Webcasts


Upcoming

Logo: Esker. Document Process Automation.

Order Management for the Modern Age: Why It Pays to Go Paperless

An increasing number of organizations that were manually processing inbound sales orders to their systems seem to have found their answer — order processing automation. Register for the webinar, Order Management for the Modern Age, as Esker explores how an ERP-integrated solution can help any business eliminate the manual pains of fax and email order processing. Learn more.

Date: 08/16/2016

Time: 11:00 AM

Duration: 1 Hour


Logo: Redmond Tech Advisor

Why Secure Encryption Matters

Encrypting your data is becoming more and more important in a world where IT services are moving toward the cloud. In this third webcast in a series of six 30-minute sessions, we’ll explore cloud encryption strategies and what they mean to your organization.

Date: 09/07/2016

Time: 11:00 am


Logo: Redmond Tech Advisor

The Evolution of SSL Certificates

SSL is one of the foundational technologies on which the internet is built. In this second webcast in a series of six 30-minute sessions we’ll dive into TLS. Drawing on his personal experiences assisting clients of all sizes, Microsoft MVP Nathan O’Bryan will answer the questions that small and mid-sized organizations are asking. He will cover how to properly implement protection for your systems in addition to real world tips and practical lessons learned for protecting your data in the cloud. Sign up now!

Date: 08/24/2016

Time: 11:00 AM


Imanami

The Real Cost of Managing Active Directory Groups

In this interactive webcast, join industry experts as they discuss what’s really involved in managing AD Groups, how to calculate the cost of Group Management, is there tangible savings in automating AD Group Management and much more.

Date: 08/17/2016

Time: 11:00 am


Metalogix

SharePoint 2016: Governance Makes a Comeback!

Join this webinar to learn about the strengths and weaknesses of the new capabilities within SharePoint 2016 and why 2016 is the year to fully embrace SharePoint governance. Read on.

Date: 08/16/2016

Time: 11:00 am


Metalogix

SharePoint 2016 Migration Success Takes Three Actions

Your successful migration to SharePoint 2016 takes three actions: analysis, optimization and planning. It also takes a lot of questions that require answers. What do you have? What do you move? What do you archive? What problems might occur? What do users expect? In this webcast, you’ll learn what to ask and how to find answers. Read on.

Date: 08/03/2016

Time: 11:00 am


Okta

Office 365 Business Driven Provisioning

Join us as we explore how to take complex identity management requirements and make them manageable. We discuss how instead of relying on legacy tools Microsoft gives away, you can remove the identity barriers for your Office 365 migration while building a foundation from which to launch your entire future cloud strategy. Learn more.

Date: 09/14/2016

Time: 11:00 am


Logo: Veeam -It Just Works!

Understanding DRaaS: Trends, Challenges and Best Practices

Disaster Recovery as a Service (DRaaS) is becoming a more powerful option for organizations of all sizes when compared to traditional DR sites. Join us as we explore trends, challenges and best practices. Learn more.

Date: 08/09/2016

Time: 11:00 am


Metalogix

Dear Office 365, I Need Backup

When considering a move to Office 365, chances are you’re also building a backup strategy to support your new environment. Yet, is a backup solution enough to answer your organization’s growing Office 365 needs? Join Office 365 expert Dr. Steve Marsh to learn how to appropriately plan your backup strategy and proactively prepare for the next phase of your organization’s Office 365 journey. Sign up now!

Date: 09/15/2016

Time: 11:00 AM

Duration: 1 Hour


On Demand

Logo: Observe IT

Insider Threat Management Program Guide

Insider Threat Management Program Guide – A Guide for Initiating, Developing, and Implementing Your Program.


Microsoft Office 365 Security: Beyond the Basics

Advanced security challenges like changing data privacy laws, secret government data requests, and the looming possibility of a cloud provider security breach are areas not covered natively by Microsoft’s cloud solution. Join Microsoft MVP Nathan O’Bryan and Vaultive’s VP of Product Marketing, Doug Lane, as they discuss when and how you can use third-party tools to meet your organization’s security requirements and confidently migrate to Office 365. Learn more.

Duration: 1 Hour


Five Ways Dell SonicWALL’s Secure Mobile Access Keeps Mobile Employees and Data Safe

Join Mark Hewett and Steven Sanderson for this live, interactive webcast to learn how you can manage the proliferation of BYOD devices in your workplace and in the field. Learn more.


Logo: Esker. Document Process Automation.

Freedom from Fax: Why IT Departments Love the Cloud

Fax isn’t exactly the most modern form of business communication. But what many IT departments are realizing is this: It’s not fax that’s behind the times, it’s the execution. Register for our live webinar to discover why cloud faxing is catching on as a faster, cost-effective and more reliable alternative to fax machines and fax servers. Sign up today!

Duration: 1 Hour


Rackspace

Hybrid Clouds: Azure Real-World Use Cases

Join featured speakers, Rackspace and 10th Magnitude on a round table discussion on the concepts of cloud form factors leading to hybrid cloud, the advantages of using hybrid cloud technologies, and a look at how the Microsoft Azure platform enables efficient and effective hybrid cloud computing. See how organizations are reducing complexity and management costs by leveraging managed hosting in hybrid cloud environments through real-world use cases.


Rackspace

Why you should care about Identity-as-a-Service (IDaaS): An Expert’s perspective

Join featured speakers, Rackspace and 10th Magnitude on a round table discussion on the concepts of cloud form factors leading to hybrid cloud, the advantages of using hybrid cloud technologies, and a look at how the Microsoft Azure platform enables efficient and effective hybrid cloud computing. See how organizations are reducing complexity and management costs by leveraging managed hosting in hybrid cloud environments through real-world use cases.


Logo: Flexera Software

Moving to Office 365? What You Need to Know!

Many organizations are planning on making the move to Microsoft Office 365, but there are some key things to consider before you make the switch. Our guest speaker, Martin Thompson of the ITAM Review, will discuss the role of IT asset management (ITAM) in major IT transformation projects such as this.

Duration: 1 Hour


Logo: Dell Software

Best Practices for Migrating PSTs and Email Archives to Office 365

Microsoft MVP Mike Crowley will describe the challenges of wrangling this data and offer strategies and tips for migrating PSTs and other archives to Office 365 through the use of free as well as for-purchase migration tools. Join us!

Duration: 1 Hour


Imanami

10 Things You Should be Asking Active Directory… and How to Get Answers

Running a periodic “health check” on AD should involve more than just checking the replication topology. There are also key questions you should be asking about the status of groups, your overall security situation, missing AD information, and more. Knowing the answers can help you avoid common security problems and operational pitfalls - and getting those answers can be easier than you think. Read on.


Building a Better Business (Process) with SharePoint

Learn how you can turn your SharePoint system into a powerful tool for creating velocity in your organization. Robert Bogue will discuss approaches for form creation, workflow options, and how you can reduce the friction of your internal processes by automating business process applications for SharePoint with K2. Register now and learn more.

Duration: 1 Hour


Protecting Your Data in an Evolving Technological World

Compliant and scalable data security solutions are essential to safeguarding your data from unauthorized intrusion. With advancements in software and hardware, the technology world is evolving exponentially. It might even seem impossible to keep pace with your security and compliance demands without having to re-engineer your application, database or infrastructure. Learn how using a third party can help! Register now!

Duration: 1 Hour


Logo: CloudFlare

5 Ways to Secure Your Cloud Investment

In this webinar, we'll discuss developing a strong information security foundation at the user and application level, creating a perimeter of defense by limiting access to systems through whitelisting/blacklisting and much more. Join us!

Duration: 1 Hour


Logo: Dell Software

Endpoint Systems Management: Covering the Full Lifecycle

In this 30-minute webcast, join industry expert and founder of Techvangelism, Nick Cavalancia, and Brandon Whitman from KACE, as they discuss ESM and KACE’s K1000 and K2000 appliances from a few perspectives. Read on!


Automating App Deployment Ain’t Easy: Busting Datacenter and User Experience Myths

Join Packet Pushers Ethan Banks and Citrix NetScaler VP’s of Product & Engineering for this interactive myth busting discussion and live demo of NetScaler CPX & SD-WAN. Read on.


Unraveling the Mysteries of Tenant-to-Tenant Migrations

Join the experts Nathan O’Bryan (MCSM: Messaging and MVP: Office 365) and Gary Steere (Microsoft Exchange Server: MCM and MVP) as they candidly discuss the essential questions that the admin will need to answer before heading into a tenant-to-tenant migration. Register now.


Logo: Dell Software

VSANs, VVOLs, and SSDs: Optimized Storage for Your Virtual Infrastructure

Join Pluralsight's Greg Shields for a discussion on the increasing importance of VSANs, VVOLs, and SSDs in today’s virtual infrastructures.


Logo: Esker. Document Process Automation.

Fax Survival Webcast: How to Avoid a Doomsday Disaster with Cloud Fax Services

Register for this free webinar to learn how your company can forget about the headaches and hassles of fax by moving your operations to the cloud! Learn more.

Duration: 1 Hour


Okta

Office 365 Business Driven Provisioning Deep Dive

In this webcast, we explain how to take complex identity management requirements and make them manageable. We discuss how instead of relying on legacy tools Microsoft gives away, you can remove the identity barriers for your Office 365 migration while building a foundation from which to launch your entire future cloud strategy. Join us!

Duration: 1 Hour


Imanami

The Problem(s) with Active Directory Groups

Join the discussion with industry experts as they engage with you to discuss how to get the most out of AD groups. They'll discuss how to delegate and enforce ownership and management, dynamic group needs and integration with AAD, SSO, and federated services. Learn more.


logo

Protect Your Office 365 Email from Three Key Threats

Hear about key requirements for catching email spoofs, emerging and zero day threats, and even commodity threats. Considerations for threat visibility and response requirements will also be explored during this free webcast.


Logo: Dell Software

IAM as a Service (IAMaaS) is a reality today. Find out if it’s right for your organization.

Explore if identity and access management as a service (IAMaaS) is right for you? Discover how IAMaaS measures up against traditional on-premise solutions, and determine which scenario is the right fit for your organization.


Logo: Dell Software

Understanding Identity and Access Management Compliance Requirements for PCI, HIPAA, SOX and ISO 27001

Discover the role that IAM plays in compliance and security. In this webcast, you’ll hear how about the latest PCI, HIPAA, SOX and ISO 27001 requirements.


Logo: Dell Software

Understanding the NIST Cybersecurity Framework: Different, Scalable and Practical

In this on-demand webcast, learn about the National Institute of Standards and Technology’s (NIST’s) cybersecurity framework, A NIST expert walks you through the Framework for Improving Critical Infrastructure Cybersecurity.


Logo: Dell Software

What You Need to Know about Active Directory Hybrid Governance

In this webcast, we will explore exactly what a hybrid directory environment looks like and what it takes to make it secure, manageable and available. We will talk through detailed explanations and checklists for improving your security posture and keeping on-premises AD from becoming the Achilles' heel of your hybrid directory environment. Learn more.


Logo: Observe IT

Get expert advice on how to engage with an insider threat after a security incident

This webinar will show insider threat program managers and security experts how to proactively interview an insider threat and communicate with Human Resources after a security incident.

Duration: 1 Hour


Logo: Redmond Tech Advisor

Is Hyper-Converged Infrastructure Right for Your Business?

In this Redmond TechAdvisor we will look at some of the myths and realities of hyper-converged infrastructure solutions. We will also discuss applications workload, deployment and financial considerations and much more. Read on.


Logo: Dell Software

Top 10 Indicators of Tampering with Privileged Accounts

Watch this on-demand webcast to see how to tell when your privileged accounts are being tampered with, and how administrative authority can be obtained or stolen at each level.


Logo: Dell Software

Protecting AD from Malicious and Accidental Destruction

Find out how to deal with the four types of AD disasters, prepare for and execute a successful forest recovery and automatically protect your AD. Watch this on-demand webcast.


Logo: Dell Software

Anatomy of an Insider Threat—Protecting Active Directory is Key

Learn about the five key insider threat trends facing organizations, the importance of protecting your AD and the best ways to achieve that goal.


Logo: Dell Software

Ten tasks to automate in active directory to save time, prove compliance and ensure security

Explore key Active Directory topics, including user-logon naming conventions, why you should standardize department names and other organizational attributes, and how to approach provisioning and deprovisioning accounts.

Duration: 01:46:36


Logo: Dell Software

Ensuring the success of your IAM Projects

Leverage Dell’s knowledge gleaned from partnering and supporting hundreds of companies and real-world projects. Discover the keys to a successful, affordable and sustainable IAM implementation.

Duration: 71 Minutes


logo

Holistically Manage and Solve Virtualization Performance Issues

Your data infrastructure — servers, storage, hardware, software and virtualization — all exists to support the applications that drive your business’s profits. However, you could be operating at maximum capacity and still yield poor productivity for your business. Find out why.


logo

VM Optimization: Find the Balance

Find out how you can optimize your VMware implementation to avoid under- or over-utilization — and boost performance.


logo

Exchange Availability and Performance in Virtualized Environments

Do you know the health of your Microsoft Exchange enterprise? Don’t wait for your users to start flooding the helpdesk with tickets. Find out how you can ensure optimal availability and performance for Exchange in your virtualized environments today.


Logo: SonicWALL

How To Fight Against Shape Shifting Type Threats

Join us to learn simple steps to protect your organization from advanced hacking tools. We’ll discuss the recently released 2016 Dell Security Annual Threat Report, and explore top threat findings from 2015, current and emerging threats and key recommendations to defend against advanced adversaries and threats.


logo

IT Security Fundamentals

Fifty-five percent of companies surveyed did not experience a breach in 2015 and were successful by implementing a handful of vital security technologies and best practices. Join this webcast to explore the surprising security research results and get practical recommendations that you can use to improve your IT security posture this year.


Virtual Data + Data Masking = The New Approach to Security

A new, data-centric approach to security is taking hold. Rather than establishing perimeter defenses in hopes of repelling breach attempts, security-minded organizations are investing in technologies that protect the interior—the data itself. Learn more!


Logo: Esker. Document Process Automation.

IT and Business Benefits of Cloud Faxing

Join us for this webinar to learn how you can deploy faxing for your entire organization — with features like real-time status updates and 24/7 availability — quickly, easily and cost-effectively. Register now!

Duration: 1 Hour


LogicNow

Beyond Locky: Developing a Ransomware Incident Response Plan

It’s every IT professional’s nightmare – a frantic call from a user that indicates they can’t access mission-critical files on their device. And what’s worse, they are being held ransom for cash by the bad guys. Learn how to protecting your networks and data.


Logo: Observe IT

Top Employee Security Mistakes that Put Your Data at Risk

Actionable Expert Advice for Protecting Your Enterprise from Today’s Biggest Risk to Confidential Data. This webinar will show you how to minimize insider risk and proactively prevent the leakage of data from negligent employees.

Duration: 1 Hour


Logo: TransVault

Mastering the Migration Series: Shift those PSTs to the Cloud with Confidence!

By attending this webcast you will hear how TransVault Insight addresses the many varied issues involved in tackling PSTs, which include tracking them down; understanding what’s inside them; minimizing network impact; avoiding duplicates and ensuring a seamless user experience - all while getting the assurance you need that your mass PST move is being fully tracked and audited, and is in line with your business compliance and data retention remit. Register today!

Duration: 1 Hour


Logo: Redmond Tech Advisor

Disaster Recovery: Mitigating Risks with Modern Technologies

This Redmond supercast will provide insights intended to help you think through the potential risks of new technology and apply the latest protective measures to avoid outages and to cope with interruptions that you can’t avoid. Watch it now!

Duration: 1 Hour


Logo: Dell Software

Simplify and Streamline Your Virtual Infrastructure

In this webcast, we’ll discuss ways to simplify your data center operations, speed deployments and reduce operational costs.


Imanami

Active Directory Group Management: How to Take Yourself Out of the Loop

What would you need to bring into your environment in order to get group management off of your back? Find out in this informative webcast with Don Jones.

Duration: 1 Hour


SSL Best Practices: Domain Protection

Join us as we cover key best practices for protecting your domain phishing attacks against the customer’s clientele and unsuspecting internet users. Register now!

Duration: 1 Hour


Logo: Dell Software

Ensuring the success of your IAM Projects

Leverage Dell’s knowledge gleaned from partnering and supporting hundreds of companies and real-world projects. Discover the keys to a successful, affordable and sustainable IAM implementation.

Duration: 71 Minutes


Logo: Dell Software

Making the Cloud Work for You: Rapid Recovery, Replication, DR and Microsoft Azure

Organizations are leveraging cloud-based services to implement a sound, pay-as-you-grow strategy for backup retention and disaster recovery. Learn more!


Logo: BridgeWays

Get proactive remote monitoring in a SCOM-powered, multi-tenant SaaS solution: Tibanna

The takeaways from this webinar will be how Tibanna’s Change Management system can allow users and managers to follow a structured, detailed, web-based yet simple process for Change Management.

Duration: 1 Hour


Logo: Dell Software

Understanding Privileged User Compliance Requirements for PCI, HIPAA, SOX and ISO 27001

Although SOX represents only a portion of the total scope of compliance obligations faced by most organizations, it is a critical piece. Read this tech brief to see how to achieve and prove SOX compliance – along with other security mandates – with the right solutions. Plus, benefit from the security compliance insights of an auditor.

Duration: 01:48:00


Logo: Dell Software

Password hashing prevent risk security breach

Watch this on-demand webcast to learn about strategies and tools that make it easy to prevent hashes from being harvested, detect the use of harvested hashes and address the target of many attacks (privileged accounts).

Duration: 01:45:00


Logo: Dell Software

Best Practices for Migrating to Exchange 2016 and Office 365

Learn the key steps and best practices you need to follow to ensure a successful migration such as performing a thorough pre-migration assessment, why a streamlined Active Directory is critical, how to evaluate migration solutions and more!


Logo: Dell Software

Delivering Business Value with IT Service Management

Please join Robert Young, research director, IT Service Management and Client Virtualization, IDC who will share how companies are leverage new service management trends and best practices to deliver IT-as-a-service, optimizing both IT and business productivity. Learn more.

Duration: 45 minutes


logo

What to Know about Exchange 2016, SharePoint 2016 and Office 365

Join a panel of experts as they discuss the changes to Microsoft Exchange 2016 and SharePoint 2016. Whether you’re debating migrating, evaluating Office 365 or simply satisfying your curiosity, this webcast is for you.

Duration: 61 Minutes


Logo: Dell Software

Active Directory Disasters — Plan ahead!

Don’t let an Active Directory disaster ruin your vacation. Watch this webcast to learn more about AD planning and recovery options.


Mimecast

Email Security: It’s Time to Shut the Front Door

Without proper security measures in place, email represents one of the easiest ways for malware to “walk right in” the front door of your organization. With spear-phishing attacks on the rise, and users still falling prey to malicious email content, it’s time organizations include email security as part of their overall security posture before they become the unwitting victim. Learn more!

Duration: 1 Hour


Logo: Veeam -It Just Works!

Everything You Need to Know About Microsoft Nano Server

Join Mike Resseler for a webinar session to discuss the advantages and potential use-cases, and discover how to start with Nano to take all of the benefits to your data center. Read on.


Eliminate Print Servers - Mastering Print Management in a Highly Distributed Environment

Join technology experts as they discuss and investigate ways to simplify print management and eliminate print servers in the modern era. Register now!

Duration: 1 Hour


Logo: Redmond Tech Advisor

Mobility & Office 365: How to Enable Your Mobile Workforce with Office 365

Join Nathan O’Bryan as he explores some of the features of Office 365 that enable a mobile workforce to function as a cohesive team without the need for physical proximity. During this webcast Nathan will demonstrate how Office 365 features allow him to work mobile. Register now!

Duration: 1 Hour


Logo: colligo

4 Email Problems That SharePoint Can Solve Now

In this webinar, industry experts take a look at common email management problems and how you can solve them from a technology and policy perspective.

Duration: 49 Minutes


IT Security: Why One Layer of Defense Is Not Enough

Join security expert, Ian Trump, as he explores cybercrime and its impact on small and mid-sized businesses, how businesses need to protect themselves from all angles and why using layered security is crucial to ensure it doesn’t happen to you.


Logo: Netwrix

How to Survive an IT Audit – and Thrive Off It!

In this webinar, you’ll learn about top control processes that should be taken care of as matters of best practice or as core components of any IT compliance.


Logo

Crack the Code To Cloud App Security, Deployment, User Experience and Support

Get Office 365 and cloud app deployment best practices from Rightpoint’s experience deploying hundreds of enterprise cloud application projects. You will also learn the leading cause of security breaches and proven approach to meeting security and compliance.


Logo: Box

Collaboration + Security using Office 365 and Box

Microsoft Office 365 gives your users the power to collaborate on documents from anywhere, which is great for businesses, but IT departments need to work hard to keep data secure no matter where it lives.


Logo: Box

Secure Mobile Collaboration with Sharepoint and Box

This session examines how Microsoft SharePoint environments handle file sharing and collaboration, and some of the challenges businesses face adapting these legacy technologies to a new, more mobile world.