Webcasts


Upcoming

Security Starts with Authentication

Authentication technologies are evolving rapidly to meet the security and usability needs of both consumers and enterprises. In this webinar we'll give an overview of modern identity requirements for B2B and B2C applications and discuss trends in identity technologies. We'll also introduce the Okta Platform — a complete identity micro-service for any application. Read on.

Date: 07/29/2015

Time: 11:00 am


Logo: Redmond Tech Advisor

Benefits and Best Practices of Deploying SSL Certificates

Are you unsure as to whether or not you should use SSL certificates in your infrastructure, or to what extent you should use them? You’ll find answers to your questions in this informative Webcast featuring MVP Nathan O’Bryan.

Date: 07/29/2015

Time: 11:00 am


Logo: Netwrix. The #1 configuration auditing.

How to Ensure Continuous Compliance? Episode IV. SOX

Compliance is a major concern to many organizations in a variety of industries - financial, healthcare, governmental and more. Meeting compliance must be a systemic endeavor that touches all aspects of organizational assets, processes and IT infrastructure in particular.

Date: 07/28/2015

Time: 11:00 am

Duration: 1 Hour


IT and Business Benefits of Cloud Faxing

Join us for this webinar to learn how you can deploy faxing for your entire organization — with features like real-time status updates and 24/7 availability — quickly, easily and cost-effectively. Register now!

Date: 07/28/2015

Time: 9:00 AM

Duration: 1 Hour


On Demand

Logo: Mimecast. Unified email management.

Office 365 Email Migration Surprises – Rhetoric vs. Reality

During this 37 minute webinar, Microsoft Office365 MVP J. Peter Bruzzese, will reveal the post migration surprises he’s heard most frequently from companies that have already made the move. He’ll provide his realistic assessment of what to expect and what to plan for when moving to the cloud.

Duration: 37:30


Logo: Mimecast. Unified email management.

Webinar featuring Forrester Research: The Human Firewall – Strengthening Email Security

Listen to guest speaker Nick Hayes from Forrester Research and Steve Malone from Mimecast for insight into how technology and awareness together can strengthen defenses.

Duration: 52:00


Logo: SherWeb

Discover how we've built SherWeb's Performance Cloud

Everything you ever wanted to know about public clouds, but couldn’t find someone to answer honestly. Bring your toughest questions!

Duration: 1 Hour


Eliminate Print Servers - Enable Mobile, BYOD and Guest Printing

PrinterLogic eliminates the need for print servers and enables centrally managed direct IP printing. With its Mobile Printing solution, mobile, BYOD users and guests can easily print, whether they are on or off network. Learn more.


Logo: Unitrends

Cloud Backup and Recovery Survey Results

We surveyed 1600 respondents from the IT community on their usage of cloud backup solutions for computing, storage and business continuity including preferred vendors.


Logo: Unitrends

Docker Backup, Taylor Swift, and Data Protection

Docker is hot. Almost as hot as Taylor Swift right now. But not since VMware’s early hypervisors has a product been so hyped with so little means of protection.


Logo: Unitrends

VMware vSphere 6 Roudtable Discussion

Our panel of vExperts discusses VMware vSphere 6, it's features and enhancements and debates what it means for the future of virtualization.


Logo: Unitrends

The Benefits of Physical Backup Appliances in a Virtual World

Learn the reasons why including physical appliances in your disaster recovery plan may be preferable to a virtual only solution. Watch our webinar now!


Logo: Unitrends

Ransomware and Data Backup

Learn about backup and disaster recovery best practices for preventing the menace of ransomware and recovering if infected.


Logo: BridgeWays

Leverage System Center Operations Manager to monitor your VMware environment efficiently and effectively

Want to monitor your VMware environment efficiently and cost-effectively? You can. Leverage your in-house System Center Operations Manager to apply the same great SCOM benefits to your virtualized environment with our VMware Management Pack.

Duration: 30 Minutes


Logo: Dell Software

Endpoint to Perimeter: Network Protection That’s Inside Out and Outside In

Learn from the experts what’s on the horizon and how to effectively use the latest technologies to cope with security threats from the inside out and the outside in.


Automating Fax & Email Order Processing

Join this live webinar and discover how automating fax and email orders in the cloud can help your company.

Duration: 1 Hour


Logo: Dell Software

Maximize the Value of Your Unified Communications

Tony Bradley and Michael Keenan will talk about some of the challenges organizations face with unified communications and how to manage disparate UC platforms, like Microsoft Lync / Skype for Business and Cisco UC, effectively and efficiently.


Logo: Dell Software

A Reality Check on the Role of Clouds in Data Protection

Attend this webcast for an explanation of cloud-based disaster recovery, examples of hybrid private/cloud data protection models and ideas for preserving critical data while freeing up space in your storage infrastructure.


Active Directory Groups and Insider Threats

Join industry experts as they talk about the current states of both insider threats and group management and why connecting the two is critical to the security of your organization.


Managing AD Groups: Simple IT Headache or Security Hazard?

This webcast will discuss the challenges of AD group management, including how out of date is your group management, what’s really at risk and ways to automate common group management tasks.


BinaryTree

Planning and Executing Your Migration to Exchange Online

Join Nathan O’Bryan (MCSM: Messaging and MVP: Office 365) and Vadim Gringolts (CTO, Binary Tree) for an unscripted discussion about planning your migration to Exchange Online in Office 365.


Entrust

Moving Beyond Passwords with Mobile

This webinar looks at the role of mobile in creating more secure, more convenient, multi-purpose trusted identities and explores a variety of use cases where mobile will help you begin your journey to becoming a password-less enterprise. Learn more.


Moving to Office 365 with Security in Mind

Industry experts will host an informal discussion about making the move to Office 365—with a focus on how to address security concerns and make the switch to Office 365 with security and compliance in mind. Register now!

Duration: 1 Hour


Logo: Unitrends

Hyper-V: Enhance Your Virtualization Experience

Watch industry experts Nick Cavalancia and Mike DiMeglio as they discuss key considerations for architecting a data protection and recovery strategy for a Hyper-V environment from the smallest VMs to large, mission-critical applications with short SLAs. Learn more.


Logo: Dell Software

Highlights from an Active Directory Modernization Analysis

Cloud initiatives, mergers and acquisitions, compliance regulations and implementation of new systems, require an organized, consolidated and up to date Active Directory infrastructure. Learn how four corporations made the decision to modernize and realized a massive return on their investment.


Entrust

Understanding SSL/TLS Best Practices and Application Protection

Learn the latest techniques used to mitigate attacks on web based applications.


Logo: Dell Software

Making Security a Business Enabler

Empower your business by transforming security into an enabler that provides users with access to the data and applications they need to be productive at work.

Duration: 49:51


Logo: BridgeWays

Get Consistent and Consolidated Metrics With InterSystems Caché Management Pack for System Center Operations Manager

Attend InterSystems Cache Management Pack Webinar on May 21st, to see a live demo and to learn about the features and benefits of monitoring your InterSystems Caché database environment within the System Center Operations Manager (SCOM) console.

Duration: 1 Hour


Logo: Dell Software

5 Good Reasons Email Encryption Matters

This engaging webinar will provide a brief primer on encryption techniques, outline the expanding reach of data security regulations, and identify how adding email encryption can help your organization fearlessly face down the risks of non-compliance.


The Great SharePoint Security and Insider Threat Survey – The Results!

This session will present the survey findings gathered from over 1,000 SharePoint IT professionals on how they are protecting their SharePoint content. Watch and learn some often overlooked SharePoint tips, tricks and best practices.


The 1-2-3 Security Approach for Windows Server 2003 EOS

In this educational webcast, industry experts will discuss how to best apply security solutions across three paths to help customers deal with Windows Server 2003 EOS.


Freedom from Fax: Why IT Departments Love the Cloud

Fax isn’t exactly the most modern form of business communication. But what many IT departments are realizing is this: It’s not fax that’s behind the times, it’s the execution. Register for this webinar to discover why cloud faxing is catching on as a faster, cost-effective and more reliable alternative to fax machines and fax servers.

Duration: 1 Hour


Logo: Redmond Tech Advisor

Data Security in the Mobile Age

Business-savvy IT requires that we consider the dark side of technology strategy, including the threat surface it creates and the risk mitigation requirements that it spawns. Join storage guru Jon Toigo for the latest best practices and potential pitfalls of data protection in the agile age.


The Enterprise Application Lifecycle: It’s Costing You More Than You Know

In this informative webcast, join industry experts as they discuss how to gain control over applications, improve IT efficiency, lower cost, and reduce the dependence on Shadow IT.


Logo: Redmond Tech Advisor

Windows Server 2003 Migration

In this webcast Adam Bertram will cover how to discover current services on an older server, figuring out where to migrate these workloads to, how to build a plan for migration, and some common tools that will help in the process.


Microsoft TMG End of Life – How to Stay Secure

Attend this webcast for information on a Microsoft Threat Management Gateway replacement for reverse proxy and single sign on.


Logo: Dell Software

Unified Communications Best Practices

Attend this webcast to learn how to understand – and unlock – the value of your unified communications platform.


Logo: Dell Software

The Citrix Super Admin ― How to Simplify Your Work with X-ray Vision

In this educational session, you’ll discover how much easier your job can be with complete visibility into all aspects of your Citrix infrastructure running on VMware.


Proven Practices for Office 365 Deployment, Security and Management

Join industry experts to learn how the single sign-on and automated account provisioning for Office365 can stop the cloud password sprawl, close security holes and free up IT time for new projects.


Logo: Redmond Tech Advisor

Non-Stop Data: Key Requirements for Agile and Always-On Business

This Redmond supercast will identify what non-stop data is all about and what are the best practices for enabling data for optimal usage by contemporary businesses.


Webinar Recording

Want a More Secure Environment? See How Systems Management Can Help

You want a more secure environment. But while you’re likely employing some form of perimeter security, such as firewalls, intrusion detection, encrypted data transfer or other similar methods, are you paying attention to what is happening at the device level? Join this webcast and learn what IDC research manager Robert Young has to say about improving security through more comprehensive systems management of your connected endpoints.

Duration: 1 Hour


5 Things to Know before Migrating to SharePoint 2013, Onedrive for Business and Office 365

Join Dr. Steve Marsh, Director of Product Marketing at Metalogix, as he shares the Metalogix experiences and expertise gathered from over a decade of migrations to Microsoft content platforms. Learn more.


Shattering SharePoint Storage Limitations: Addressing SharePoint Scalability, Reliability and Cost Issues

In this webcast Paul LaPorte explains the weaknesses in SharePoint storage architecture, and introduces Remote BLOB Storage and archiving solutions. Learn more.


Protecting FTP Servers Exposed to the Internet

While FTP is still widely used, it is also has lots of liabilities. In this technical webinar we’ll explore different aspects of running an FTP server on the Internet and how to protect it.


Office 365 Security

This webcast will discuss methods for securing the cloud-based suite, as well as delve into trends in next-generation technologies for digitally signing applications, binding people and documents, and assuring code integrity to wireless platforms.


Logo: Dell Software

De-Duplication: From Interesting to Indispensable in the Storage Administration Tool-kit

Join storage analyst and vendor watchdog, Jon Toigo, and Marc Mombourquette, Dell’s Data Protection guru, for this hype-free examination of data de-duplication and the benefits that Dell’s data reduction offerings. Learn more.


The Hybrid Content Dilemma

This webcast explores how the hybrid content dilemma causes end users, IT managers and CIOs to struggle when choosing on-premises or Cloud technologies as the best solution to support collaboration across the enterprise. Learn more.


Virtual Data Protection: Which Way Is the Right Way?

Industry experts investigate the many ways to protect your virtual environment by looking at the various levels of backup and recovery granularity and their impact on your ability to protect your virtual environment.


Make Your Storage Work For You: VAAI and ODX offload up to 30% of disk operations to the SAN

Join Aidan Finn (Microsoft MVP) at this webinar dedicated to the use of Offloaded Data Transfer and APIs for Array Integration. He will explain exactly how you can greatly enhance the storage system performance and increase VM density with Hyper-V and vSphere. Learn more.


From Downgraded to Dead: Monitoring Application Performance

In this educational webcast, join industry experts as they discuss 10 tips for stopping performance problems before they start.


Advanced Endpoint Protection

Hackers are exploiting all potential infiltration points thus it is important to establish your defense structure and response and remediate strategy from all angles. But with so many solutions out there, where do you start? Find out in this webcast.


Logo: Redmond Tech Advisor

Strategic Decisions for Active Directory Migrations and Consolidations

Join Greg Shields, author evangelist at Pluralsight, to learn about the end-state that fulfills a successful migration project and key tactics that protect your Active Directory core as it undergoes massive transformation.


Office 365 Deployment Challenges with Microsoft MVP Nathan O’Bryan

Join Microsoft MVP Nathan O'Bryan for a webcast on the identity and mobility management challenges associated with rolling out and adopting Office 365.


Logo: Centrify

Supporting Macs and Mobile Devices in the Enterprise: Balancing IT Control Vs. User Productivity

Guest speaker, Forrester Research Principal Analyst David K. Johnson will explore challenges and discuss techniques to allow enterprises to easily and seamlessly add Macs, tablets and smartphones to the corporate infrastructure leveraging tools, policies and processes that are already in place.


Logo: Dell Software

Eliminate Active Directory Migration & Disaster Recovery Headaches the Virtual Way

In this educational webcast, join industry experts as they discuss why it’s so important to test the AD migration and disaster recovery plans prior to a disaster and where to find the easy button.


Logo: Dell Software

Roll with the Changes: See Clearly into Your Virtual Environment

Industry experts show you how to get full visibility into your enterprise infrastructure to easily determine who made what changes when.


Dell Software

Consolidating Active Directory Domains and Forests

Consolidating domains and forests is a big job. View this webcast and learn how to merge or eliminate domains and forests and gain insight into common consolidation issues that can compromise security.

Duration: 1 Hour


Active Directory Domain Controllers: Backup Recovery in Virtualised Infrastructure

Join Sander Berkouwer and Mike Resseler for this webinar to learn the best practices of backup and virtualization for Active Directory Domain Controllers. View now!

Duration: 1 Hour


ESG Video: Best Practices in Virtualized Protection for 2014

Jason Buffington, ESG Sr. Analyst, discusses ESG's research findings on protecting highly virtualized environments, looking at such topics as server hypervisor adoption/preferences, general data protection trends, and specific approaches for protecting and recovering both VMware and Hyper-V environments.

Duration: 1 Hour