Webcasts


Upcoming

Make Sure You've Got a Belt AND Suspenders for Backup

Backup specialists have long engaged the "belt & suspenders" metaphor to describe solutions that provide multiple layers of protection. Learn more.

Date: 10/29/2019

Time: 11:00am


DevOps Automation: Cutting Multicloud Costs in Half

The role of DevOps has become quite critical in a multi-cloud world. Without strong DevOps practices, it is hard for Cloud admins and architects to ensure they are getting the full benefits out of a multi-cloud architecture. Learn more.

Date: 10/29/2019

Time: 11:00am


IT Security is National Security

Join CISSP and Strategic Solutions Consultant, Bryan Patton and Senior Product Marketing Manager, Jennifer LuPiba from Quest, as they discuss the nature of this new cold war and explore the tools you can use to protect your critical assets and national security. Learn more.

Date: 10/30/2019

Time: 8:00 am


Best Practices in Office 365 Data Protection

Microsoft provides rudimentary data protection capabilities as part of their Office 365 SaaS solution, but it falls short from being able to deliver the data protection and recovery needs most organizations require to meet both business SLAs and compliance requirements. Find out more.

Date: 11/12/2019

Time: 9:00am


Is AD Safe in the Cloud: You Don’t Know What You Don’t Know

Many organizations with a hybrid AD environment think that because they have backups of their on-premises AD, anything synced into Azure AD and used by Office 365 is equally protected. Find out more.

Date: 11/13/2019

Time: 11:00am


On Demand

Protect your workforce productivity: What's your Office 365 backup strategy?

In this webinar, industry experts discuss strategies for a modern Office 365 data protection solution that enables continuous user productivity and collaboration. You will learn about Microsoft’s shared responsibility model and best practices for protecting against common Office 365 data loss risks. Watch now!


Osterman Research: Why you need third party backup for Office 365

Microsoft Office 365 is the top productivity tool for today’s modern workforce. But did you know that Office 365 native capabilities may not be enough to protect your organization from accidental and malicious data loss -- as well as meet strict data compliance and regulatory requirements? Learn more.


Solving the Database Dilemma

Learn how Nutanix provides the industry’s best HCI platform for running database workloads with exceptional performance, security, reliability, resiliency and an integrated automation framework that brings one-click operational simplicity to database provisioning, copy data, and lifecycle management. Find out more.

Duration: 1 hour


Why Recoveries Fail Today

In this session, technology industry veteran Howard M. Cohen joins with experts from Unitrends to discuss restoration challenges beyond just the data, highlighting strategies including automated DR testing, DRaaS, orchestration and resilience against ransomware. Learn more.


How to Prevent 81% of Phishing Attacks from Sailing Right into Your Inbox with DMARC

In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way! Then, learn the six reasons why phishing still might get through to your inbox and what you can do to maximize your defenses Learn more.


Don't Fear Ransomware - How to Protect Your Endpoints and Enforce Least-Privilege Access

Do you know of any companies whose data was held hostage by a ransomware attack? You don't want to gamble with your data, and endpoint security is crucial because malware infections occur there so frequently. Learn more.


Online Briefing: Cisco Integrated Security Architecture - Design, Benefits & Buying Models

82% of companies want an integrated security portfolio. Why? Our networks no longer have edges, so our security approach must be borderless. Solutions must work in concert, and seamlessly integrate with other tools. And today, an integrated portfolio does not mean giving up best-in-class features. Cisco’s architectural approach to security integrates security across all borders to incorporate the network, cloud, Internet, email, and rapidly expanding endpoints.


Online Briefing: Cisco Integrated Security Architecture - Design, Benefits & Buying Models

82% of companies want an integrated security portfolio. Why? Our networks no longer have edges, so our security approach must be borderless. Solutions must work in concert, and seamlessly integrate with other tools. And today, an integrated portfolio does not mean giving up best-in-class features. Cisco’s architectural approach to security integrates security across all borders to incorporate the network, cloud, Internet, email, and rapidly expanding endpoints.


Beginner’s Guide to Azure Reservations

Do you see your Azure cloud costs growing out of control as your usage goes up? In this webinar, we will cover everything you need to know about Azure Reservations and share best practices to help you master reservation management.

Duration: 1hr


Cloud Plumbing - The Pumps, Valves, and Pipes of a Successful Private Cloud

Private cloud solutions, powered by the industry’s most advanced Hyperconverged Infrastructure (HCI) technology, deliver applications, services, and data at any scale, with advanced automation and built-in self-service capabilities that bring true cloud-like simplicity to enterprise datacenters. Learn more. .


People, Process and Technology for a High-Performance Security Team

Small to medium enterprises are top targets for cybercriminals. Verizon reports that 43% of all breaches target SMBs. Why? Because most SMBs are under-protected and offer the least resistance and quickest return for threat actors. Today’s attacks are sophisticated, fast-moving and continuously evolving. Security teams need to be equally sophisticated, fast-moving and continuously evolving.  Learn more.


Mitigating Insider Threats with User Behavior Analytics

Spot insider threats and external attacks with user behavior analytics. In this webinar, IT security expert Jay explains how to perform instant threat detection and prevention by detecting suspicious activities in your network. Learn more.


Moving from Windows 7 to Windows 10: Little Time, Lots of Work

So, what’s the best approach to making the migration to Windows 10 as easy and future-proof as possible? In this interactive webcast, join in on the conversation with Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Brian Suhr. Please attend!


Modernizing Your Cloud Data Management Platform

Data availability is crucial to your business success – are you making the most out of it to drive growth? Today many organizations continue to use legacy data backup and recovery, while not utilizing an intelligent system that responds to your application and data behaviors. Learn more.


A Three Step Approach to Keeping Your Network Safe from Ransomware

One of the biggest mistakes that organizations tend to make in their fight against ransomware is that of basing their defenses around a product rather than a strategy. Learn more.


Hurricane Mid-season Update: Disaster Recovery Lessons Learned from 2019

We're a little over halfway through the 2019 Atlantic Hurricane Season, and this peak period has been true to form with the unprecedented devastation of Category 5 Hurricane Dorian. Learn more.


Five Key Data Protection Considerations for Your Move to AWS

Data protection is your responsibility, not matter where your data resides—including the cloud. Learn more.


Rethinking Storage for a Data-centric World

This webcast takes you through findings from a recent ESG research study exploring the problems caused by massive unstructured data growth, the growth in the number of data accessors and creators, and how new methods of unstructured storage management and data management are helping IT leaders realize their digital transformation goals. Watch now!


Ransomware: To Pay or Not to Pay?

It's been a summer of ransomware, with devastating incidents shutting down governments in Florida and Texas, ongoing fallout from the Baltimore attack and reports of increased targeting elsewhere. Watch now!


Ransomware: To Pay or Not to Pay?

It's been a summer of ransomware, with devastating incidents shutting down governments in Florida and Texas, ongoing fallout from the Baltimore attack and reports of increased targeting elsewhere. Watch now!


Office 365 Tenant Hacks: The Ultimate Guide to Post Migration Setup

Did you just unpack your shiny new Office 365 tenant? Now that your migration is complete, did you think it was time for some R&R? Learn more.


Moving Workloads to the Cloud: You Need to Have a Plan

There’s more to migrating workloads to Azure or AWS than simply “lifting and shifting”. Organizations need to plan for performance impacts, changes in operating costs, and making certain the right workloads are hosted in the right cloud. Learn more.


Moving Workloads to the Cloud: You Need to Have a Plan

There’s more to migrating workloads to Azure or AWS than simply “lifting and shifting”. Organizations need to plan for performance impacts, changes in operating costs, and making certain the right workloads are hosted in the right cloud. Learn more.


Online Event: Microsoft + McAfee Integration for Enhanced Security in Azure, Office 365 & Win 10 Environments

McAfee helps customers adopt Microsoft Azure and Office 365 with the same security controls available in a private data center. McAfee understands the complexity of the cloud and has designed a security architecture and multiple integration points to enhance your overall security posture. This includes new processes and techniques to protect the entire stack and capabilities to inspect north-south as well as east-west traffic, in addition to the ability to manage across hybrid environments with one management tool and with one security policy.


The Problem with Privileged Access Management

Data breaches have become commonplace, and despite significant investments in perimeter and endpoint security, breaches typically begin at the desktop and server layers of an organization’s IT infrastructure. Learn more.


Zerto and Azure - From Nut to Shell

In this webinar, Zerto Solutions Architect and Microsoft Azure SME Kyle Bromley, will discuss how to “right size” your workloads in Azure with Zerto and what hyperscale-level IT resilience really looks like. Learn more!

Duration: 1 hr


Why Private Cloud and How to Build One

Join this webinar to discover the business necessities of private cloud and how it’s a stepping stone to hybrid cloud.


Office 365: Migration to Protection

Microsoft’s Office 365 is now the most widely used enterprise cloud service by user count. While Office 365 is a robust, secure platform with extensive compliance and governance capabilities, it is essential that organizations lay the groundwork for a cyber secure Office 365 adoption. Learn more.


Mind the Multi-Cloud Gaps! What IT Needs to Know NOW About What Data Isn't Protected

In this webcast, Redmond editors explore the best way to make sure your data estate is fully protected in this mixed cloud reality. Learn more!

Duration: 1hr


Mind the Multi-Cloud Gaps! What IT Needs to Know NOW About What Data Isn't Protected

In this webcast, Redmond editors explore the best way to make sure your data estate is fully protected in this mixed cloud reality. Learn more!

Duration: 1hr


5 Ways to Beat Gaming Booters with Zero-Trust DDoS Defenses

Join experts to learn about the challenges and best practices to ensure your users have unfettered access to online games that drive your business. Watch now!

Duration: 1hr


The Security Risk in SSL/TLS Traffic: Architecting Visibility and Security Through Decryption

Nearly all commerce, communications, and data traffic going over the web is encrypted. As organizations transform operations, leverage more of the cloud, expanding locations, and utilizing remote workforces, IT’s lack of visibility into encrypted traffic puts the organization at risk for a cyberattack, data breach and compliance failures. Learn more.


Windows Server 2008 EOS Is Coming! So Is The Silver Lining

End of support for Windows 2008 servers is only 6 short months away. The good news is it’s not too late to build your plan and take action before January 14, 2020. Learn more.


Migrating & Managing 2,000 Windows Devices

With a growing number of computer imaging solutions to choose from, IT teams now have the ability to hand-pick a tool that meets the exact requirements of their modern computing environment. This 30-minute technical discussion includes tips for managing a Windows 10 environment, a comparison of leading imaging solutions and considerations when evaluating a computer provisioning solution. Watch now.


A Day in the Life of a Security Operations Center: How to Prevent Incidents from Becoming Breaches

Cybersecurity threats are increasing, becoming more sophisticated, and creating more damage. 44% percent of legitimate alerts are not investigated*. Security Operations are inundated with a deluge of alerts from disparate security solutions. Learn more.


The Biggest Causes of Data Loss in 2019 and How to Counter Them

When it comes to data loss, natural disasters and ransomware grab the most headlines. Yet the exact incident that's most likely to cause you problems on a day-to-day basis tends to be much more mundane. Learn more.


The Biggest Mistake You're Making with Office 365

If you’re using Office 365, don’t ignore your data protection responsibilities — or you may be putting your critical data at risk. Making assumptions about how cloud applications protect your data can be a huge oversight, and with limited built-in data recovery capabilities, Office 365 is an app that’s commonly overlooked.


Empowering Your Human Firewall: The Art and Science of Secure Behavior

You know that "security awareness" is key to a comprehensive security strategy. But just because someone is aware doesn't mean they care. So how can you design programs that work with, rather than against, human nature? View now!

Duration: 1hr


“Honeytokens” – Using Honeypots to Detect Credential Compromise

Commonly used and highly successful credential compromise techniques like Pass-the-Hash and Pass-the-Ticket are notoriously difficult to detect amidst the noise of everyday activities within Active Directory. To an observer, they appear to be legitimate authentication events and to Active Directory, they are.


Alleviate the Stress of Your Windows 7 Migration

Microsoft extended end of support for Windows 7 to January 14, 2020. This may seem far away, but migrations occur slowly for many organizations due to a lack of automated user state and data provisioning, resource requirements, and remote workforce deployment. So, how can you alleviate the stress of migrating and gain critical insights into your business data?


Hybrid Office 365 Virtual Summit 2019

In this recorded virtual summit, you will hear from Stephen Gee from Zix and Michael Osterman of Osterman Research to learn about the issues and complexities involved with running hybrid and MS Office 365 environments and why organizations of all sizes may need to supplement the native features with third-party solutions, especially in the security, archiving, and encryption areas.

Duration: 1hr 51min


Better IT Asset Management and Data Quality for IT Teams

In today’s competitive world, using new technology to set your business apart can make the difference between getting ahead or falling behind. But staying in control of the growing complexity is tough. Learn more.

Duration: 1 hr


Top Tips to Defend Against Stolen Credentials

Stolen credentials and passwords are a lingering security loophole these days. Learn more.


The Great Office 365 Migration: Are We There Yet?

In this webinar, you'll learn why companies are migrating to Office 365 and hear about their experiences, including delays, cost overages, problem applications, and more. Watch now!


Cloud Ready Data Protection for Hybrid Data Centers

Join Microsoft MVP, VMware vExpert and IT analyst Greg Schulz of Server StorageIO along with Michael Gogos, Data Protection expert from Quest, as they discuss how to become hybrid and cloud data protection ready, and much more. Read on.


The Ransomware Hostage Rescue Guide

It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. Learn more.


Covering your Assets: Office 365 Data Protection Measures for End Users and Administrators

How can you protect your content from the very people that have access and either accidentally or intentionally delete important information? Learn more.

Duration: 1hr 5min


Automate Endpoint Security Patching

In this on-demand webcast, experts from the Spiceworks Community and Quest review how you can tackle your security challenges. Learn more.

Duration: 57 min


Why YOU Need to Protect Your Microsoft Office 365 Data

Join us in this webcast for an in-depth look at how to address your most pressing needs when it comes to protecting Office 365 data and all the common pitfalls to avoid when implementing backup for this important data source. Sign up.

Duration: 1 hour


Active Directory Security: Early Stage Attack Activities to Watch For

Join us at this webcast as we discuss two early stage attack activities: LDAP reconnaissance and Password Spraying – that allow attackers to map out the target infrastructure to plan out their attack and begin to take over accounts. Detection strategies and mitigation steps will also be explained. Sign up.

Duration: 1 hour


Stay Out of the Net: Your Ultimate Guide to Phishing Mitigation

Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, as he explores techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. Roger won't just cover one angle. He'll come at it from all angles! Read on.


Active Directory Security: Detecting Internal Attacks

In this webinar, MVP Derek Melber will guide you through how you can configure your SIEM to detect direct attacks and also improve your SIEM with technologies such as user behavior analytics. Find out more.


Ooops! Your AD is Encrypted…!

Don't let Active Directory fall victim to a cyber attack! When it comes to protecting your Active Directory, there is no room for error. In this On Demand Webcast , join Dale Meredith, cyber security expert as he explores ways to protect AD from cyber criminals. Watch now!


Leveraging Cloud-Based Object Storage as Part of a Modern Data Protection Strategy

In this discussion, Dave Russell Vice President of Enterprise Strategy of Veeam reviews the considerations for adopting cloud-based object storage and how to leverage cloud object storage for the best outcome. Learn more.


4 Best Practices for Azure Cloud Management

In this webinar, we'll offer you best practices and key trends to help you maximize the return on your Azure cloud investment and gain control of your scaling cloud infrastructure. Learn more.

Duration: 1 hour


How Small and Midsize Organizations Can Achieve the Same Level of Security as the Largest and Most Well Defended Organizations?

Join David Etue, cybersecurity expert from BlueVoyant, as he delivers valuable insight into the risks your SMB organization faces and provides guidance on how to achieve the optimum level of cybersecurity. Learn more.


The Future of Business Critical Asset Data and Analytics

In today’s competitive world, using new technology to set your business apart can make the difference between getting ahead or falling behind. But staying in control of the growing complexity is tough. Learn more.


Natural Disasters: Top Tips to Help IT Keep the Business Going

It's been said that North America has some of the wildest weather on Earth. With the summer months approaching, it's the season for thunderstorms, tornados, hurricanes, wildfires and floods. Is your business data prepared to weather any approaching storms? Learn more.


What Keeps IT Pros Like You Up at Night

When attempting to protect your organization, you’re being pulled in a million directions, trying to secure every possible attack vector. Learn more.

Duration: 1 hour


Shed On-Prem Identity Complexity in a Cloud-First World

The shift to the cloud always seems to focus on enhanced productivity for an organization overall. But cloud adoption also means IT must figure out how to integrate “all-things-cloud” with on-prem Active Directory. Learn more.

Duration: 1 hour


Ransomware Update: Biggest Emerging Risks, Aftermath of Recent Events & IT Best Practices

If there's one silver lining to the emergence of ransomware in the last few years, it's this -- it's brought into sharp relief how interrelated security, backup and recovery, disaster recovery, business continuity, training and organizational policies are in a solid defense strategy. Learn more.

Duration: 1 hour


Why Microsoft's Latest Data Protection Enhancements Aren’t Enough

Industry analysts and leaders agree that you need to add backup and recovery tools to Office 365 for more comprehensive data management and retention. Learn more!


The Biggest Mistake You’re Making with Office 365

If you’re using Office 365, don’t ignore your data protection responsibilities — or you may be putting your critical data at risk. Industry analysts and leaders agree that you need to add backup and recovery tools to Office 365 for more comprehensive data management in protection. Watch now!


Encryption for End Users: What IT Managers Need to Know

When it comes to end-user security, hard-drive encryption is a key pillar to consider for your security strategy. Yet while it adds a layer of security and can be required for compliance, it also adds some challenges and creates risks of accidental data loss on individual PCs. Learn more.

Duration: 1 hour


How to Accelerate Your Veeam Backups to Azure

Using your Veeam solution for backup and replication to the Microsoft Azure cloud is a great start, but did you know it’s possible to make it better and faster? Learn more.

Duration: 1 hour


How to Accelerate Your Veeam Backups to Azure

Using your Veeam solution for backup and replication to the Microsoft Azure cloud is a great start, but did you know it’s possible to make it better and faster? Read on.

Duration: 1 hour


Active Directory Migration Planning

Active Directory is the living heart of most IT organizations. No matter if your organization is on-premises, in the cloud, or in some hybrid situation somewhere in-between your on-premises Active Directory is most likely the most important part of your IT infrastructure. Read on.

Duration: 1 hour


The Extended Enterprise: Top 5 Things IT Must Know

Many organizations need to provide network access to their extended enterprise -- contractors, temp workers, partners, vendors, and others -- to effectively run their business. However, these users create unique challenges and introduce new cybersecurity risks. Join us to learn the top five questions IT must address to successfully manage the extended enterprise. Learn more.


10 Ways to Fail at Enterprise Data Protection in 2019

The data estate that organizations have to protect in 2019 is more complicated than ever. The old concept of a network perimeter is gone, bulldozed by cloud storage, Software as a Service applications, bring your own device practices, data on mobile phones and many employees who never really go off the clock no matter where they are. Learn more.

Duration: 1 hour


Protecting Sensitive Data in an M&A World

Understanding where your sensitive data resides, who can access it, who is using it, and what’s being done to it is a relatively tall order for any organization. But compliance mandates, security initiatives, and just keeping the business running demands it. Learn more.

Duration: 1 hour


Veeam and AWS avengers: Guardians of recovery

Watch this video to learn about key considerations for ensuring the portability of workloads to the cloud, built-in Veeam features for successful workload recovery into AWS and more! Watch this today!


The Biggest Mistake You Are Making with Office 365

If you're using Office 365, don't ignore your data protection responsibilities—or you may be putting your critical data at risk. Making assumptions about how cloud applications protect your data can be a huge oversight, and with limited built-in data recovery capabilities, Office 365 is an app that's commonly overlooked.


Levers of Human Deception: The Science and Methodology Behind Social Engineering

No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding. Learn more.

Duration: 1 hour


4 Best Practices for Azure Cloud Management

Success in the cloud hinges on effective cloud management. In this webinar, we’ll offer ways to help you maximize the return on your Azure cloud investment and gain control of your scaling cloud infrastructure. Read more.


The Practitioner’s Guide to Security Monitoring in the Cloud

Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads, but has also introduced a host of new security threats and challenges. Read on.

Duration: 1 hour


10 Tips to Help Improve IT Security and Safeguard Your Job

In this fast-moving world of cybersecurity, it seems a week doesn’t go by without another company making headlines with a data breach or attack that compromise their data. Read on.


10 Tips to Help Improve IT Security and Safeguard Your Job

In this fast-moving world of cybersecurity, it seems a week doesn’t go by without another company making headlines with a data breach or attack that compromise their data. Read on.


Your Best Route for Office 365 Migration

Migrating to Microsoft Office 365 can be complicated. Even with careful planning, deploying Office 365 and delivering a fast user and application experience can be a challenge. While most organizations assume their traditional networks are ready for the migration, many don’t realize that Microsoft recommends a different strategy. Read on.


Leave Nothing Behind: Cloud Migration Done Right

Join Quest Software and Microsoft MVP Tim Warner for a thoughtful discussion how you can reduce risk, optimize spend and gain full visibility of your on-premises and cloud infrastructure. Learn more!

Duration: 60 minutes


Beat the Clock with Best Practices for Handling Enterprise Windows 7 Migrations

Jan. 14, 2020 is a huge day in the IT world. That's when Windows 7, which was in many ways Microsoft's most popular operating system to date, falls out of support. Learn more.


Beat the Clock with Best Practices for Handling Enterprise Windows 7 Migrations

Jan. 14, 2020 is a huge day in the IT world. That's when Windows 7, which was in many ways Microsoft's most popular operating system to date, falls out of support. Learn more.


Reduce Your Users’ Phish-Prone Percentage by 92%

You got into IT because you enjoy working with cutting edge technology and you love working hands-on with powerful cool boxes that, unlike humans, do what they are programmed to do. Read on.


An In-Depth Look at Backupify’s State of the Industry Ransomware Report

Ransomware remains a massive threat to businesses and the number of ransomware attacks are not expected to decrease any time soon. Backupify’s 2019 ransomware report* provides unique visibility into the state of ransomware from the perspective of IT professionals and their clients dealing with infections on a daily basis. Learn more


The State of Ransomware and Its Drastic Impact on Business

This webcast provides an in-depth look at Backupify’s report. You’ll gain useful insight into preparing your first line of defense, developing a multiple solution approach to prepare for the worst, and implementing recommendations to ensure recovery and continuity after an attack. Learn more!


You Know You Need to Protect O365 Data. Here’s How.

A vital part of your company’s cloud-adoption story is moving valuable data to Office 365. As an IT professional you recognize the need for vigorous data protection. It must mitigate threats including ill-intentioned insiders, accidental deletions, and even Office 365 outages preventing your workforce from working. Learn more.


Top 5 Hybrid AD Management Mistakes and How to Avoid Them

While Hybrid messaging and collaboration with MS Office 365 offers compelling benefits to larger organizations and the enterprises, it comes with new security and compliance risks. Learn More.


Top 5 Hybrid AD Management Mistakes and How to Avoid Them

While Hybrid messaging and collaboration with MS Office 365 offers compelling benefits to larger organizations and the enterprises, it comes with new security and compliance risks. Learn more.


The Multi-Cloud Enterprise: How to Deliver Data Management and Availability

The nature of the senior data center executive’s job is evolving from delivery executive to IT business executive. The webinar will cover the increasingly changing landscape of infrastructure and processes of multi-cloud environments. Learn more!

Duration: 1 hr


New Research: Top 5 Data Protection Gaps in Office 365

Do you think the native capabilities of Office 365 are enough to protect your business? Would you bet your career on it? We wouldn’t - and neither would industry expert, Michael Osterman. Sign up to learn why!


Stop Identity Attacks in Their Tracks

In today's world of frequent account takeovers, credential compromises, and automated attacks, it's more important than ever to protect your customers. Learn more.


Power Up Your Password Policy

This editorial webcast, presented by Redmond magazine, will explore the viability of the NIST password framework, and provide some updated techniques and tactics for ensuring a rock-solid password policy. Read on.


12 Ways to Defeat Two-Factor Authentication

Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years of experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite 2FA solution. Learn more!


Three Ways Lenovo is Delivering Enterprise Productivity

Today’s modern, mobile workforce needs advanced technology that keeps them connected, collaborative and, most of all, productive. In this engaging webinar, three Lenovo experts — Alli Heeter, Brand Ambassador, Jimmy Smith, ThinkVision Product Manager and Aaron Buckner, ThinkPad Mobile Workstation Product Manager — sit down to discuss how to support enterprise users working at full capacity in the office and on the move.


Maintaining Hybrid AD Security in an M&A World

So, how do you make sense of and protect this constantly moving hybrid AD target? In this interactive webcast, join Microsoft Cloud & Data Center MVP Nick Cavalancia, and Matthew Vinton from Quest, as they discuss how. Register now!


The Biggest Mistake You’re Making with Office 365

If you’re using Office 365, don’t ignore your data protection responsibilities — or you may be putting your critical data at risk. Industry analysts and leaders agree that you need to add backup and recovery tools to Office 365 for more comprehensive data management in protection. Read on!


The Biggest Mistake You’re Making with Office 365

If you’re using Office 365, don’t ignore your data protection responsibilities — or you may be putting your critical data at risk. Industry analysts and leaders agree that you need to add backup and recovery tools to Office 365 for more comprehensive data management in protection. Read on!


The Biggest Mistake You’re Making with Office 365

If you’re using Office 365, don’t ignore your data protection responsibilities — or you may be putting your critical data at risk. Industry analysts and leaders agree that you need to add backup and recovery tools to Office 365 for more comprehensive data management in protection. Read on!


10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys

Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert as he explores 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Read on.


Avoiding GDPR Penalties – 5 Key Principles. Veeam Compliancy Experience Shared

The GDPR grace period for businesses to get themselves compliant ends on May 25, 2018, which touches over 500 million EU residents your company might be working with. Your inaccurate GDPR compliance might result in €20 million of fines or even more. Learn more.


How to Protect Identities and Secure Your Azure Environment

Azure AD allows you to layer features such as conditional access and multifactor authentication to help protect your users and data. Along with Azure Security Center, it helps monitor security across on-premises and cloud workloads. Unfortunately, incorporating Microsoft’s native tools alone is rarely enough to maintain a strong security posture of your Azure infrastructure. Learn more.

Duration: 1 hour


What the California Consumer Privacy Act Means for IT Pros

Data privacy and data security have been among the hottest topics of 2018, mainly due to the GDPR, which came in force on May 25. However, 2018 also saw the signing of another important law, the California Consumer Privacy Act (CCPA). Although it has gotten a lot less press than the GDPR, it is nearly as sweeping, since it applies to all organizations that store the personal information of California residents. Learn more.

Duration: 1 hour


Citrix Virtual Tech Summit

As your environment grows more diverse—more clouds, more devices, more types of apps—you need a more efficient and secure approach to management. At this technical online event for hands-on IT leaders, we’ll discuss the building blocks of a modern digital workspace. Register now!

Duration: 1 Hour


The 3 Pillars of SharePoint Security

Many organizations purchase and implement software solutions based on factors like a rich feature set, a low price and an appealing user interface. Unfortunately, security issues are often pushed to the side or forgotten altogether. Consider SharePoint, Microsoft’s flagship collaboration platform. Learn more.

Duration: 1 Hour


The 3 Pillars of SharePoint Security

Many organizations purchase and implement software solutions based on factors like a rich feature set, a low price and an appealing user interface. Unfortunately, security issues are often pushed to the side or forgotten altogether. Consider SharePoint, Microsoft’s flagship collaboration platform. Learn more.

Duration: 1 Hour


How to Spend Your Security Budget in a DevOps World

In this session, Threat Stack Security Engineer, Mark Moore, and CFO, Kevin Durkin, will discuss the current state of security processes and investments as organizations shift to the cloud. Learn how to build a scalable security program that fits your organization’s budget. Join us on November 8th at 1pm ET! Sign up today!

Duration: 1 Hour


Gain Control Over Windows 10 Updates

There’s no doubt about it, Windows 10 upgrades have caused disruption across IT departments. Our team of Windows 10 specialists will share stories from the field and tips for successful management of Windows 10 in this technical discussion. We’ll highlight the latest best practices that every company should follow and explore the usability of unified endpoint management toolsets from VMware, Citrix, and Microsoft asking, “Do they really solve the need?”

Duration: 30 mIN


IT Security Horrors that Keep You Up at Night

One reason companies continue to get breached is that they are too focused on the wrong things. You lose sleep over the “shock and awe” security headlines in the news — while your executives and directors use a password of monkey123 without 2-factor authentication for their email. The good news is you can greatly increase the security of your network without spending thousands of dollars on shiny new boxes with pretty blinking lights!

Duration: 1 Hour


Accelerating Office 365 Adoption: Making the Cloud Less Cloudy

Join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Matthew Vinton from Quest Software as they discuss migrating to, management of, and securing of Office 365. Learn more.

Duration: 30 minutes


Top Nine Insider Attacks and How to Spot Them

In this live webcast, Quest experts Shawn Barker and Ghazwan Khairi will be introducing our brand new product Change Auditor Threat Detection — a powerful solution for proactively detecting anomalous behavior based on user activity. You will discover ways to minimize your insider threat risk. Learn more.

Duration: 1 Hour


Session 1 - The Human Factor: Malicious Insiders vs. Negligent End Users

Breaches resulting from insider misdeeds are front-page news on a regular basis. Unfortunately, the average employee misses a critical common thread across many these stories. It’s up to IT pros to understand the techniques attackers use, educate their users to avoid common traps, and take the necessary steps to avoid breaches. Learn more.

Duration: 1 Hour


Reduce Your Security and Compliance Risks with IT Asset Inventory Management

To minimize security and compliance risks, as well as reduce costs on under-utilized hardware and software, IT pros need to inventory all IT assets their organization has and track changes to them. If done manually, these tasks require hours of tedious work, so many organizations seek tools that streamline the process. Learn more.

Duration: 1 Hour


Identity Management Key to IT Modernization

Enterprises are saddled with an IT architecture that has evolved organically over time. With the adoption of cloud and a drive to a more distributed workforce, IT is tasked with securely managing more users, on more devices, in more locations, and accessing more applications. The demands on IT are compounding quickly. And, limited staffing and budgets mean IT is constantly being asked to do more with less. Learn more.

Duration: 1 Hour


Align HR and IT to Streamline Employee Onboarding

Growing companies onboard 30 new employees, on average, each month. This is no small challenge for the HR and IT teams. Now is the time for onboarding processes that are automatic, efficient and secure. Learn more.

Duration: 1 Hour


Netwrix Auditor – Data Discovery & Classification Edition

Meet the brand-new Netwrix Auditor – Data Discovery and Classification Edition, which provides complete visibility into where sensitive files are, what content is inside them, who can access the files and who actually uses them. Learn more!

Duration: 1 Hour


A Hacker Explains: How Attackers Exploit Office 365 Vulnerabilities

Office 365 has become the platform of choice for document collaboration and sharing. If you’re using Office 365 or planning to migrate there, understanding the types of security attacks you can expect is imperative. Microsoft provides tools for testing your end users by simulating some of the most common attacks, so you can educate them as part of your broader defense strategy. Learn more.

Duration: 1 Hour


The Role of Virtualization in the Hybrid Cloud Era

Join us on this webinar to learn how both on premises infrastructure and public cloud can play a role giving enterprise IT the freedom to leverage the best attributes of both by creating a hybrid cloud environment making the deployment and transition between environments simple and seamless. Learn more.


Five Expert Tips to Overcome Compliance Challenges

Regulatory compliance is one of the biggest challenges that IT pros face today, regardless of their organization’s location, size or industry. Although GDPR, PCI DSS, HIPAA, GLBA, CJIS and other compliance regulations focus on different things, the underlying objective is the same — securing the data. Register now!

Duration: 1 Hour


Netwrix Auditor Product Demo

See what the new Netwrix Auditor 9.6 has to offer, including how you can now classify and secure your data. Register today!

Duration: 1 Hour


Netwrix Auditor Product Demo

See what the new Netwrix Auditor 9.6 has to offer, including how you can now classify and secure your data. Register today!

Duration: 1 Hour


VIDEO: Optimize Your Connection to Oracle Cloud with Equinix

Learn how Oracle and Equinix help organizations to transform their business by integrating hybrid and multicloud environments to increase operational efficiency, enhance system processes, improve customer experiences and grow revenues. Learn more.

Duration: 1 Hour


VIDEO: Optimize Your Connection to Oracle Cloud with Equinix

Learn how Oracle and Equinix help organizations to transform their business by integrating hybrid and multicloud environments to increase operational efficiency, enhance system processes, improve customer experiences and grow revenues. Learn more.

Duration: 1 Hour


A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.


A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.


Netwrix Auditor Product Demo

In this technical webinar, we will guide you through the key functionality of Netwrix Auditor 9.5. You’ll learn how to use Netwrix Auditor more effectively to audit critical systems such as Active Directory, Windows file servers, Microsoft SQL Server and many more.

Duration: 1 Hour


Availability Outside of the Data Center

Take a deep dive into how Veeam® Agents deliver Availability for Windows-based physical servers and Linux-based server instances. We’ll discuss how to meet RPOs and reduce the risk of data loss for laptops and tablets outside the corporate network. We will also discuss how you can solve key challenges like managing remote offices, offering Backup as a Service and Disaster Recovery as a Service, and more.

Duration: 1 Hour


How the Cloud Drives Availability and Data Protection

Data is to this century what oil was to the last century – a driver of massive growth and change. This is not just about technology, but also new ways of doing business. And yet, Availability and data protection are among the biggest challenges facing IT leaders today, particularly with the recent increases in cyberattacks, such as ransomware, which have affected companies of all sizes. Learn more.

Duration: 1 Hour


Availability On-Premises, In The Cloud And On The Go with Veeam Agent for Microsoft Windows

Are you looking to find out more about avoiding downtime and data loss quickly and easily for Windows-based physical or public-cloud workloads? How can you bring more Availability to these workloads? Learn more.

Duration: 1 Hour


Total Control and Protection of Email Data with Veeam Backup for Microsoft Office 365

Whether you have completely migrated to Microsoft Office 365, or have a hybrid exchange and Office 365 deployment, your business objectives remain the same. You must remain in control of your data and be able to backup and recover Microsoft Office 365 items at all times. Veeam® Backup for Microsoft Office 365 enables you to mitigate the risk of losing access to Office 365 email data and ensure Availability for users. Learn more.

Duration: 1 Hour


To The Cloud, From The Cloud, Within The Cloud

Learn from Mike Jones on what modern approaches exist to do what you want with your data in the cloud. Whether you are starting your cloud journey, already underway or not sure how to meet your technical and business requirements in a cloud-ready world, there is something for everyone on this webinar. Watch it now.

Duration: 1 Hour


Hyper-V 2016: The Next Generation of Virtualization

Watch this interactive, demo-filled webinar that will provide all of the details on the largest announcements within Hyper-V 2016. Join Microsoft Cloud and Datacenter Management MVP, Clint Wyckoff, as he illustrates the pieces of Hyper-V 2016! Learn more.

Duration: 1 Hour


Security Configuration Management Best Practices

In this webinar, we’ll talk about some of the things you should be looking at when it comes to security configuration management. We’ll talk about some best practices, default tools used, as well as some very common misconfigurations that are seen in the “wild”, possibly even ones that you’ve configured!


Leveraging Office 365 in Your Digital Transformation

Successfully migrating and modernizing content to SharePoint, OneDrive for Business, and Teams can establish the first milestones in the digital transformation process. Learn more.


Leveraging Office 365 in Your Digital Transformation

Successfully migrating and modernizing content to SharePoint, OneDrive for Business, and Teams can establish the first milestones in the digital transformation process. Learn more.