Webcasts


Upcoming

On-Prem Backup in a Hybrid AD World: Is Your DR Strategy Missing the Mark?

In this educational webcast, join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, and Matthew Vinton from Quest Software, as they discuss how the need to both include Azure AD as part of your planning, and to have a way to backup and restore it becomes as critical as your ability to recover on-premises AD. Learn more!

Date: 01/16/2019

Time: 11:00 am

Duration: 1 hr


On Demand

How to Protect Identities and Secure Your Azure Environment

Azure AD allows you to layer features such as conditional access and multifactor authentication to help protect your users and data. Along with Azure Security Center, it helps monitor security across on-premises and cloud workloads. Unfortunately, incorporating Microsoft’s native tools alone is rarely enough to maintain a strong security posture of your Azure infrastructure. Learn more.

Duration: 1 hour


What the California Consumer Privacy Act Means for IT Pros

Data privacy and data security have been among the hottest topics of 2018, mainly due to the GDPR, which came in force on May 25. However, 2018 also saw the signing of another important law, the California Consumer Privacy Act (CCPA). Although it has gotten a lot less press than the GDPR, it is nearly as sweeping, since it applies to all organizations that store the personal information of California residents. Learn more.

Duration: 1 hour


Get Your Database Security House in Order for 2019!

Come away from this editorial webcast, featuring Microsoft MVP John O'Neill Sr., with actionable best practices for improving your database security posture in 2019. You'll get tips for improving visibility into where all your database assets are located, dealing with disparate data formats, handling access control, monitoring and analyzing the security of database assets and more! Read on.


You Need to Secure Email and Sensitive Data in Office 365. Now what?

While many organizations are in the process or have already moved to Office 365, there is a lack of clarity around just how much protection they are getting from their existing security infrastructures and the security capabilities built in to the service. But there’s hope. Register to Learn more!

Duration: 1 hour


What Most Computer Security Defenses are Doing Wrong, and How To Fix It

Most companies have huge gaps in their computer security defenses, and can be compromised at will by a determined hacker. You’ll leave this webinar with a fresh perspective and an action plan to improve the efficiency and effectiveness of your current computer security defenses. Learn more!


Best Practices for Office 365 Migration

During this webcast, we provided scenario-based guidance so you can kickstart or build upon your cloud migration journey. We also covered the latest Office 365 updates and industry best practices. watch now!


Best Practices for Office 365 Migration

During this webcast, we provided scenario-based guidance so you can kickstart or build upon your cloud migration journey. We also covered the latest Office 365 updates and industry best practices. watch now!


Best Practices for Office 365 Migration

During this webcast, we provided scenario-based guidance so you can kickstart or build upon your cloud migration journey. We also covered the latest Office 365 updates and industry best practices. watch now!


Covering Your Assets: Office 365 Data Protection Measures for End Users and Administrators

This session will detail the features of Office 365 that support self-service restoration. We’ll discuss settings that protect you and your team from loss. We’ll also look at what administrators can do to help their users’ help themselves. Learn more.


Covering Your Assets: Office 365 Data Protection Measures for End Users and Administrators

This session will detail the features of Office 365 that support self-service restoration. We’ll discuss settings that protect you and your team from loss. We’ll also look at what administrators can do to help their users’ help themselves. Learn more.


Office 365: Is It Backed Up? Are You Sure?

Keeping Office 365 data safe and secure doesn't have to be difficult. iland Secure Cloud Backup for Office 365 with Veeam is a simple solution that can help you protect your Office 365 data from accidental or malicious data loss. Learn more!


Office 365: Is It Backed Up? Are You Sure?

Keeping Office 365 data safe and secure doesn't have to be difficult. iland Secure Cloud Backup for Office 365 with Veeam is a simple solution that can help you protect your Office 365 data from accidental or malicious data loss. Learn more!


The 3 Pillars of SharePoint Security

Many organizations purchase and implement software solutions based on factors like a rich feature set, a low price and an appealing user interface. Unfortunately, security issues are often pushed to the side or forgotten altogether. Consider SharePoint, Microsoft’s flagship collaboration platform. Learn more.

Duration: 1 Hour


The 3 Pillars of SharePoint Security

Many organizations purchase and implement software solutions based on factors like a rich feature set, a low price and an appealing user interface. Unfortunately, security issues are often pushed to the side or forgotten altogether. Consider SharePoint, Microsoft’s flagship collaboration platform. Learn more.

Duration: 1 Hour


5 Simple Steps to Replacing Your DR Site with Azure

In this webinar we’ll show you just how easy it is to connect your VMware vSphere and Microsoft Hyper-V environments into Microsoft Azure, removing the need for you to host your own secondary DR site altogether! 5 simple steps is all it takes to begin your journey to the cloud, by utilizing the cost-effective storage and on-demand capacity of Azure to protect your data and applications. Learn more.


What You Need to Know Before Moving to a New SharePoint Version

Migrations are complex, and they often require an expert-level of knowledge to guarantee success. In this webinar, we will look at different best practices to ensure your migration is a success. Learn more!


Unlock Hidden Resources in Your Hybrid Virtualization Infrastructure

In this information-packed webcast, Microsoft MVP Tim Warner and the Quest Software team up to demonstrate practical options and next steps to gain complete visibility into your hybrid virtualization environment. Say goodbye to wasted work hours and compute cycles, and say hello to resource optimization and better budget forecasts! Learn more.


How to Prepare for Windows Server 2008 End of Support

Join us at this webcast to learn the best ways to secure, migrate and future-proof your legacy Windows Server applications without having to recode them. Learn more.


Five Steps to Efficient and Secure Office 365 Management

Whether you have already implemented Office 365 or are considering the move, this is a session you don’t want to miss. Organizations who transition to Office 365 as part of a hybrid strategy experience a common set of management challenges around things like license management, user provisioning, policy enforcement, and governance. Learn more.

Duration: 1 Hour


Maintain Control Over Your Groups and Users When Migrating to the Cloud

Join Imanami as they provide best practices on how to regain control over group and user management through automation and delegation. Learn more!


Email and the Web - Go Great Together for Attackers, But What About for the Defenders?

With nearly all security incidents and breaches originating from both email and the web -- and the necessity of these tools for your organizations day to day operations -- how can you protect your organization from the cyberattackers and their malicious work? Find out in this webcast.


How to Spend Your Security Budget in a DevOps World

In this session, Threat Stack Security Engineer, Mark Moore, and CFO, Kevin Durkin, will discuss the current state of security processes and investments as organizations shift to the cloud. Learn how to build a scalable security program that fits your organization’s budget. Join us on November 8th at 1pm ET! Sign up today!

Duration: 1 Hour


5 Steps to Accelerate Your Data Management - Considered Advice from Thought Leaders

Join Jon Toigo, Chairman of the Data Management Institute, and Dave Russell, Vice President of Enterprise Strategy for Veeam, as they discuss the five stages to achieving effective data management. Learn more!


Gain Control Over Windows 10 Updates

There’s no doubt about it, Windows 10 upgrades have caused disruption across IT departments. Our team of Windows 10 specialists will share stories from the field and tips for successful management of Windows 10 in this technical discussion. We’ll highlight the latest best practices that every company should follow and explore the usability of unified endpoint management toolsets from VMware, Citrix, and Microsoft asking, “Do they really solve the need?”

Duration: 30 mIN


IT Security Horrors that Keep You Up at Night

One reason companies continue to get breached is that they are too focused on the wrong things. You lose sleep over the “shock and awe” security headlines in the news — while your executives and directors use a password of monkey123 without 2-factor authentication for their email. The good news is you can greatly increase the security of your network without spending thousands of dollars on shiny new boxes with pretty blinking lights!

Duration: 1 Hour


Citrix Virtual Tech Summit

As your environment grows more diverse—more clouds, more devices, more types of apps—you need a more efficient and secure approach to management. At this technical online event for hands-on IT leaders, we’ll discuss the building blocks of a modern digital workspace. Register now!

Duration: 1 Hour


Office 365: Is It Backed Up? Are You Sure?

Keeping Office 365 data safe and secure doesn't have to be difficult. iland Secure Cloud Backup for Office 365 with Veeam is a simple solution that can help you protect your Office 365 data from accidental or malicious data loss. Learn more!


Making Multi-Cloud Management Invisible

Businesses seek to adopt multi-cloud architecture to foster better agility and enable more rapid innovation. However, the complexity of adopting a variety of services across multiple clouds with varying pricing models leads to lack of cloud interoperability, limited visibility and uncontrolled spend. The result is a combination of business and operational challenges for multi-cloud management.


Making Multi-Cloud Management Invisible

Businesses seek to adopt multi-cloud architecture to foster better agility and enable more rapid innovation. However, the complexity of adopting a variety of services across multiple clouds with varying pricing models leads to lack of cloud interoperability, limited visibility and uncontrolled spend. The result is a combination of business and operational challenges for multi-cloud management.


12 Ways to Defeat Two-Factor Authentication

The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security. Get the details.


Accelerating Office 365 Adoption: Making the Cloud Less Cloudy

Join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Matthew Vinton from Quest Software as they discuss migrating to, management of, and securing of Office 365. Learn more.

Duration: 30 minutes


Group Policy Monitoring, Reporting, and Alerting

In this webinar, MVP Derek Melber will guide you through the technical concepts of Group Policy which make monitoring, reporting, and alerting of changes nearly impossible. Then, Derek will give you precise guidance on how to accomplish your needs around Group Policy. Get the details.


Do I Really Need Office 365 Backup? The Need for Data Protection in a Cloud World

The shift to using Office 365’s email and collaboration tools have lulled organizations into thinking that data is a problem for Microsoft to address. Many would be surprised to know that no SLA exists that says Microsoft is responsible for recovery of the user-generated data should it be lost on their platform. Learn more.


Backup, Governance and IT Resilience in Office 365: Connecting the Dots

During this editorial webcast, we’ll discuss best practices for ensuring your organization has a bombproof backup and recovery plan for Office 365, and that it is tightly integrated into your overall data governance program. Learn more.


From Legacy to the Cloud: Modernizing your Archiving Strategy

Like most organizations, you’re either planning for, or have made, the shift to Office 365. But, you’re still not sure what to do about your on-prem archive. Find out what a modern archiving strategy looks like and how to get there. Learn more.


Should I Stay or Should I Go? – Keeping Legacy Data from Clashing with the Cloud

In this interactive webc ast, join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, and Chris Clark, CEO of Trusted Data Solutions, as they discuss moving legacy data to the cloud and actions you should take in regards to policy, planning and people. Learn more.


Should I Stay or Should I Go? – Keeping Legacy Data from Clashing with the Cloud

In this interactive webc ast, join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, and Chris Clark, CEO of Trusted Data Solutions, as they discuss moving legacy data to the cloud and actions you should take in regards to policy, planning and people. Learn more.


Secure your Endpoints - Don’t Fall Victim to Cyberattacks

Your endpoint environment is growing and you know that every network connected device represents a security risk. One ransomware attack can wreak havoc on your environment. Find out what you can do to protect your IT infrastructure with solutions that are available now. Learn more.


Things You Don’t Know About Single Sign-On

Watch this webinar to discuss the common questions Okta hears from customers around single sign-on and learn why SSO is not what you think it is. Learn more.


5 Best Practices for Enforcing Password Policies

During this editorial webcast, experts from Redmond magazine will discuss best practices for ensuring passwords are indeed protecting your organization’s digital assets and step you can take to make your password policies as effective as possible. Learn more.


Availability Evolved: From Data Protector to Data Mover

Join Jon Toigo of Toigo Partners International and the Data Management Institute and Jason Buffington of Veeam Software for a deep dive into the changing role of data availability tools and their evolution toward a more comprehensive data mover and data management functionality set. Learn more.


Top Nine Insider Attacks and How to Spot Them

In this live webcast, Quest experts Shawn Barker and Ghazwan Khairi will be introducing our brand new product Change Auditor Threat Detection — a powerful solution for proactively detecting anomalous behavior based on user activity. You will discover ways to minimize your insider threat risk. Learn more.

Duration: 1 Hour


The Hyper-Available FlashStack

Join Microsoft MVP, VMware vExpert, Greg Schulz of Server StorageIO with with Andrea R. Acosta of Veeam and Colin Gallagher of Pure Storage as they explore how organizations of all sizes benefit from on-prem data infrastructure with public cloud ease of use without the associated loss of control, complexity or compromise.


Align HR and IT to Streamline Employee Onboarding

Growing companies onboard 30 new employees, on average, each month. This is no small challenge for the HR and IT teams. Now is the time for onboarding processes that are automatic, efficient and secure. Learn more.

Duration: 1 Hour


Identity Management Key to IT Modernization

Enterprises are saddled with an IT architecture that has evolved organically over time. With the adoption of cloud and a drive to a more distributed workforce, IT is tasked with securely managing more users, on more devices, in more locations, and accessing more applications. The demands on IT are compounding quickly. And, limited staffing and budgets mean IT is constantly being asked to do more with less. Learn more.

Duration: 1 Hour


Session 1 - The Human Factor: Malicious Insiders vs. Negligent End Users

Breaches resulting from insider misdeeds are front-page news on a regular basis. Unfortunately, the average employee misses a critical common thread across many these stories. It’s up to IT pros to understand the techniques attackers use, educate their users to avoid common traps, and take the necessary steps to avoid breaches. Learn more.

Duration: 1 Hour


SecOps 101: Get Operations and Security Working Hand in Hand

During this editorial webcast, experts from Redmond magazine will discuss strategies and tactics to better align your operations and security teams and get them working together hand in hand to improve your overall security posture. Learn more.


Reduce Your Security and Compliance Risks with IT Asset Inventory Management

To minimize security and compliance risks, as well as reduce costs on under-utilized hardware and software, IT pros need to inventory all IT assets their organization has and track changes to them. If done manually, these tasks require hours of tedious work, so many organizations seek tools that streamline the process. Learn more.

Duration: 1 Hour


Migrating Workloads to the Cloud: It’s More than “Lifting and Shifting”

In this educational webcast, join Microsoft Cloud and Datacenter MVP Nick Cavalancia, and Chris Jones from Quest Software, to learn how do you avoid complexities and ensure the most cost-effective move to the cloud.


The Business Value of Using Veeam and NetApp to Reduce Data-Related Risks

Data is increasingly at the core of any business or organization and is fueling new Digital Transformation (DX) initiatives. And as data becomes more distributed, dynamic and diverse, data Availability has never been more essential. Join this webinar to learn how joint Veeam and NetApp solutions mitigate risk, enhance availability, reduce IT complexity and lower costs.

Duration: 1 Hour


Hacking Order Management: 5 IT Benefits of an Automated Solution

The connection between order management and IT departments is one often overlooked. Problems on the order side often cause IT to drop what they’re doing and help fix the issue ¬— but not when you have the ultimate order management hack in place: an AI-driven automation solution. Learn more.

Duration: 1 Hour


The 5 Benefits of Implementing Advanced Load Balancing in Azure

Businesses today are rapidly migrating their application workloads to Microsoft Azure Cloud or hybrid infrastructures, spanning on-premises to public clouds. Learn the benefits of implementing modern, advanced load balancing in Azure – cloud-native in Azure, integrated with Kubernetes and multi-cloud. See a demonstration!

Duration: 1 Hour


Don’t Let Your Users Be Your Organization's Biggest Risk

Take a peek behind the curtain of an organization's biggest risk - their own users. How do we prepare for and prevent these attacks? How do we monitor these users and hold them accountable?, How do we identify our biggest risks and avoid becoming the next negative headline? Join this session to find out.

Duration: 1 Hour


Latest Business Email Compromise Scams - Don't Be the Next Victim

Join us in this webinar, as we take an in-depth look at how the latest attacks work and the psychology and mechanics behind them. We will also discuss defensive measures you can take now to defend your organization against these attacks. Learn more.

Duration: 1 Hour


Critical Malware 101: Threats You Need to Prepare for in the Year Ahead

During this editorial webcast, experts from Redmond magazine will outline some of the critical steps organizations must take to best defend themselves against all types of malware. We will provide tactical steps you can put into place right away to improve your security posture and keep malware at bay. Learn more.

Duration: 1 Hour


Intelligent Data Management 101: What It Is and What You Need to Know

During this editorial webcast, experts from Redmond magazine will outline some of the critical functions to which enterprises must pay attention to ensure they’re getting the full value from their corporate data—ensuring its security and, finally, ensuring it is always available across all platforms to drive their business. Learn more.

Duration: 1 hour


Reduce Risks to Office 365 Data

This editorial webcast, produced by Redmond magazine, will provide an overview of the most glaring data protection gaps in Office 365 and some high-level steps you can take to mitigate the risks and ensure your data is protected. Read more.


Office 365 Migration - It's Just a Migration, What Could Possibly Go Wrong?

If your organization is one that has a complex migration into Office 365 coming up, you’re not going to want to miss this webcast. Nathan O’Bryan (MCSM/MVP) and Ron Robbins will talk about some of the ways these complex Office 365 migrations can go wrong, and what you can do to ensure yours is completed successfully. Learn more!

Duration: 30 Min


Turbulence Ahead: The Changing Role of Data Protection in a Hyper Growth Multi-Cloud Environment

With the unprecedented growth of digital information, IT planners are leveraging hyper-scale infrastructure to host all the bits. Author, columnist and data protection expert, Jon Toigo, will join Dave Russell in this thoughtful and probing discussion of the turbulent times ahead and the efforts by Veeam and other technology innovators to get ready for the storm. Learn more!

Duration: 1 Hour


Recent Changes to Google Chrome that Every Online Business Needs to Know

The days of "We'll enforce HTTPS on our public website someday" are officially over. In July 2018 Google made changes to its Chrome browser that marks all unencrypted HTTP websites "not secure." Join IT professional and technical trainer Tim Warner for an information-packed session. Register now!

Duration: 1 Hour


A Hacker Explains: How Attackers Exploit Office 365 Vulnerabilities

Office 365 has become the platform of choice for document collaboration and sharing. If you’re using Office 365 or planning to migrate there, understanding the types of security attacks you can expect is imperative. Microsoft provides tools for testing your end users by simulating some of the most common attacks, so you can educate them as part of your broader defense strategy. Learn more.

Duration: 1 Hour


How to Chart Your Business Team's Journey from Spreadsheets to Business Intelligence

For many business leaders, spreadsheets still serve as the default tools for generating reports, but they are proving to be insufficient for supporting the level of analysis senior executives expect. During this Webcast, we will reveal how business leaders can enable their companies to broaden their perspectives on performance. Read on.

Duration: 1 Hour


Critical Event Response: The Expanding Focus of IT Recovery Planning

The increasing frequency of security-related threats is forcing IT managers to enlarge the scope of IT recovery plans. Join us as we define the basic capabilities for ensuring rapid recovery from a security-related downtime. Learn more.

Duration: 1 hour


Quickly Detect and Fix SQL Server Performance Issues to Keep Applications Responsive

Problematic SQL queries can severely reduce the performance of SQL Server and the business-critical applications that it supports. Everyone wants their SQL queries to run faster, but how can you achieve that? It is essential to have access to detailed, real-time information on the performance of SQL Server instances and databases. Learn more.

Duration: 1 Hour


Netwrix Auditor – Data Discovery & Classification Edition

Meet the brand-new Netwrix Auditor – Data Discovery and Classification Edition, which provides complete visibility into where sensitive files are, what content is inside them, who can access the files and who actually uses them. Learn more!

Duration: 1 Hour


Beat the Top 3 Security Challenges Facing Office 365 Customers Today

Join Proofpoint security experts as they discuss top security threats affecting organizations today, including account compromise, email fraud and phishing, and data protection in the cloud. Learn more.


Insights for Windows 10 in the Enterprise Series

Get the latest tips for improving the move to Windows 10 as well as helpful tips to improve your processes for managing Windows as a service. Learn more!


Five Expert Tips to Overcome Compliance Challenges

Regulatory compliance is one of the biggest challenges that IT pros face today, regardless of their organization’s location, size or industry. Although GDPR, PCI DSS, HIPAA, GLBA, CJIS and other compliance regulations focus on different things, the underlying objective is the same — securing the data. Register now!

Duration: 1 Hour


Achieving Migration Zen: The Art of Simplifying Email Archive Migrations

While choosing the right archiving solution the best fits your organization’s needs is important, equally as important is HOW you migrate - with compliance and regulation risks on the line, companies cannot afford an archive migration failure. Find out the best way to migrate email archives without the headache. Read on.


How to Enhance the Resilience of Your Office 365 Deployment

Join Microsoft MVP Tim Warner for a practical deep-dive into how third-party cloud services can integrate with Office 365 to give you full-spectrum security and data protection. You will walk away from this session with practical steps on where the Office 365 pain points are, and how you can address them to meet your SLAs and sleep better at night.


Top 5 Challenges with Managing Hybrid Data and How to Overcome Them

In this editorial webcast, experts explore issues and emerging solutions surrounding hybrid data such as integration, storage and backup, security, advanced data analytics, compliance and maintaining data quality across a wide variety of external sources.


VIDEO: Optimize Your Connection to Oracle Cloud with Equinix

Learn how Oracle and Equinix help organizations to transform their business by integrating hybrid and multicloud environments to increase operational efficiency, enhance system processes, improve customer experiences and grow revenues. Learn more.

Duration: 1 Hour


Accelerate Digital Transformation by Getting Cloud Migration First-Time-Right

Join us for this webinar to learn more about the Azure migration solution that allows enterprises to reap the benefits of the cloud.


Solving Hyper-V Backup Challenges with the Cloud

Join us for this webinar discussion on how to leverage the public cloud to solve several challenges organizations and IT professionals face when it comes to providing effective availability within Microsoft Hyper-V environments.


Disaster Recovery Gaps in Hybrid AD Environments

Learn how Azure AD is not (and cannot be) seen as a 100% slave to Active Directory and how this impacts your backup and restore strategy both in terms of changes and deletions. Backing up AD, but not Azure AD? You might be in trouble…


How to Secure Your VPN, Mobile Devices, and Network Devices Via Certificates

See what certificate management in action looks like as we show you how one globally distributed company with thousands of remote offices secured its transactions, and improved the customer and employee experience. Read on.


How to Secure Your VPN, Mobile Devices, and Network Devices Via Certificates

See what certificate management in action looks like as we show you how one globally distributed company with thousands of remote offices secured its transactions, and improved the customer and employee experience. Read on.


Netwrix Auditor Product Demo

See what the new Netwrix Auditor 9.6 has to offer, including how you can now classify and secure your data. Register today!

Duration: 1 Hour


Office 365: Cache Roaming and OneDrive

Complete with demos and previews of upcoming features Ivanti will guide you through the journey that many of their customers have already successfully completed.


Solving Application Server I/O Performance Bottlenecks

This webinar is for those whose applications have the need for speed including database, VDI, SharePoint, Exchange, AI, ML and other I/O intensive workloads. Learn more.


Better Data Protection with Hybrid Cloud and Software Defined Secondary Storage

Join industry experts as they explore what you can do today to improve your data protection across local on-site and hybrid clouds.


How to Simplify Your Migration to Windows 10

Learn tips that IT managers can use to streamline the OS migration process, while maintaining business productivity by leveraging endpoint data protection.


HPE and Veeam Go ALL-IN to Deliver Hyper-Availability

Join this interactive discussion to learn how HPE and Veeam can help with the transition into Hyper Availability and how enterprises are using Hyper Availability to create a business advantage.


Driving Fax, Email and EDI Order Automation with AI

Join the live webinar to discover how organizations can stop relying on IT to fix issues like EDI errors and start leveraging AI-driven technology to automate the tedious parts of order processing. Learn more!

Duration: 30 Min


Mitigating IT Risks with Data Classification and Access Control

Join industry analyst Tim Warner and Netwrix Systems Engineer Jeff Melnick to learn how to start a corporate data classification and protection scheme right now. Ask Jeff and Tim questions and leave the webinar armed with practical advice and next step actions. Learn more.


Windows as a Service – Resolving the Upgrade Versus Update Dilemma

Attend and learn about Windows as a service, how it will impact enterprises and get a cheat sheet for a hassle free transition to Windows as a service.


Office 365: Expert Tips for Protecting the Parts that Microsoft Doesn’t Handle

Join Office 365 experts to learn about potential security risks present in O365 and how best to mitigate those risks.


Analyze Active Directory Security for Fun and Profit

Join Microsoft MVP Tim Warner to learn how to audit, analyze, configure, and report on AD DS by using Microsoft "in box" tools. We will then transition into the need for a third-party auditing and risk management solution.


Securing Virtual Machines in Azure

In this webcast Nathan O’Bryan (MCSM/MVP) will cover some simple steps you can take to secure your virtual machines hosted in Azure. Learn more.


Solved: Advanced Data Classification and Leak Prevention in Office 365

In this webinar, we will look at the built-in DLP capabilities and demonstrate how you can apply advanced data classification tools provided by Symantec, McAfee, GTB or any of the leading DLP vendors. We will show how you can integrate them into policy workflows that manage share policies, interact with users and even incorporate your choice of file encryption.


How to Leverage Endpoint Data to Better Detect, Analyze and Predict Attacks

Join us to learn how to leverage endpoint data to make sense of the software capabilities, capabilities of code in memory, and even the attacker’s capabilities in order to better detect, analyze and PREDICT attacks BEFORE they occur. Learn more.


Don’t Just Survive Office 365 Tenant Migration – Master It!

Find out about best practices for quick and easy Office 365 tenant to tenant migration.


Netwrix Auditor Product Demo

See what the new Netwrix Auditor 9.6 has to offer, including how you can now classify and secure your data. Register today!

Duration: 1 Hour


Simplifying Cloud Access and Provisioning with a Federated Identity Service

This webcast explores how you can best manage identity in a hybrid environment that includes both on-prem and cloud-based identity sources, and how a federated identity service can simplify access and provisioning to the cloud. Read on.


Making Awareness Stick: Secrets to a Successful Security Awareness Training Program

Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, as he shares results-focused strategies and practical insight on how to build a world-class program. Learn more.


Fax Survival Guide: How to Avoid Disaster and Distress with Cloud Fax Services

Attend to learn how your company can forget about the headaches and hassles of fax by moving your operations to the cloud! Get the details.


4 Powerful Levers from Lenovo and Forrester to Implement Zero Trust

Join experts from Forrester, Lenovo and Microsoft as they discuss Forrester’s newly updated Zero Trust Extended framework and how the four core components of Lenovo’s Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT assets. Read on.


VIDEO: Optimize Your Connection to Oracle Cloud with Equinix

Learn how Oracle and Equinix help organizations to transform their business by integrating hybrid and multicloud environments to increase operational efficiency, enhance system processes, improve customer experiences and grow revenues. Learn more.

Duration: 1 Hour


7 IT Pro Secrets for Backing Up Office 365 Data

During this editorial webcast, experts from Redmond magazine walk through the best practices organizations are using to manage the Office 365 backup process. Join us.


What Happens When Office 365 Fails: Backup & Recovery

There is a widespread misconception that data created and stored in the cloud does not need to be backed up. When data is deleted or corrupted, companies face three major problems: lost data, lost time and lost cash. Learn about cloud data recoverability and how to take control of your Office 365 data at this webinar.


Deprovision Your Cloud Users Like a Pro

Your organization needs a comprehensive deprovisioning strategy to accompany your use of SaaS apps. In this session, Joe Ochs of Backupify shows you how easy user lifecycle management can be. Read on.


Deprovision Your Cloud Users Like a Pro

Your organization needs a comprehensive deprovisioning strategy to accompany your use of SaaS apps. In this session, Joe Ochs of Backupify shows you how easy user lifecycle management can be. Read on.


Best Practices for Pulling Identities Together: What Enterprises Are Doing Now to Stay Secure

Join Microsoft MVP Sander Berkouwer and come away from this session with actionable tactics for minimizing the gaps in your company's identity and authentication security posture. Learn more.


IT Asset Management: It’s More than Just a Spreadsheet of Machines!

Hear Dale Meredith, Microsoft MVP and Quest KACE’s James Rico as they discuss approaches and best practices of IT asset management and how building a solid asset management foundation can lead you down a path of unified endpoint management. Watch it now.


Netwrix Auditor Product Demo

In this technical webinar, we will guide you through the key functionality of Netwrix Auditor 9.5. You’ll learn how to use Netwrix Auditor more effectively to audit critical systems such as Active Directory, Windows file servers, Microsoft SQL Server and many more.

Duration: 1 Hour


A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.


A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.


Availability On-Premises, In The Cloud And On The Go with Veeam Agent for Microsoft Windows

Are you looking to find out more about avoiding downtime and data loss quickly and easily for Windows-based physical or public-cloud workloads? How can you bring more Availability to these workloads? Learn more.

Duration: 1 Hour


How the Cloud Drives Availability and Data Protection

Data is to this century what oil was to the last century – a driver of massive growth and change. This is not just about technology, but also new ways of doing business. And yet, Availability and data protection are among the biggest challenges facing IT leaders today, particularly with the recent increases in cyberattacks, such as ransomware, which have affected companies of all sizes. Learn more.

Duration: 1 Hour


Total Control and Protection of Email Data with Veeam Backup for Microsoft Office 365

Whether you have completely migrated to Microsoft Office 365, or have a hybrid exchange and Office 365 deployment, your business objectives remain the same. You must remain in control of your data and be able to backup and recover Microsoft Office 365 items at all times. Veeam® Backup for Microsoft Office 365 enables you to mitigate the risk of losing access to Office 365 email data and ensure Availability for users. Learn more.

Duration: 1 Hour


To The Cloud, From The Cloud, Within The Cloud

Learn from Mike Jones on what modern approaches exist to do what you want with your data in the cloud. Whether you are starting your cloud journey, already underway or not sure how to meet your technical and business requirements in a cloud-ready world, there is something for everyone on this webinar. Watch it now.

Duration: 1 Hour


Availability Outside of the Data Center

Take a deep dive into how Veeam® Agents deliver Availability for Windows-based physical servers and Linux-based server instances. We’ll discuss how to meet RPOs and reduce the risk of data loss for laptops and tablets outside the corporate network. We will also discuss how you can solve key challenges like managing remote offices, offering Backup as a Service and Disaster Recovery as a Service, and more.

Duration: 1 Hour


Hyper-V 2016: The Next Generation of Virtualization

Watch this interactive, demo-filled webinar that will provide all of the details on the largest announcements within Hyper-V 2016. Join Microsoft Cloud and Datacenter Management MVP, Clint Wyckoff, as he illustrates the pieces of Hyper-V 2016! Learn more.

Duration: 1 Hour


Security Configuration Management Best Practices

In this webinar, we’ll talk about some of the things you should be looking at when it comes to security configuration management. We’ll talk about some best practices, default tools used, as well as some very common misconfigurations that are seen in the “wild”, possibly even ones that you’ve configured!