Webcasts


Upcoming

Modernize Your Microsoft Business Applications

Join us for an in-depth look at why you should modernize and run Microsoft applications on AWS, Microsoft applications that can be run on AWS, how to get started with security and access, computing, databases and management services. Read on.

Date: 08/31/2016

Time: 11:00 am


How Phishing Has Become Office 365's #1 Security Risk

Join this live webinar to learn why hackers prefer targeting Office 365 users, why phishing is their weapon of choice, and how big the problem really is. Find out just how protected your users really are with Office 365 Advanced Threat Protection (ATP) activated, and why phishing attackers aren't the least bit deterred. See a live demonstration of actual phishing attacks bypassing ATP and how hackers are cashing in on Office 365 users through this highly effective attack method. Register now!

Date: 09/28/2016

Time: 11:00 AM

Duration: 1 Hour


Logo: Esker. Document Process Automation.

Simplification and Security: Building Your Business Case for Cloud Fax

As budgeting season has arrived, now is the perfect time to join our live webinar to discover the many benefits of faxing as a cloud service, and how you can build your case for deploying it throughout your entire organization — quickly, easily and cost-effectively. Plus, hear customer case studies, and learn how a faxing service lays the foundation to take your improvement efforts far beyond fax. Now is the time to make your case for taking faxing to the cloud! Register now!

Date: 09/20/2016

Time: 11:00 AM

Duration: 1 Hour


Logo: Veeam -It Just Works!

Planning to Succeed: Executing a BC/DR Strategy during a Digital Transformation

All too often, the changes in technology, environments, and business needs keep BC/DR somewhat stuck in the planning phase, never seeing the light of day. Without ever executing on and testing a plan, your organization’s availability is at risk.So, how do you move from planning to actually building and executing a strategy? Find out and register for this webcast!

Date: 10/11/2016

Time: 9:00 AM

Duration: 1 Hour


Logo: Veeam -It Just Works!

BC/DR & the Digital Transformation: Hope for the Best, Plan for the Worst

As businesses undergo the Digital Transformation, changes in environment, infrastructure, and the use of the cloud have created the need to shift the backup & recovery strategy. What was once a focus on recovering files or a server image now is more concerned with availability of services.o, what is the best way to leverage the transformation, ensuring business continuity? Register now and find out how!

Date: 09/27/2016

Time: 9:00 AM

Duration: 1 Hour


Logo: Veeam -It Just Works!

The Digital Transformation of Backup & Recovery: Changing Businesses, Changing Strategies

Businesses today are undergoing a fundamental change – the digital transformation. Once defined by 9-to-5, bricks & mortar, pen & paper, and hand & tool, businesses are replacing these old concepts with the need to be always-on, the leveraging of interconnected devices and users, all with an expectation of 24/7 access to data, applications, and systems… and zero downtime. So, as your business begins to transform, how does your backup strategy need to change? Register now and learn more.

Date: 09/13/2016

Time: 9:00 AM

Duration: 1 Hour


Logo: Redmond Tech Advisor

Data Protection for Modern Microsoft Environments

Your organization’s business depends on modern Microsoft environments – Microsoft Azure and new versions of Windows Server 2016, Microsoft Hyper-V, and Microsoft business applications. Join our webinar and learn how different data protection solutions protect your Microsoft environment. Register now!

Date: 09/08/2016

Time: 11:00 AM

Duration: 1 Hour


Microsoft Monitoring Reimagined

Microsoft apps are ubiquitous in every network and the consequences to your SLAs when they fail can be catastrophic. Any infrastructure monitoring solution should be able to monitor Microsoft solutions, but proactive problem resolution requires more than a basic up/down status. Join us to learn how reimagined Microsoft monitoring can improve your infrastructure’s health and help you find and fix problems fast. Register now!

Date: 09/22/2016

Time: 11:00 AM

Duration: 1 Hour


Logo: Centrify

Top 3 Urgencies Driving the Adoption of Multi-Factor Authentication

Many organizations have increased their cyber security spending to protect against the growing number of attacks – however, traditional network perimeter defenses are no longer viable. Attackers are exploiting passwords to gain access to businesses' networks, and take over from within. Join us to learn about how best to protect today’s hybrid IT environments. Sign up now!

Date: 08/25/2016

Time: 11:00 AM

Duration: 1 Hour


Logo: Dell Software

Windows Server 2016 and Active Directory

Join us for this interactive webinar to begin planning your journey to Windows Server 2016 and a new optimized AD deployment that is flexible, scalable and elastic, and enables resilient infrastructures.

Date: 09/13/2016

Time: 11:00 am


Bridging the Office 365 Security Gap

Migrating to the cloud poses new security challenges. Where does native Office 365 security fall short? How can you best address these gaps in O365 security? In this webinar we answer those questions and more. Read more!

Date: 09/28/2016

Time: 11:00 AM

Duration: 1 Hour


Mimecast

Office 365 Migrations and Beyond – Planning for Potential Risks

Join Microsoft MVP, Mike Crowley and Mimecast Chief Technology Officer, Neil Murray as they discuss an action plan for assessing migration risks of Office 365, a multi-layer security strategy to combat whaling, ransomware and other evolving threats, and the importance of two clouds for cyber resiliency. Read on.

Date: 09/08/2016

Time: 11:00 am


Metalogix

Secrets of Office 365 Storage Architecture Revealed

How can Office 365 support millions of users and still perform well? Join Paul LaPorte for a free webinar and discover how Microsoft improved on the SharePoint storage architecture to deliver Office 365 for today’s business and organizational needs. Read on!

Date: 08/30/2016

Time: 11:00 AM

Duration: 1 Hour


Logo: Redmond Tech Advisor

Why Secure Encryption Matters

Encrypting your data is becoming more and more important in a world where IT services are moving toward the cloud. In this third webcast in a series of six 30-minute sessions, we’ll explore cloud encryption strategies and what they mean to your organization.

Date: 09/07/2016

Time: 11:00 am


Okta

Office 365 Business Driven Provisioning

Join us as we explore how to take complex identity management requirements and make them manageable. We discuss how instead of relying on legacy tools Microsoft gives away, you can remove the identity barriers for your Office 365 migration while building a foundation from which to launch your entire future cloud strategy. Learn more.

Date: 09/14/2016

Time: 11:00 am


Metalogix

Dear Office 365, I Need Backup

When considering a move to Office 365, chances are you’re also building a backup strategy to support your new environment. Yet, is a backup solution enough to answer your organization’s growing Office 365 needs? Join Office 365 expert Dr. Steve Marsh to learn how to appropriately plan your backup strategy and proactively prepare for the next phase of your organization’s Office 365 journey. Sign up now!

Date: 09/15/2016

Time: 11:00 AM

Duration: 1 Hour


On Demand

Rackspace

Deploying Microsoft Private Cloud at Scale

In this webinar, Kent Kingery, Sr. Manager of Product and Engineering at Rackspace, paints a picture of the private cloud experience using Microsoft technologies, and what the Microsoft private cloud experience looks like at scale in production.


Mimecast

There Will Be Attacks – Snap Out Of It!

The threat of ransomware, spear-phishing, whaling and socially-engineered email attacks is real. You've heard about email-based attacks on the news. But it can't happen to your company, right? Snap out of it! Register now!

Duration: 1 Hour


Logo: Esker. Document Process Automation.

Order Management for the Modern Age: Why It Pays to Go Paperless

An increasing number of organizations that were manually processing inbound sales orders to their systems seem to have found their answer — order processing automation. Register for the webinar, Order Management for the Modern Age, as Esker explores how an ERP-integrated solution can help any business eliminate the manual pains of fax and email order processing. Learn more.

Duration: 1 Hour


Logo: Redmond Tech Advisor

The Evolution of SSL/TLS Certificates

SSL is one of the foundational technologies on which the internet is built. In this second webcast in a series of six 30-minute sessions we’ll dive into TLS. Microsoft MVP Nathan O’Bryan will cover how to properly implement protection for your systems in addition to real world tips and practical lessons learned for protecting your data in the cloud. Sign up now!


Logo: Redmond Tech Advisor

Best Practices for Managing SSL/TLS Certificates

SSL is one of the foundational technologies on which the internet is built. Join Microsoft MVP Nathan O’Bryan as he explores how to properly implement protection for your systems in addition to real world tips and practical lessons learned for protecting your data in the cloud. Read on.


Imanami

The Real Cost of Managing Active Directory Groups

In this interactive webcast, join industry experts as they discuss what’s really involved in managing AD Groups, how to calculate the cost of Group Management, is there tangible savings in automating AD Group Management and much more.


Metalogix

SharePoint 2016: Governance Makes a Comeback!

Join this webinar to learn about the strengths and weaknesses of the new capabilities within SharePoint 2016 and why 2016 is the year to fully embrace SharePoint governance. Read on.


Metalogix

SharePoint 2016 Migration Success Takes Three Actions

Your successful migration to SharePoint 2016 takes three actions: analysis, optimization and planning. It also takes a lot of questions that require answers. What do you have? What do you move? What do you archive? What problems might occur? What do users expect? In this webcast, you’ll learn what to ask and how to find answers. Read on.


Logo: Observe IT

Insider Threat Management Program Guide

Insider Threat Management Program Guide – A Guide for Initiating, Developing, and Implementing Your Program.


Microsoft Office 365 Security: Beyond the Basics

Advanced security challenges like changing data privacy laws, secret government data requests, and the looming possibility of a cloud provider security breach are areas not covered natively by Microsoft’s cloud solution. Join Microsoft MVP Nathan O’Bryan and Vaultive’s VP of Product Marketing, Doug Lane, as they discuss when and how you can use third-party tools to meet your organization’s security requirements and confidently migrate to Office 365. Learn more.

Duration: 1 Hour


Five Ways Dell SonicWALL’s Secure Mobile Access Keeps Mobile Employees and Data Safe

Join Mark Hewett and Steven Sanderson for this live, interactive webcast to learn how you can manage the proliferation of BYOD devices in your workplace and in the field. Learn more.


Logo: Veeam -It Just Works!

Understanding DRaaS: Trends, Challenges and Best Practices

Disaster Recovery as a Service (DRaaS) is becoming a more powerful option for organizations of all sizes when compared to traditional DR sites. Join us as we explore trends, challenges and best practices. Learn more.


Logo: Esker. Document Process Automation.

Freedom from Fax: Why IT Departments Love the Cloud

Fax isn’t exactly the most modern form of business communication. But what many IT departments are realizing is this: It’s not fax that’s behind the times, it’s the execution. Register for our live webinar to discover why cloud faxing is catching on as a faster, cost-effective and more reliable alternative to fax machines and fax servers. Sign up today!

Duration: 1 Hour


Rackspace

Hybrid Clouds: Azure Real-World Use Cases

Join featured speakers, Rackspace and 10th Magnitude on a round table discussion on the concepts of cloud form factors leading to hybrid cloud, the advantages of using hybrid cloud technologies, and a look at how the Microsoft Azure platform enables efficient and effective hybrid cloud computing. See how organizations are reducing complexity and management costs by leveraging managed hosting in hybrid cloud environments through real-world use cases.


Rackspace

Why you should care about Identity-as-a-Service (IDaaS): An Expert’s perspective

Join featured speakers, Rackspace and 10th Magnitude on a round table discussion on the concepts of cloud form factors leading to hybrid cloud, the advantages of using hybrid cloud technologies, and a look at how the Microsoft Azure platform enables efficient and effective hybrid cloud computing. See how organizations are reducing complexity and management costs by leveraging managed hosting in hybrid cloud environments through real-world use cases.


Logo: Flexera Software

Moving to Office 365? What You Need to Know!

Many organizations are planning on making the move to Microsoft Office 365, but there are some key things to consider before you make the switch. Our guest speaker, Martin Thompson of the ITAM Review, will discuss the role of IT asset management (ITAM) in major IT transformation projects such as this.

Duration: 1 Hour


Logo: Dell Software

Best Practices for Migrating PSTs and Email Archives to Office 365

Microsoft MVP Mike Crowley will describe the challenges of wrangling this data and offer strategies and tips for migrating PSTs and other archives to Office 365 through the use of free as well as for-purchase migration tools. Now available on-demand!

Duration: 1 Hour


Imanami

10 Things You Should be Asking Active Directory… and How to Get Answers

Running a periodic “health check” on AD should involve more than just checking the replication topology. There are also key questions you should be asking about the status of groups, your overall security situation, missing AD information, and more. Knowing the answers can help you avoid common security problems and operational pitfalls - and getting those answers can be easier than you think. Read on.


Building a Better Business (Process) with SharePoint

Learn how you can turn your SharePoint system into a powerful tool for creating velocity in your organization. Robert Bogue will discuss approaches for form creation, workflow options, and how you can reduce the friction of your internal processes by automating business process applications for SharePoint with K2. Register now and learn more.

Duration: 1 Hour


Protecting Your Data in an Evolving Technological World

Compliant and scalable data security solutions are essential to safeguarding your data from unauthorized intrusion. With advancements in software and hardware, the technology world is evolving exponentially. It might even seem impossible to keep pace with your security and compliance demands without having to re-engineer your application, database or infrastructure. Learn how using a third party can help! Register now!

Duration: 1 Hour


Logo: CloudFlare

5 Ways to Secure Your Cloud Investment

In this webinar, we'll discuss developing a strong information security foundation at the user and application level, creating a perimeter of defense by limiting access to systems through whitelisting/blacklisting and much more. Join us!

Duration: 1 Hour


Logo: Dell Software

Endpoint Systems Management: Covering the Full Lifecycle

In this 30-minute webcast, join industry expert and founder of Techvangelism, Nick Cavalancia, and Brandon Whitman from KACE, as they discuss ESM and KACE’s K1000 and K2000 appliances from a few perspectives. Read on!


Automating App Deployment Ain’t Easy: Busting Datacenter and User Experience Myths

Join Packet Pushers Ethan Banks and Citrix NetScaler VP’s of Product & Engineering for this interactive myth busting discussion and live demo of NetScaler CPX & SD-WAN. Read on.


Unraveling the Mysteries of Tenant-to-Tenant Migrations

Join the experts Nathan O’Bryan (MCSM: Messaging and MVP: Office 365) and Gary Steere (Microsoft Exchange Server: MCM and MVP) as they candidly discuss the essential questions that the admin will need to answer before heading into a tenant-to-tenant migration. Register now.


Logo: Dell Software

VSANs, VVOLs, and SSDs: Optimized Storage for Your Virtual Infrastructure

Join Pluralsight's Greg Shields for a discussion on the increasing importance of VSANs, VVOLs, and SSDs in today’s virtual infrastructures.


Logo: Esker. Document Process Automation.

Fax Survival Webcast: How to Avoid a Doomsday Disaster with Cloud Fax Services

Register for this free webinar to learn how your company can forget about the headaches and hassles of fax by moving your operations to the cloud! Learn more.

Duration: 1 Hour


Okta

Office 365 Business Driven Provisioning Deep Dive

In this webcast, we explain how to take complex identity management requirements and make them manageable. We discuss how instead of relying on legacy tools Microsoft gives away, you can remove the identity barriers for your Office 365 migration while building a foundation from which to launch your entire future cloud strategy. Join us!

Duration: 1 Hour


logo

Protect Your Office 365 Email from Three Key Threats

Hear about key requirements for catching email spoofs, emerging and zero day threats, and even commodity threats. Considerations for threat visibility and response requirements will also be explored during this free webcast.


Logo: Dell Software

IAM as a Service (IAMaaS) is a reality today. Find out if it’s right for your organization.

Explore if identity and access management as a service (IAMaaS) is right for you? Discover how IAMaaS measures up against traditional on-premise solutions, and determine which scenario is the right fit for your organization.


Logo: Dell Software

Understanding Identity and Access Management Compliance Requirements for PCI, HIPAA, SOX and ISO 27001

Discover the role that IAM plays in compliance and security. In this webcast, you’ll hear how about the latest PCI, HIPAA, SOX and ISO 27001 requirements.


Logo: Dell Software

Understanding the NIST Cybersecurity Framework: Different, Scalable and Practical

In this on-demand webcast, learn about the National Institute of Standards and Technology’s (NIST’s) cybersecurity framework, A NIST expert walks you through the Framework for Improving Critical Infrastructure Cybersecurity.


Logo: Dell Software

What You Need to Know about Active Directory Hybrid Governance

In this webcast, we will explore exactly what a hybrid directory environment looks like and what it takes to make it secure, manageable and available. We will talk through detailed explanations and checklists for improving your security posture and keeping on-premises AD from becoming the Achilles' heel of your hybrid directory environment. Learn more.


Logo: Redmond Tech Advisor

Is Hyper-Converged Infrastructure Right for Your Business?

In this Redmond TechAdvisor we will look at some of the myths and realities of hyper-converged infrastructure solutions. We will also discuss applications workload, deployment and financial considerations and much more. Read on.


Logo: Dell Software

Anatomy of an Insider Threat—Protecting Active Directory is Key

Learn about the five key insider threat trends facing organizations, the importance of protecting your AD and the best ways to achieve that goal.


Logo: Dell Software

Top 10 Indicators of Tampering with Privileged Accounts

Watch this on-demand webcast to see how to tell when your privileged accounts are being tampered with, and how administrative authority can be obtained or stolen at each level.


Logo: Dell Software

Protecting AD from Malicious and Accidental Destruction

Find out how to deal with the four types of AD disasters, prepare for and execute a successful forest recovery and automatically protect your AD. Watch this on-demand webcast.


Logo: SonicWALL

How To Fight Against Shape Shifting Type Threats

Join us to learn simple steps to protect your organization from advanced hacking tools. We’ll discuss the recently released 2016 Dell Security Annual Threat Report, and explore top threat findings from 2015, current and emerging threats and key recommendations to defend against advanced adversaries and threats.


logo

IT Security Fundamentals

Fifty-five percent of companies surveyed did not experience a breach in 2015 and were successful by implementing a handful of vital security technologies and best practices. Join this webcast to explore the surprising security research results and get practical recommendations that you can use to improve your IT security posture this year.


Virtual Data + Data Masking = The New Approach to Security

A new, data-centric approach to security is taking hold. Rather than establishing perimeter defenses in hopes of repelling breach attempts, security-minded organizations are investing in technologies that protect the interior—the data itself. Learn more!