directory Ready?

Discover the differences between an on-prem and Azure AD, learn about common challenges when incorporating a new, cloud-based identity service and see why it’s essential to modernize your on-prem AD before the move.


Modernize Your Microsoft Business Applications

Join us for an in-depth look at why you should modernize and run Microsoft applications on AWS, Microsoft applications that can be run on AWS, how to get started with security and access, computing, databases and management services. Read on.


Logo: Redmond Tech Advisor

Mitigating the Threat of Malware: Planning Ahead or Falling Behind

It’s no longer just something that happens to “other companies”; protecting against the threat of malware and resulting attacks needs to be a staple in every IT and security pros strategy. There are a number of ways you can protect your organization, but with so many variants of so many threats, what’s the right way to be sure you have the greatest coverage? Find out more. Watch now!

Duration: 1 Hour


Logo: Esker. Document Process Automation.

Simplification and Security: Building Your Business Case for Cloud Fax

As budgeting season has arrived, now is the perfect time to discover the many benefits of faxing as a cloud service, and how you can build your case for deploying it throughout your entire organization — quickly, easily and cost-effectively. Plus, hear customer case studies, and learn how a faxing service lays the foundation to take your improvement efforts far beyond fax. Watch now!

Duration: 1 Hour


The Digital Transformation of Backup & Recovery: Changing Businesses, Changing Strategies

Once defined by 9-to-5, bricks & mortar, pen & paper, and hand & tool, businesses are replacing these old concepts with the need to be always-on, the leveraging of interconnected devices and users, all with an expectation of 24/7 access to data, applications, and systems…and zero downtime. So, as your business begins to transform, how does your backup strategy need to change? Register and learn more.

Duration: 1 Hour


Logo: Redmond Tech Advisor

Data Protection for Modern Microsoft Environments

Your organization’s business depends on modern Microsoft environments – Microsoft Azure and new versions of Windows Server 2016, Microsoft Hyper-V, and Microsoft business applications. Join our webinar and learn how different data protection solutions protect your Microsoft environment. Register now!

Duration: 90 Min


Logo: Centrify

Top 3 Urgencies Driving the Adoption of Multi-Factor Authentication

Many organizations have increased their cyber security spending to protect against the growing number of attacks – however, traditional network perimeter defenses are no longer viable. Attackers are exploiting passwords to gain access to businesses' networks, and take over from within. Join us to learn about how best to protect today’s hybrid IT environments. Sign up now!

Duration: 1 Hour


Rackspace

Deploying Microsoft Private Cloud at Scale

In this webinar, Kent Kingery, Sr. Manager of Product and Engineering at Rackspace, paints a picture of the private cloud experience using Microsoft technologies, and what the Microsoft private cloud experience looks like at scale in production.


Logo: Dell Software

Windows Server 2016 and Active Directory

Join us for this interactive webinar to begin planning your journey to Windows Server 2016 and a new optimized AD deployment that is flexible, scalable and elastic, and enables resilient infrastructures.


Mimecast

Office 365 Migrations and Beyond – Planning for Potential Risks

Join Microsoft MVP, Mike Crowley and Mimecast Chief Technology Officer, Neil Murray as they discuss an action plan for assessing migration risks of Office 365, a multi-layer security strategy to combat whaling, ransomware and other evolving threats, and the importance of two clouds for cyber resiliency. Read on.


Mimecast

There Will Be Attacks – Snap Out Of It!

The threat of ransomware, spear-phishing, whaling and socially-engineered email attacks is real. You've heard about email-based attacks on the news. But it can't happen to your company, right? Snap out of it! Register now!

Duration: 1 Hour


Metalogix

Secrets of Office 365 Storage Architecture Revealed

How can Office 365 support millions of users and still perform well? Join Paul LaPorte for a free webinar and discover how Microsoft improved on the SharePoint storage architecture to deliver Office 365 for today’s business and organizational needs. Read on!

Duration: 1 Hour


Logo: Esker. Document Process Automation.

Order Management for the Modern Age: Why It Pays to Go Paperless

An increasing number of organizations that were manually processing inbound sales orders to their systems seem to have found their answer — order processing automation. Register for the webinar, Order Management for the Modern Age, as Esker explores how an ERP-integrated solution can help any business eliminate the manual pains of fax and email order processing. Learn more.

Duration: 1 Hour


Logo: Redmond Tech Advisor

Why Secure Encryption Matters

Encrypting your data is becoming more and more important in a world where IT services are moving toward the cloud. In this third webcast in a series of six 30-minute sessions, we’ll explore cloud encryption strategies and what they mean to your organization.


Logo: Redmond Tech Advisor

The Evolution of SSL/TLS Certificates

SSL is one of the foundational technologies on which the internet is built. In this second webcast in a series of six 30-minute sessions we’ll dive into TLS. Microsoft MVP Nathan O’Bryan will cover how to properly implement protection for your systems in addition to real world tips and practical lessons learned for protecting your data in the cloud. Sign up now!


Logo: Redmond Tech Advisor

Best Practices for Managing SSL/TLS Certificates

SSL is one of the foundational technologies on which the internet is built. Join Microsoft MVP Nathan O’Bryan as he explores how to properly implement protection for your systems in addition to real world tips and practical lessons learned for protecting your data in the cloud. Read on.


Imanami

The Real Cost of Managing Active Directory Groups

In this interactive webcast, join industry experts as they discuss what’s really involved in managing AD Groups, how to calculate the cost of Group Management, is there tangible savings in automating AD Group Management and much more.


Metalogix

SharePoint 2016: Governance Makes a Comeback!

Join this webinar to learn about the strengths and weaknesses of the new capabilities within SharePoint 2016 and why 2016 is the year to fully embrace SharePoint governance. Read on.


Metalogix

SharePoint 2016 Migration Success Takes Three Actions

Your successful migration to SharePoint 2016 takes three actions: analysis, optimization and planning. It also takes a lot of questions that require answers. What do you have? What do you move? What do you archive? What problems might occur? What do users expect? In this webcast, you’ll learn what to ask and how to find answers. Read on.


Logo: Observe IT

Insider Threat Management Program Guide

Insider Threat Management Program Guide – A Guide for Initiating, Developing, and Implementing Your Program.


Okta

Office 365 Business Driven Provisioning

Join us as we explore how to take complex identity management requirements and make them manageable. We discuss how instead of relying on legacy tools Microsoft gives away, you can remove the identity barriers for your Office 365 migration while building a foundation from which to launch your entire future cloud strategy. Learn more.


Microsoft Office 365 Security: Beyond the Basics

Advanced security challenges like changing data privacy laws, secret government data requests, and the looming possibility of a cloud provider security breach are areas not covered natively by Microsoft’s cloud solution. Join Microsoft MVP Nathan O’Bryan and Vaultive’s VP of Product Marketing, Doug Lane, as they discuss when and how you can use third-party tools to meet your organization’s security requirements and confidently migrate to Office 365. Learn more.

Duration: 1 Hour


Five Ways Dell SonicWALL’s Secure Mobile Access Keeps Mobile Employees and Data Safe

Join Mark Hewett and Steven Sanderson for this live, interactive webcast to learn how you can manage the proliferation of BYOD devices in your workplace and in the field. Learn more.


Logo: Veeam -It Just Works!

Understanding DRaaS: Trends, Challenges and Best Practices

Disaster Recovery as a Service (DRaaS) is becoming a more powerful option for organizations of all sizes when compared to traditional DR sites. Join us as we explore trends, challenges and best practices. Learn more.


Logo: Esker. Document Process Automation.

Freedom from Fax: Why IT Departments Love the Cloud

Fax isn’t exactly the most modern form of business communication. But what many IT departments are realizing is this: It’s not fax that’s behind the times, it’s the execution. Register for our live webinar to discover why cloud faxing is catching on as a faster, cost-effective and more reliable alternative to fax machines and fax servers. Sign up today!

Duration: 1 Hour


Rackspace

Hybrid Clouds: Azure Real-World Use Cases

Join featured speakers, Rackspace and 10th Magnitude on a round table discussion on the concepts of cloud form factors leading to hybrid cloud, the advantages of using hybrid cloud technologies, and a look at how the Microsoft Azure platform enables efficient and effective hybrid cloud computing. See how organizations are reducing complexity and management costs by leveraging managed hosting in hybrid cloud environments through real-world use cases.


Rackspace

Why you should care about Identity-as-a-Service (IDaaS): An Expert’s perspective

Join featured speakers, Rackspace and 10th Magnitude on a round table discussion on the concepts of cloud form factors leading to hybrid cloud, the advantages of using hybrid cloud technologies, and a look at how the Microsoft Azure platform enables efficient and effective hybrid cloud computing. See how organizations are reducing complexity and management costs by leveraging managed hosting in hybrid cloud environments through real-world use cases.


Logo: Flexera Software

Moving to Office 365? What You Need to Know!

Many organizations are planning on making the move to Microsoft Office 365, but there are some key things to consider before you make the switch. Our guest speaker, Martin Thompson of the ITAM Review, will discuss the role of IT asset management (ITAM) in major IT transformation projects such as this.

Duration: 1 Hour


Logo: Dell Software

Best Practices for Migrating PSTs and Email Archives to Office 365

Microsoft MVP Mike Crowley will describe the challenges of wrangling this data and offer strategies and tips for migrating PSTs and other archives to Office 365 through the use of free as well as for-purchase migration tools. Now available on-demand!

Duration: 1 Hour


Imanami

10 Things You Should be Asking Active Directory… and How to Get Answers

Running a periodic “health check” on AD should involve more than just checking the replication topology. There are also key questions you should be asking about the status of groups, your overall security situation, missing AD information, and more. Knowing the answers can help you avoid common security problems and operational pitfalls - and getting those answers can be easier than you think. Read on.


Metalogix

Dear Office 365, I Need Backup

When considering a move to Office 365, chances are you’re also building a backup strategy to support your new environment. Is a backup solution enough to answer your organization’s growing Office 365 needs? Join Office 365 expert Dr. Steve Marsh to learn how to appropriately plan your backup strategy and proactively prepare for the next phase of your organization’s Office 365 journey. Sign up now!

Duration: 1 Hour


Building a Better Business (Process) with SharePoint

Learn how you can turn your SharePoint system into a powerful tool for creating velocity in your organization. Robert Bogue will discuss approaches for form creation, workflow options, and how you can reduce the friction of your internal processes by automating business process applications for SharePoint with K2. Register now and learn more.

Duration: 1 Hour


Logo: CloudFlare

5 Ways to Secure Your Cloud Investment

In this webinar, we'll discuss developing a strong information security foundation at the user and application level, creating a perimeter of defense by limiting access to systems through whitelisting/blacklisting and much more. Join us!

Duration: 1 Hour


Logo: Dell Software

IAM as a Service (IAMaaS) is a reality today. Find out if it’s right for your organization.

Explore if identity and access management as a service (IAMaaS) is right for you? Discover how IAMaaS measures up against traditional on-premise solutions, and determine which scenario is the right fit for your organization.


Logo: Dell Software

Understanding Identity and Access Management Compliance Requirements for PCI, HIPAA, SOX and ISO 27001

Discover the role that IAM plays in compliance and security. In this webcast, you’ll hear how about the latest PCI, HIPAA, SOX and ISO 27001 requirements.


Logo: Dell Software

Understanding the NIST Cybersecurity Framework: Different, Scalable and Practical

In this on-demand webcast, learn about the National Institute of Standards and Technology’s (NIST’s) cybersecurity framework, A NIST expert walks you through the Framework for Improving Critical Infrastructure Cybersecurity.


Logo: Dell Software

Anatomy of an Insider Threat—Protecting Active Directory is Key

Learn about the five key insider threat trends facing organizations, the importance of protecting your AD and the best ways to achieve that goal.


Logo: Dell Software

Top 10 Indicators of Tampering with Privileged Accounts

Watch this on-demand webcast to see how to tell when your privileged accounts are being tampered with, and how administrative authority can be obtained or stolen at each level.


Logo: Dell Software

Protecting AD from Malicious and Accidental Destruction

Find out how to deal with the four types of AD disasters, prepare for and execute a successful forest recovery and automatically protect your AD. Watch this on-demand webcast.