Webcasts


Upcoming

6 Best Practices for Backing Up Office 365

During this editorial webcast, experts from Redmond magazine walk through the best practices organizations are using to manage the Office 365 backup process. Read on.

Date: 05/16/2018

Time: 11:00 am


What Happens When Office 365 Fails: Backup & Recovery

There is a widespread misconception that data created and stored in the cloud does not need to be backed up. When data is deleted or corrupted, companies face three major problems: lost data, lost time and lost cash. Learn about cloud data recoverability and how to take control of your Office 365 data at this webinar.

Date: 05/31/2018

Time: 11:00 am


SaaS Data Access & Deprovisioning Strategy

Your organization needs a comprehensive deprovisioning strategy to accompany your use of SaaS apps. In this session, Joe Ochs of Backupify shows you how easy user lifecycle management can be. Read on.

Date: 05/10/2018

Time: 11:00 am


SaaS Data Access & Deprovisioning Strategy

Your organization needs a comprehensive deprovisioning strategy to accompany your use of SaaS apps. In this session, Joe Ochs of Backupify shows you how easy user lifecycle management can be. Read on.

Date: 05/10/2018

Time: 11:00 am


Solved: Advanced Data Classification and Leak Prevention in Office 365 (and across your other SaaS)

In this webinar, we will look at the built-in DLP capabilities and demonstrate how you can apply advanced data classification tools provided by Symantec, McAfee, GTB or any of the leading DLP vendors. We will show how you can integrate them into policy workflows that manage share policies, interact with users and even incorporate your choice of file encryption. Learn more.

Date: 05/22/2018

Time: 11:00 am


Security Sensemaking: The Magical Number Seven, Plus or Minus Two

Join us to learn how to leverage endpoint data to make sense of the software capabilities, capabilities of code in memory, and even the attacker’s capabilities in order to better detect, analyze and PREDICT attacks before they occur. Learn more.

Date: 05/24/2018

Time: 11:00 am


A Hacker Explains - How Your IT Environment Can Be Compromised

Join this practical webinar series about cybersecurity solutions, prepared by Liam Cleary, MVP, Associate Director and Solution Architect for Protiviti. These webinars walk you through the hacking process, the techniques hackers use once inside your network, and the tools and techniques you can use to defend your IT environment. At the end of the three-webinar series, you will have a better understanding of your organization’s cybersecurity posture and be able to improve your protection strategy. Learn more!

Date: 04/24/2018

Time: 11:00 AM

Duration: 1 Hour


Best Practices for Pulling Identities Together: What Enterprises Are Doing Now to Stay Secure

Join Microsoft MVP Sander Berkouwer and come away from this session with actionable tactics for minimizing the gaps in your company's identity and authentication security posture. Learn more.

Date: 05/02/2018

Time: 11:00 am


Ransomware: The Not So Good, Really Bad and Truly Ugly!

This session will educate attendees about the newest features of ransomware strains designed to evade detection and spread in new and creative ways. It will also discuss recent attacks and how the organizations could have better protected themselves.

Date: 04/25/2018

Time: 11:00am


Maintain Your Own Data with a Hybrid Cloud PKI

Learn how to overcome the challenges of running corporate trust infrastructures, such as PKI and data encryption systems, in the cloud.

Date: 05/10/2018

Time: 9:00am


Traditional Fax vs. Desktop Cloud Fax: 6 Reasons to Move to Cloud Faxing

Register now to discover all 6 reasons to move to cloud faxing and how making the move to cloud-based faxing can benefit your business! Even if you miss the live presentation, we’ll email you a recording of it.

Date: 04/26/2018

Time: 11:00 AM

Duration: 20 Min


A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.

Date: 04/25/2018

Time: 11:00am


A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.

Date: 04/25/2018

Time: 11:00am


On Demand

Top Tips for IT Pros in Education to Know

If you and your team are responsible for managing computers for students or faculty, you won't want to miss this webcast. We'll give you tips on managing 5+ computer models, remote devices, and multiple Windows versions, plus an imaging software comparison including Symantec Ghost, KACE, Acronis Snap Deploy, and Microsoft Deployment Toolkit. Learn more.

Duration: 1 Hour


How to Survive Windows 10 Updates

Watch this Windows 10 Update survival guide, including the underlying technical realities, when to use WSUS (and when Microsoft will override your settings anyway), and "gotchyas" when building and maintaining your golden Windows 10 image. We’ll uncover the things Microsoft hasn’t told you and give you the information you need to develop a Windows 10 management strategy that will maximum user productivity and empower you to feel confident managing your Windows 10 environment. Learn more.

Duration: 1 Hour


IT Asset Management: It’s More than Just a Spreadsheet of Machines!

Hear Dale Meredith, Microsoft MVP and Quest KACE’s James Rico as they discuss approaches and best practices of IT asset management and how building a solid asset management foundation can lead you down a path of unified endpoint management. Watch it now.


Supplementing Backup Limitations in Office 365

Join Michael Osterman of Osterman Research to learn how to best protect your Office 365 data, including Office 365's potential data loss and security risks, the missing recovery functions in OneDrive, Exchange Online and SharePoint Online plus more! Watch it now!


Data Growth: Disaster Recovery’s Worst Nightmare

In this educational webcast, join backup experts as they discuss the greatest source of increased storage in backups; the hidden cost of data growth; decreasing storage with data deduplication; and more.


Windows 10 Migration Tips, Tricks and Strategies

In this webinar, learn best practices (and tricks) to reduce Windows 10 complexity, ease migration challenges, and migrate users with minimal interruption. Learn more.


Netwrix Auditor Product Demo

In this technical webinar, we will guide you through the key functionality of Netwrix Auditor 9.5. You’ll learn how to use Netwrix Auditor more effectively to audit critical systems such as Active Directory, Windows file servers, Microsoft SQL Server and many more.

Duration: 1 Hour


5 Keys to Ensuring Your DRaaS Is Not a Disaster

With over 500 Disaster Recover as a Service (DRaaS) providers in the market the quality and services offered vary dramatically. Learn what to ask for when considering DRaaS for your organization. Find out what features are required by Gartner to rank as “Visionary” in their DRaaS Magic Quadrant.


Endpoint Management and IoT; The Sum Is Greater than the Parts

The IoT is fueling an explosion in endpoint proliferation causing management and security challenges of devices. Find out how an Unified Endpoint Management can help. Learn more.


Veeam’s Road to GDPR Compliancy – The 5 Lessons Learned

Please join Danny Allan, Veeam’s VP of Product Strategy and Greg Schulz, Founder and Sr. Advisor of the independent IT advisory and consultancy firm Server and StorageIO, as they discuss the challenges many organizations are facing around GDPR. They will review the five key lessons learned during Veeam’s road to GDPR compliancy and how Veeam’s software solutions played a critical role within our own data management and protection strategies. Learn more.


Protecting Exchange Online Mailboxes from Spam and Phishing Attacks

Industry experts will dive into the default features and functionality of your Office 365 subscription. Learn more.


The Signal in the Noise: Security Reporting and Dashboards

In the era of increased cyber-threats, GDPR, and proof of Compliance, up-to-the minute, meaningful and actionable IT security data is critical to every business. Join this webinar to learn how Ivanti reporting and dashboard solutions can help solve your security reporting challenges.


Identity Led Security and Strong Authentication

Join this webinar to learn why identity isn’t simply just a "first step" but also the foundation modern security should be built on. Then explore the characteristics that make a strong authentication solution. Learn more.


Phishing Attack Landscape and Industry Benchmarking

Join security advocate, Erich Kron, for a discussion of brand-new research based on what your users are clicking and how you compare to your peers with new phishing benchmarks by industry.


Protect Legacy Applications Without Touching Your Apps Using Okta and Palo Alto Networks

Learn how to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta.


Networking Superpowers for the Cloud Ninja

Watch Riverbed unveil the full power of a true software-defined WAN (SD-WAN) in the cloud with a detailed, demo and a candid conversation between Angelo Comazzeto, Riverbed’s Technical Director for Cloud Services, and Nick Matthews, AWS Partner Solutions Architect. Watch it now.


Cloud Networks Made Simple with Riverbed on AWS

AWS makes it simple to set up cloud-based resources. But do you have secure, high-capacity, high-performance connectivity to and between AWS cloud instances? That’s where Riverbed comes in. Riverbed’s SD-WAN solution enables cloud migration and performance, all managed via quick and simple workflows. Watch it.


Peer Advice: Active Directory Migrations

Drawing on vast experience in successfully performing Active Directory migrations in environments of all shapes and sizes, experts will dive into lessons learned from AD migrations.


Why a Cyber Resilience for Email Strategy Matters: Because the Most Used Application Is Often the Least Protected

In this webcast, JP Blaho, will provide insight into why a cyber resilience strategy for email is not just better, but necessary. Learn more.


Integrating Microsoft Azure into Your Disaster Recovery Strategy

Join Microsoft MVP Tim Warner to learn how incorporating Microsoft Azure into your BC/DR/IT resiliency strategy is not only attainable, but much more affordable and easy to undertake than you might have thought previously.


New Rules for Firewalls as More Applications, Infrastructure Hit the Cloud

In this Redmond webcast, we look at how IT pros are deploying, configuring, managing and paying for widely distributed firewalls to deal with the new challenges of blocking attackers in cloud-heavy environments.


Reclaim Your Orders: How to Elevate Order Processing with Digital Technologies

In the past year, nearly 50% of consumers have stopped doing business with a company due to poor customer experience. This is your time to shine. Join us for an enlightening webinar that details how automated order management can transform any organization into a lean, mean, value-added machine. Learn more.

Duration: 30 Min


Secure Access for Distributed Employees, Partners and Customers

Cloud-first is a philosophy and shift in how IT thinks about openness, security, and user trust with specific components that embody a cloud-first strategy. This webinar defines those components and the many benefits. Learn how 100% cloud and mobile IT meets all your users’ needs. Learn more.


Secure Access for Distributed Employees, Partners and Customers

Cloud-first is a philosophy and shift in how IT thinks about openness, security, and user trust with specific components that embody a cloud-first strategy. This webinar defines those components and the many benefits. Learn how 100% cloud and mobile IT meets all your users’ needs. Learn more.


Beyond the Hype: Achieving Security Value with AI, Machine Learning, and Behavior Analysis

Join experts to learn how to setup your vendor technology evaluations, properly identify and run real-world malware and attack scenarios, learn how to fool “Artificial Intelligence” and “Machine Learning” technologies using adversarial techniques, and ultimately walk away with a better understand of the real value beneath the hype. Learn more.


To The Cloud, From The Cloud, Within The Cloud

Learn from Mike Jones on what modern approaches exist to do what you want with your data in the cloud. Whether you are starting your cloud journey, already underway or not sure how to meet your technical and business requirements in a cloud-ready world, there is something for everyone on this webinar. Watch it now.

Duration: 1 Hour


Availability Outside of the Data Center

Take a deep dive into how Veeam® Agents deliver Availability for Windows-based physical servers and Linux-based server instances. We’ll discuss how to meet RPOs and reduce the risk of data loss for laptops and tablets outside the corporate network. We will also discuss how you can solve key challenges like managing remote offices, offering Backup as a Service and Disaster Recovery as a Service, and more.

Duration: 1 Hour


How the Cloud Drives Availability and Data Protection

Data is to this century what oil was to the last century – a driver of massive growth and change. This is not just about technology, but also new ways of doing business. And yet, Availability and data protection are among the biggest challenges facing IT leaders today, particularly with the recent increases in cyberattacks, such as ransomware, which have affected companies of all sizes. Learn more.

Duration: 1 Hour


Availability On-Premises, In The Cloud And On The Go with Veeam Agent for Microsoft Windows

Are you looking to find out more about avoiding downtime and data loss quickly and easily for Windows-based physical or public-cloud workloads? How can you bring more Availability to these workloads? Learn more.

Duration: 1 Hour


Hyper-V 2016: The Next Generation of Virtualization

Watch this interactive, demo-filled webinar that will provide all of the details on the largest announcements within Hyper-V 2016. Join Microsoft Cloud and Datacenter Management MVP, Clint Wyckoff, as he illustrates the pieces of Hyper-V 2016! Learn more.

Duration: 1 Hour


Total Control and Protection of Email Data with Veeam Backup for Microsoft Office 365

Whether you have completely migrated to Microsoft Office 365, or have a hybrid exchange and Office 365 deployment, your business objectives remain the same. You must remain in control of your data and be able to backup and recover Microsoft Office 365 items at all times. Veeam® Backup for Microsoft Office 365 enables you to mitigate the risk of losing access to Office 365 email data and ensure Availability for users. Learn more.

Duration: 1 Hour


How to Complete the Office 365 Cloud Security Stack (And extend it to all your other cloud apps)

Attend this webinar to learn what you can do to provide the same level of security within Office 365 that you would deploy in your datacenter.


Windows 10 Servicing and the New Reality

The initial shock of Microsoft's new Windows release cadence might be over, as might be the stages of grief in knowing you'll now be updating far more regularly. How do you focus on the solution? In a world where the next update is always just around the corner, what approaches are others using to actually get the job done? Learn more from Greg Shields.


Windows 10 Migration: Greater security, more responsive IT and reduced support costs

Join us to hear Lenovo and Microsoft experts discuss how companies are realizing the benefits of Windows 10 migration. You’ll also get valuable tips on how to ensure your migration efforts are on track, on budget, and focused on achieving results. Learn more.


Enhancing Remote Collaboration in the Modern Workplace

In this webinar, you’ll hear how Lenovo, Microsoft and other partners are helping businesses adapt to a changing workplace with solutions that make remote collaboration a seamless experience. Register now!

Duration: 1 Hour


Enhancing Remote Collaboration in the Modern Workplace

In this webinar, you’ll hear how Lenovo, Microsoft and other partners are helping businesses adapt to a changing workplace with solutions that make remote collaboration a seamless experience. Register now!

Duration: 1 Hour


Security Configuration Management Best Practices

In this webinar, we’ll talk about some of the things you should be looking at when it comes to security configuration management. We’ll talk about some best practices, default tools used, as well as some very common misconfigurations that are seen in the “wild”, possibly even ones that you’ve configured!