On Demand
In this live webcast, Quest experts Shawn Barker and Ghazwan Khairi will be introducing our brand new product Change Auditor Threat Detection — a powerful solution for proactively detecting anomalous behavior based on user activity. You will discover ways to minimize your insider threat risk. Learn more.
Duration: 1 Hour
Breaches resulting from insider misdeeds are front-page news on a regular basis. Unfortunately, the average employee misses a critical common thread across many these stories. It’s up to IT pros to understand the techniques attackers use, educate their users to avoid common traps, and take the necessary steps to avoid breaches. Learn more.
Duration: 1 Hour
To minimize security and compliance risks, as well as reduce costs on under-utilized hardware and software, IT pros need to inventory all IT assets their organization has and track changes to them. If done manually, these tasks require hours of tedious work, so many organizations seek tools that streamline the process. Learn more.
Duration: 1 Hour
Growing companies onboard 30 new employees, on average, each month. This is no small challenge for the HR and IT teams. Now is the time for onboarding processes that are automatic, efficient and secure. Learn more.
Duration: 1 Hour
Enterprises are saddled with an IT architecture that has evolved organically over time. With the adoption of cloud and a drive to a more distributed workforce, IT is tasked with securely managing more users, on more devices, in more locations, and accessing more applications. The demands on IT are compounding quickly. And, limited staffing and budgets mean IT is constantly being asked to do more with less. Learn more.
Duration: 1 Hour
Meet the brand-new Netwrix Auditor – Data Discovery and Classification Edition, which provides complete visibility into where sensitive files are, what content is inside them, who can access the files and who actually uses them. Learn more!
Duration: 1 Hour
Office 365 has become the platform of choice for document collaboration and sharing. If you’re using Office 365 or planning to migrate there, understanding the types of security attacks you can expect is imperative. Microsoft provides tools for testing your end users by simulating some of the most common attacks, so you can educate them as part of your broader defense strategy. Learn more.
Duration: 1 Hour
Join us on this webinar to learn how both on premises infrastructure and public cloud can play a role giving enterprise IT the freedom to leverage the best attributes of both by creating a hybrid cloud environment making the deployment and transition between environments simple and seamless. Learn more.
Regulatory compliance is one of the biggest challenges that IT pros face today, regardless of their organization’s location, size or industry. Although GDPR, PCI DSS, HIPAA, GLBA, CJIS and other compliance regulations focus on different things, the underlying objective is the same — securing the data. Register now!
Duration: 1 Hour
See what the new Netwrix Auditor 9.6 has to offer, including how you can now classify and secure your data. Register today!
Duration: 1 Hour
See what the new Netwrix Auditor 9.6 has to offer, including how you can now classify and secure your data. Register today!
Duration: 1 Hour
Learn how Oracle and Equinix help organizations to transform their business by integrating hybrid and multicloud environments to increase operational efficiency, enhance system processes, improve customer experiences and grow revenues. Learn more.
Duration: 1 Hour
Learn how Oracle and Equinix help organizations to transform their business by integrating hybrid and multicloud environments to increase operational efficiency, enhance system processes, improve customer experiences and grow revenues. Learn more.
Duration: 1 Hour
Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.
Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.
In this technical webinar, we will guide you through the key functionality of Netwrix Auditor 9.5. You’ll learn how to use Netwrix Auditor more effectively to audit critical systems such as Active Directory, Windows file servers, Microsoft SQL Server and many more.
Duration: 1 Hour
Are you looking to find out more about avoiding downtime and data loss quickly and easily for Windows-based physical or public-cloud workloads? How can you bring more Availability to these workloads? Learn more.
Duration: 1 Hour
Learn from Mike Jones on what modern approaches exist to do what you want with your data in the cloud. Whether you are starting your cloud journey, already underway or not sure how to meet your technical and business requirements in a cloud-ready world, there is something for everyone on this webinar. Watch it now.
Duration: 1 Hour
Whether you have completely migrated to Microsoft Office 365, or have a hybrid exchange and Office 365 deployment, your business objectives remain the same. You must remain in control of your data and be able to backup and recover Microsoft Office 365 items at all times. Veeam® Backup for Microsoft Office 365 enables you to mitigate the risk of losing access to Office 365 email data and ensure Availability for users. Learn more.
Duration: 1 Hour
Data is to this century what oil was to the last century – a driver of massive growth and change. This is not just about technology, but also new ways of doing business. And yet, Availability and data protection are among the biggest challenges facing IT leaders today, particularly with the recent increases in cyberattacks, such as ransomware, which have affected companies of all sizes. Learn more.
Duration: 1 Hour