Webcasts


On Demand

How to Accelerate Your Veeam Backups to Azure

Using your Veeam solution for backup and replication to the Microsoft Azure cloud is a great start, but did you know it’s possible to make it better and faster? Learn more.

Duration: 1 hour


How to Accelerate Your Veeam Backups to Azure

Using your Veeam solution for backup and replication to the Microsoft Azure cloud is a great start, but did you know it’s possible to make it better and faster? Read on.

Duration: 1 hour


The Extended Enterprise: Top 5 Things IT Must Know

Many organizations need to provide network access to their extended enterprise -- contractors, temp workers, partners, vendors, and others -- to effectively run their business. However, these users create unique challenges and introduce new cybersecurity risks. Join us to learn the top five questions IT must address to successfully manage the extended enterprise. Learn more.


Active Directory Migration Planning

Active Directory is the living heart of most IT organizations. No matter if your organization is on-premises, in the cloud, or in some hybrid situation somewhere in-between your on-premises Active Directory is most likely the most important part of your IT infrastructure. Read on.

Duration: 1 hour


10 Ways to Fail at Enterprise Data Protection in 2019

The data estate that organizations have to protect in 2019 is more complicated than ever. The old concept of a network perimeter is gone, bulldozed by cloud storage, Software as a Service applications, bring your own device practices, data on mobile phones and many employees who never really go off the clock no matter where they are. Learn more.

Duration: 1 hour


Top 5 Hybrid AD Management Mistakes and How to Avoid Them

While Hybrid messaging and collaboration with MS Office 365 offers compelling benefits to larger organizations and the enterprises, it comes with new security and compliance risks. Learn More.


How to Protect Identities and Secure Your Azure Environment

Azure AD allows you to layer features such as conditional access and multifactor authentication to help protect your users and data. Along with Azure Security Center, it helps monitor security across on-premises and cloud workloads. Unfortunately, incorporating Microsoft’s native tools alone is rarely enough to maintain a strong security posture of your Azure infrastructure. Learn more.

Duration: 1 hour


What the California Consumer Privacy Act Means for IT Pros

Data privacy and data security have been among the hottest topics of 2018, mainly due to the GDPR, which came in force on May 25. However, 2018 also saw the signing of another important law, the California Consumer Privacy Act (CCPA). Although it has gotten a lot less press than the GDPR, it is nearly as sweeping, since it applies to all organizations that store the personal information of California residents. Learn more.

Duration: 1 hour


Citrix Virtual Tech Summit

As your environment grows more diverse—more clouds, more devices, more types of apps—you need a more efficient and secure approach to management. At this technical online event for hands-on IT leaders, we’ll discuss the building blocks of a modern digital workspace. Register now!

Duration: 1 Hour


The 3 Pillars of SharePoint Security

Many organizations purchase and implement software solutions based on factors like a rich feature set, a low price and an appealing user interface. Unfortunately, security issues are often pushed to the side or forgotten altogether. Consider SharePoint, Microsoft’s flagship collaboration platform. Learn more.

Duration: 1 Hour


The 3 Pillars of SharePoint Security

Many organizations purchase and implement software solutions based on factors like a rich feature set, a low price and an appealing user interface. Unfortunately, security issues are often pushed to the side or forgotten altogether. Consider SharePoint, Microsoft’s flagship collaboration platform. Learn more.

Duration: 1 Hour


How to Spend Your Security Budget in a DevOps World

In this session, Threat Stack Security Engineer, Mark Moore, and CFO, Kevin Durkin, will discuss the current state of security processes and investments as organizations shift to the cloud. Learn how to build a scalable security program that fits your organization’s budget. Join us on November 8th at 1pm ET! Sign up today!

Duration: 1 Hour


Gain Control Over Windows 10 Updates

There’s no doubt about it, Windows 10 upgrades have caused disruption across IT departments. Our team of Windows 10 specialists will share stories from the field and tips for successful management of Windows 10 in this technical discussion. We’ll highlight the latest best practices that every company should follow and explore the usability of unified endpoint management toolsets from VMware, Citrix, and Microsoft asking, “Do they really solve the need?”

Duration: 30 mIN


IT Security Horrors that Keep You Up at Night

One reason companies continue to get breached is that they are too focused on the wrong things. You lose sleep over the “shock and awe” security headlines in the news — while your executives and directors use a password of monkey123 without 2-factor authentication for their email. The good news is you can greatly increase the security of your network without spending thousands of dollars on shiny new boxes with pretty blinking lights!

Duration: 1 Hour


Accelerating Office 365 Adoption: Making the Cloud Less Cloudy

Join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Matthew Vinton from Quest Software as they discuss migrating to, management of, and securing of Office 365. Learn more.

Duration: 30 minutes


Top Nine Insider Attacks and How to Spot Them

In this live webcast, Quest experts Shawn Barker and Ghazwan Khairi will be introducing our brand new product Change Auditor Threat Detection — a powerful solution for proactively detecting anomalous behavior based on user activity. You will discover ways to minimize your insider threat risk. Learn more.

Duration: 1 Hour


Session 1 - The Human Factor: Malicious Insiders vs. Negligent End Users

Breaches resulting from insider misdeeds are front-page news on a regular basis. Unfortunately, the average employee misses a critical common thread across many these stories. It’s up to IT pros to understand the techniques attackers use, educate their users to avoid common traps, and take the necessary steps to avoid breaches. Learn more.

Duration: 1 Hour


Reduce Your Security and Compliance Risks with IT Asset Inventory Management

To minimize security and compliance risks, as well as reduce costs on under-utilized hardware and software, IT pros need to inventory all IT assets their organization has and track changes to them. If done manually, these tasks require hours of tedious work, so many organizations seek tools that streamline the process. Learn more.

Duration: 1 Hour


Align HR and IT to Streamline Employee Onboarding

Growing companies onboard 30 new employees, on average, each month. This is no small challenge for the HR and IT teams. Now is the time for onboarding processes that are automatic, efficient and secure. Learn more.

Duration: 1 Hour


Identity Management Key to IT Modernization

Enterprises are saddled with an IT architecture that has evolved organically over time. With the adoption of cloud and a drive to a more distributed workforce, IT is tasked with securely managing more users, on more devices, in more locations, and accessing more applications. The demands on IT are compounding quickly. And, limited staffing and budgets mean IT is constantly being asked to do more with less. Learn more.

Duration: 1 Hour