Webcasts


Upcoming

Imanami

Are Your Active Directory Groups a Security Exploit Waiting to Happen?

In this webinar, MVP and author Don Jones explores some of the ways your AD groups can be used against you, examining real-world hacks and attacks that almost every organization is susceptible to. He’ll also explore some of the capabilities and countermeasures you can deploy to protect and harden your AD group infrastructure.

Date: 12/20/2016

Time: 11:00 AM

Duration: 1 Hour


Logo

Simplifying Print Management: Kill the Print Server

Join technology expert and founder of Techvangelism, Nick Cavalancia, and Jordan Pusey, Product Marketing Manager at PrinterLogic, as they explore and discuss three print architectures in an effort to help you determine how to eliminate print servers and simplify print management. Learn more.

Date: 12/14/2016

Time: 12:00 pm


Logo: Esker. Document Process Automation.

Freedom From Fax: Why IT Departments Love the Cloud

Fax isn’t exactly the most modern form of business communication. But what many IT departments are realizing is this: It’s not fax that’s behind the times, it’s the execution. Register for our live webinar to discover why cloud faxing is catching on as a faster, cost-effective and more reliable alternative to fax machines and fax servers. Register now!

Date: 12/15/2016

Time: 11:00 AM

Duration: 1 Hour


Logo: Redmond Tech Advisor

Planning Your Migration to the Microsoft Cloud

In this webcast Nathan O’Bryan (MVP Office Servers and Services, MCSM: Messaging) will walk through the important planning steps that can make your migration into Office 365 successful.

Date: 12/06/2016

Time: 11:00 am


Logo: Redmond Tech Advisor

The Expanding IT Attack Surface

A significant portion of data access interruptions, data corruption events and downtime is the result of phishing, ransomware and social engineering attacks. Mobile devices, telework and cloud computing have expanded the attack, and it will take a hybrid strategy of data protection, secure computing practices and end-user education to meet the challenge. Get tips from data protection guru Jon Toigo.

Date: 12/07/2016

Time: 11:00 am


Logo

Next Steps to Enhance Your Data Protection Infrastructure

In this webinar Microsoft MVP Greg Schulz will look at trends and issues including how different threat risk challenges impact your evolving environment, as well as opportunities to address them. He'll cover the 4-3-2-1 data protection and security rule. Join us!

Date: 01/11/2017

Time: 11:00 am


Logo: Redmond Tech Advisor

How Public Key Encryption Works

Encrypting your data is becoming more important in a world where IT services are moving toward the cloud. In this 30-minute session, Nathan O'Bryan will explore cloud encryption strategies and what they mean to your organization. Register now!

Date: 12/08/2016

Time: 11:00 AM

Duration: 1 Hour


On Demand

Logo: CloudFlare

5 Ways to Secure Your Cloud Investment

In this webinar, we discuss developing a strong information security foundation at the user and application level, creating a perimeter of defense by limiting access to systems through whitelisting/blacklisting and much more. Watch it!

Duration: 1 Hour


Logo: CyberArk

Containing Attacks on the Endpoint

Attend this 30-minute webinar and learn how the just-released CyberArk Endpoint Privilege Manager solution can: strengthen your existing endpoint protection to contain threats early in the attack life cycle; enforce least privilege on the endpoint without negative usability impact; mitigate the risks of ransomware; get a "privileged" view of this critical layer of protection and learn how you can block and contain attacks at the endpoint before they stop your business.

Duration: 30 Minutes


Logo: Netwrix

Cloud Security: Who's Responsible for Your Critical Assets?

Join our new webcast and learn what you need to keep in mind when your data resides in the cloud.


Will Your Active Directory Environment Survive a Penetration Test?

This webinar will identify the attack vectors against Active Directory domain controllers using the Microsoft STRIDE threat model approach and give you the confidence to ensure your Active Directory environment will survive a pen test and be safeguarded against an actual attack.


Logo: Redmond Tech Advisor

The Ransomware Epidemic: Preventing, Mitigating, and Recovering from Ransomware Attacks

Learn how ransomware attackers are successful in delivering their malicious software and what techniques are the most common. You’ll also learn how to reduce the risk of becoming a ransomware victim through the use of process, procedure, and advanced technology. Finally, you’ll better understand how to recover from a successful ransomware attack and learn how to implement additional protection measures for added safety. Learn more.

Duration: 1 hour


Logo: Redmond Tech Advisor

The Ransomware Epidemic: Preventing, Mitigating, and Recovering from Ransomware Attacks

Learn how ransomware attackers are successful in delivering their malicious software and what techniques are the most common. You’ll also learn how to reduce the risk of becoming a ransomware victim through the use of process, procedure, and advanced technology. Finally, you’ll better understand how to recover from a successful ransomware attack and learn how to implement additional protection measures for added safety. Learn more.

Duration: 1 hour


Preventing and Mitigating Ransomware Infections

Not a week goes by without hearing about a network breach of some major corporation, agency or public figure, including government officials! If these powerful entities have been compromised, what chance do you have? Hear industry experts describe today's threat landscape and offer some practical, every-day protections. Register now!

Duration: 1 Hour


Logo: Esker. Document Process Automation.

IT and Business Benefits of Cloud Faxing

Join us for this webinar to learn how you can deploy faxing for your entire organization — with features like real-time status updates and 24/7 availability — quickly, easily and cost-effectively. Plus, find out how cloud services lay the foundation for data capture, workflow tools, postal mail automation and business process improvements that go far beyond fax. Register now!

Duration: 1 Hour


Mimecast

Office 365 Migration War Stories

Join Microsoft MVP, J. Peter Bruzzese, for his expertise and perspective on migrating to Office 365. Learn from the 1,000’s of organizations that he has helped transition to the cloud. Learn the positives and the potential pitfalls. Learn more.

Duration: 1 hour


Logo

Migrating to Windows 10: Starting Fast, Finishing Strong

It’s inevitable, you’re going to need to migrate to Windows 10 at some point. But making the move to the new OS isn’t as simple as putting new machines in place, or by running UPGRADE.EXE. There’s so much more to consider. So, what will it take to simplify the migration so it’s done right the first time? Register now and learn more!

Duration: 1 Hour


What Every CISO Needs to Know About Office 365 Security

As more companies adopt Office 365 and OneDrive, CISOs need to carefully consider the risks and vulnerabilities. Data leakage, compromised credentials, compliance exposure, and malware are just a few of the threats. Today, however, it is possible to make your data in the cloud more secure than in your data center. Learn more in this webcast.

Duration: 1 Hour


Active Directory Monitoring: Go From Novice to Pro in Under 45 Minutes

Join Derek Melber, Active Directory MVP, as he guides you through the correct methods to set up Active Directory Change Monitoring. Derek will give you an inside scoop on the best way to report and setup alerts on the changes that you are tracking. Never miss key security changes in AD again! Read on.

Duration: 1 hour


logo

The O.A.R. of Virtualization Scaling

Your journey to a flexible, scalable and secure IT universe begins now. Join virtualization experts for an interactive discussion empowering you to become the master of your software defined and virtual data center. Watch now!

Duration: 1 Hour


Logo: Redmond Tech Advisor

Using SSL Certificates To Secure Your Email Part 2

Encrypting your data is becoming more important in a world where IT services are moving toward the cloud. In this 30-minute session, we’ll explore cloud encryption strategies and what they mean to your organization. Register now!

Duration: 1 Hour


Logo: Redmond Tech Advisor

Protection, Profitability, and Performance: Availability and the Modern Data Center

So, what does it take to ensure your modern data center is available as it grows? Join industry experts as they discuss streamlining availability, availability in tactical terms, scaling availability and much more. Watch now.


Logo: Unitrends

How to Build the Best Cloud-based Disaster Recovery Solution for VMware: Brief Demo

This demo will show you how to quickly build a DR solution for VMware in AWS or Microsoft Azure – keeping costs to a minimum, and gaining the peace of mind that comes with 1-click failover, 1-click failback.


logo

Application Monitoring 101: Keeping Your Finger on Your Infrastructure's Pulse

Join Tim Warner, Pluralsight technical trainer and Gina Rosenthal, vExpert, for an informal discussion on best practices for monitoring heterogeneous network environments.


Logo: Redmond Tech Advisor

Security Best Practices for the Virtualized Infrastructure

Join us at this webcast to learn how to mitigate against breaches, especially those involving data theft, protect against malware and minimize recovery time objective for data restore. Learn more.

Duration: 1.5 hours


Logo

User Lifecycle Mismanagement: Why It’s Killing Your Company

In this informative webcast, hear industry expert Nick Cavalancia as he discusses what defines the user lifecycle and who, why and how to automate it.


Logo: CyberArk

Removing Local Admin Rights – SAY WHAT??

Attackers often gain access to your network via endpoints. This session will focus on the role of endpoints in cyberattacks, featuring common attack types that target endpoints such as ransomware.


Logo: Redmond Tech Advisor

Embedding Security Best Practices in Software Deployments and Management

In this Redmond Tech Advisor webinar, learn how to embed security into your automated software deployment and management process. We'll cover what to look out for, the biggest patching and security compliance pain points, as well as strategies to adhere to Application Readiness best practices. Learn more.


Logo: Esker. Document Process Automation.

7 Features to Investigate in a Cloud Fax Service

Savvy businesses understand that fax isn’t going away anytime soon‚ and for that reason‚ your organization should be reaping the benefits made possible by a cloud-based faxing service. Register now to learn more!

Duration: 1 Hour


Is Your Active Directory as Secure as You Think?

This webinar will prescribe practical and proven techniques and modern tools you can implement and deploy today to help you safeguard your company's most valuable asset. Learn more.


AppSense

Easing Windows 10 Migration

How are you currently managing your end user computing implementation? Are you using scripts for logon and data collection? Are you planning to use the same methods when you move to Windows 10? If you are, you’re doing it wrong. Use your migration to transform how you manage users. Attend this webinar and we’ll show you how!

Duration: 1 Hour


Microsoft Monitoring Reimagined

Learn how reimagined Microsoft monitoring can improve your infrastructure’s health and help you find and fix problems fast. Watch it now!

Duration: 1 Hour


Logo: Redmond Tech Advisor

Using SSL Certificates To Secure Your Email Part 1

Encrypting your data is becoming more important in a world where IT services are moving toward the cloud. In this 30-minute session, Nathan O'Bryan explores cloud encryption strategies and what they mean to your organization. Watch it now!

Duration: 1 Hour


Logo

Optimize Exchange Performance

Attend this webcast for an introduction to troubleshooting Exchange on-premises, hybrid, and Exchange Online.


Okta

Office 365 Business Driven Provisioning

Learn how to take complex identity management requirements and make them manageable. We discuss how instead of relying on legacy tools Microsoft gives away, you can remove the identity barriers for your Office 365 migration while building a foundation from which to launch your entire future cloud strategy. Learn more.


Data in Jeopardy: The Importance of Protecting Data In-Motion

In many cases data is transferred outside protected business applications and systems between users, systems, partners, and organizations. This puts the security of potentially sensitive information at risk of human error, network failures, insecure file sharing, and malicious actions. How can you ensure data in motion is secure?


Logo

Tools and Techniques for Securing Against Cyber Criminal Attacks

It’s not always about hackers and malware; and the list of bad things keeps getting longer. From the cyber threats of today and tomorrow, to the crazy user and insane customer, IT is frequently called upon to sort the situation out. Hear Ian Trump, Global Security Lead for keys to success. Watch it now!

Duration: 1 Hour


Logo

Secure Active Directory to Mitigate Risk in the Cloud

In this webcast, learn what to expect from Active Directory when embarking on your journey to the cloud.


Modernize Your Microsoft Business Applications

Join us for an in-depth look at why you should modernize and run Microsoft applications on AWS, Microsoft applications that can be run on AWS, how to get started with security and access, computing, databases and management services. Read on.


Logo: Redmond Tech Advisor

Mitigating the Threat of Malware: Planning Ahead or Falling Behind

It’s no longer just something that happens to “other companies”; protecting against the threat of malware and resulting attacks needs to be a staple in every IT and security pros strategy. There are a number of ways you can protect your organization, but with so many variants of so many threats, what’s the right way to be sure you have the greatest coverage? Find out more. Watch now!

Duration: 1 Hour


LogicNow

Ensuring Recovery Succeeds When Hardware Fails

Join us and be a part of the interactive discussion as Nick provides color and insight into the proper way to protect your business against "acts of hardware." Learn more.


How Phishing Has Become Office 365's #1 Security Risk

Join this live webinar to learn why hackers prefer targeting Office 365 users, why phishing is their weapon of choice, and how big the problem really is. Find out just how protected your users really are with Office 365 Advanced Threat Protection (ATP) activated, and why phishing attackers aren't the least bit deterred. Register now!

Duration: 1 Hour


Logo: Esker. Document Process Automation.

Simplification and Security: Building Your Business Case for Cloud Fax

As budgeting season has arrived, now is the perfect time to discover the many benefits of faxing as a cloud service, and how you can build your case for deploying it throughout your entire organization — quickly, easily and cost-effectively. Plus, hear customer case studies, and learn how a faxing service lays the foundation to take your improvement efforts far beyond fax. Watch now!

Duration: 1 Hour


Logo: Veeam

Planning to Succeed: Executing a BC/DR Strategy during a Digital Transformation

Join us for part 3 of our 3 part series. All too often, the changes in technology, environments, and business needs keep BC/DR somewhat stuck in the planning phase, never seeing the light of day. Without ever executing on and testing a plan, your organization’s availability is at risk.So, how do you move from planning to actually building and executing a strategy? Find out in this webcast. Register now.

Duration: 1 Hour


Logo: Veeam

BC/DR & the Digital Transformation: Hope for the Best, Plan for the Worst

Join us for part 2 of our 3 part series. As businesses undergo the Digital Transformation, changes in environment, infrastructure, and the use of the cloud have created the need to shift the backup & recovery strategy. What was once a focus on recovering files or a server image now is more concerned with availability of services.o, what is the best way to leverage the transformation, ensuring business continuity? Register now to find out how!

Duration: 1 Hour


Logo: Veeam

The Digital Transformation of Backup & Recovery: Changing Businesses, Changing Strategies

Once defined by 9-to-5, bricks & mortar, pen & paper, and hand & tool, businesses are replacing these old concepts with the need to be always-on, the leveraging of interconnected devices and users, all with an expectation of 24/7 access to data, applications, and systems…and zero downtime. So, as your business begins to transform, how does your backup strategy need to change? Register and learn more.

Duration: 1 Hour


Logo: Redmond Tech Advisor

Data Protection for Modern Microsoft Environments

Your organization’s business depends on modern Microsoft environments – Microsoft Azure and new versions of Windows Server 2016, Microsoft Hyper-V, and Microsoft business applications. Join our webinar and learn how different data protection solutions protect your Microsoft environment. Register now!

Duration: 90 Min


Logo: Centrify

Top 3 Urgencies Driving the Adoption of Multi-Factor Authentication

Many organizations have increased their cyber security spending to protect against the growing number of attacks – however, traditional network perimeter defenses are no longer viable. Attackers are exploiting passwords to gain access to businesses' networks, and take over from within. Join us to learn about how best to protect today’s hybrid IT environments. Sign up now!

Duration: 1 Hour


Bridging the Office 365 Security Gap

Migrating to the cloud poses new security challenges. Where does native Office 365 security fall short? How can you best address these gaps in O365 security? In this webinar we answer those questions and more. Read more!

Duration: 1 Hour


Mimecast

Office 365 Migrations and Beyond – Planning for Potential Risks

Join Microsoft MVP, Mike Crowley and Mimecast Chief Technology Officer, Neil Murray as they discuss an action plan for assessing migration risks of Office 365, a multi-layer security strategy to combat whaling, ransomware and other evolving threats, and the importance of two clouds for cyber resiliency. Read on.


Mimecast

There Will Be Attacks – Snap Out Of It!

The threat of ransomware, spear-phishing, whaling and socially-engineered email attacks is real. You've heard about email-based attacks on the news. But it can't happen to your company, right? Snap out of it! Register now!

Duration: 1 Hour


Metalogix

Secrets of Office 365 Storage Architecture Revealed

How can Office 365 support millions of users and still perform well? Join Paul LaPorte for a free webinar and discover how Microsoft improved on the SharePoint storage architecture to deliver Office 365 for today’s business and organizational needs. Read on!

Duration: 1 Hour


Logo: Esker. Document Process Automation.

Order Management for the Modern Age: Why It Pays to Go Paperless

An increasing number of organizations that were manually processing inbound sales orders to their systems seem to have found their answer — order processing automation. Register for the webinar, Order Management for the Modern Age, as Esker explores how an ERP-integrated solution can help any business eliminate the manual pains of fax and email order processing. Learn more.

Duration: 1 Hour


Logo: Redmond Tech Advisor

Why Secure Encryption Matters

Encrypting your data is becoming more and more important in a world where IT services are moving toward the cloud. In this third webcast in a series of six 30-minute sessions, we’ll explore cloud encryption strategies and what they mean to your organization.


Logo: Redmond Tech Advisor

The Evolution of SSL/TLS Certificates

SSL is one of the foundational technologies on which the internet is built. In this 30-minute sessions we’ll dive into TLS. Microsoft MVP Nathan O’Bryan will cover how to properly implement protection for your systems in addition to real world tips and practical lessons learned for protecting your data in the cloud. Watch it now!


Logo: Redmond Tech Advisor

Best Practices for Managing SSL/TLS Certificates

SSL is one of the foundational technologies on which the internet is built. Join Microsoft MVP Nathan O’Bryan as he explores how to properly implement protection for your systems in addition to real world tips and practical lessons learned for protecting your data in the cloud. Read on.


Five Ways Dell SonicWALL’s Secure Mobile Access Keeps Mobile Employees and Data Safe

Listen to Mark Hewett and Steven Sanderson at this presentation that discusses how you can manage the proliferation of BYOD devices in your workplace and in the field. Learn more.


Rackspace

Why you should care about Identity-as-a-Service (IDaaS): An Expert’s perspective

Join featured speakers, Rackspace and 10th Magnitude on a round table discussion on the concepts of cloud form factors leading to hybrid cloud, the advantages of using hybrid cloud technologies, and a look at how the Microsoft Azure platform enables efficient and effective hybrid cloud computing. See how organizations are reducing complexity and management costs by leveraging managed hosting in hybrid cloud environments through real-world use cases.


Rackspace

Hybrid Clouds: Azure Real-World Use Cases

Join featured speakers, Rackspace and 10th Magnitude on a round table discussion on the concepts of cloud form factors leading to hybrid cloud, the advantages of using hybrid cloud technologies, and a look at how the Microsoft Azure platform enables efficient and effective hybrid cloud computing. See how organizations are reducing complexity and management costs by leveraging managed hosting in hybrid cloud environments through real-world use cases.