Architecting for the New Normal: Lessons on Recovering from Petya

Skyport is helping customers recover from attacks like the recent Petya worm, and this has taught us some important lessons.  Find out more about these lessons at this webcast.

Date: 08/24/2017

Time: 11:00 am

Top 5 Strategies to Prevent Ransomware

Learn five strategies you can implement now to help you prevent ransomware.

Date: 09/12/2017

Time: 11:00 am

Peer to Peer: MaineHealth Migrates and Restructures Active Directory with Minimal Impact

Attend this webcast to learn how Paul Caron from MaineHealth successfully consolidate 21 domains, 25,000 users, and 18,000 Exchange mailboxes with minimal impact to his end users.

Date: 09/19/2017

Time: 11:00 am

8 Ways To Reduce Cost in Azure

In this webinar you will learn 8 ways to reduce your spend in Azure, including several pro-tips from both in-house and customer cloud experts. Register now and learn more.

Date: 08/24/2017

Time: 10:00 AM

Planning for Office 365 Disaster Recovery

In this Redmond TechAdvisor webcast, Nathan O'Bryan, Microsoft MVP, will talk about how Office 365 protects your data, and what you can do to prepare for the possible gaps in Microsoft’s protection strategy.

Date: 09/14/2017

Time: 11:00 am

Key Strategies to Prepare and Recover from Ransomware

Ransomware caused international turmoil in May, 2017, after growing into a chief cyber security threat in 2016. It is drawing everyone’s attention to the protection of their critical data and computer systems. Join us to learn about best practices for preparing against ransomware, including the 3-2-1-1 rule and other data protection strategies.

Date: 08/31/2017

Time: 11:00 am

Securing Your Office 365 Deployment

In this webcast Microsoft MVP and MCSM Nathan O'Bryan will provide tips to secure your Office 365 tenant.

Date: 08/24/2017

Time: 11:00 am

Preparing for the Cross Functional Impact of Office 365

If you are currently planning or executing a migration to Microsoft Office 365, you know it can be a big project with great potential benefits. But have you considered the impact this shift will have across your organization? Join us to learn how you can ensure a smooth Office 365 transition for all your teams, including security, IT, and compliance. Read on.

Date: 08/29/2017

Time: 11:00 am

Traditional Fax vs. Desktop Cloud Fax: 6 Reasons to Move to Cloud Faxing

When it comes to traditional faxing, there’s a lot left to be desired — which is why businesses are turning to desktop cloud faxing. Take part in this 20-minute webinar to find out why cloud fax services are gaining popularity over traditional fax operations. Learn more.

Date: 08/29/2017

Time: 11:00 AM

Duration: 20 Min

Today’s Workplace Is No Longer the Place To Be!

Listen to our industry experts to learn how to seamlessly transform to a digital workplace. They will talk about blue printing your digital transformation journey, what it takes to execute a seamless journey and how to manage user experience in a dynamic environment. Read on.

Date: 09/07/2017

Time: 11:00 am

On Demand

Cloud Broke Your Network Edge. How Do You Fix It?

Skyport Systems explores a common problem that enterprises have been facing since the advent of cloud: Their network perimeter was not built with cloud in mind. Learn how to re-architect a cloud-ready, hybrid-cloud edge, and become a cloud enabler. Watch now!

Duration: 1 Hour

Industry Trends Driving the Need for More Data Protection

IT Modernization continues to be top of mind for many organizations. While transformation to a modern data center promises many efficiencies, cost savings and benefits, certain questions ust be addressed before making that transformation. Watch now!

Duration: 1 Hour

How To Move Your Fax Operation to the Cloud

We feel your pain. You don’t have to stay with your underperforming and outdated faxing system. Watch this webinar to learn how your company can forget about the headaches and hassles of fax by moving your operations to the cloud!

Duration: 1 Hour

Ensuring Rock Solid Unified Endpoint Management

Join Microsoft MVP Nathan O’Bryan to learn how you can implement unified endpoint management (UEM) strategies that will allow you to manage all the devices connecting to your infrastructure.

Disaster Avoidance for the Cost-Conscious Organization

Join Microsoft MVP Tim Warner to learn the five requirements of disaster avoidance. You will leave this session armed with what you need to know to deploy an affordable data protection system with near zero downtime. Register today!

Enabling Employee Efficiency, Engagement, and Effectiveness with The Digital Workplace

So, what is a digital workplace and how can you benefit from one? Watch this webcast for a roadmap to a true digital workplace.

What You Must Do NOW To Prepare for the Future of Asset Management

This webinar discusses IT trends in 2017 and beyond that will impact IT Asset Management programs and strategies that will be helpful in preparing for these changes.

Ransomware: The Good, The Bad and Ugly

Businesses of all sizes have been hit by this danger, and the threat is only going to increase. But there is hope. Certified Ethical Hacker Dale Meredith will show you the tactics behind Ransomware and how you can stop an attack from happening in the first place.

Duration: 1 Hour

Smart Tips for Active Directory Security

From configuration settings to group management, there’s a slew of quick and easy fixes and changes you can make, and some major process changes that you can implement, to make your AD environment safer, more secure, and even more reliable. Join MVP and author Don Jones for a concise rundown of these high-impact tips and techniques. Your directory will thank you!

Overlooked Active Directory Security Holes - and How to Close Them

Join Microsoft MVP and author Don Jones for a look at 5 frequently overlooked security problems in Active Directory, and learn about the capabilities and processes you’ll need to put in place to eliminate them. Watch it now!

Duration: 1 Hour

Tales from the Trenches: How Active Directory Groups Got Us Hacked

Join Microsoft MVP Don Jones for a harrowing, true-life tale of terror. Don shares the anonymized details of a colleague whose organization was hacked, costing them over a quarter million in damages and mitigations, all traceable to a specific problem with their AD group management. Register now!

Duration: 1 Hour

Building the Next Generation Network: Identity as the Perimeter with Nexteer Automotive Corporation

Watch this video to learn how strong-yet-flexible multi-factor authentication allows companies to embrace cloud-based IT delivery where identity and authentication form the new security perimeter. Sign up now!

Duration: 1 Hour

Security Configuration Management Best Practices

In this webinar, we’ll talk about some of the things you should be looking at when it comes to security configuration management. We’ll talk about some best practices, default tools used, as well as some very common misconfigurations that are seen in the “wild”, possibly even ones that you’ve configured!

Windows 10 as a Service, Keeping Up with the Changing Landscape

In recent years, Microsoft has changed its strategy and its business model. Microsoft, the world’s largest software company, is no longer interested in selling software. What does that mean for IT and how can the enterprise adapt to the changing IT landscape? Find out in this Redmond TechAdvisor webcast.

Improving End-User Computing in a Data Center World: Protection, Performance and Productivity

Users just want to have a consistent and functional working environment. IT needs to go beyond traditional VDI solutions and find a means to provide users with the working environment they need, while doing so using a secure, scalable, and yet simplified means to deliver it. So, how do you give users protection, performance and productivity without increasing the burden on IT? Learn more now.

Duration: 1 Hour

Enterprise Applications: Going From Workload Worry to Predictable Performance

What IT needs is predictability, regardless of how the business – and the data center – change over time. So, how do you get predictable performance out of your Enterprise Applications? Watch now.

Duration: 1 Hour

Hyperconvergence and Managing the Modern Data Center: More Workloads, Less Work

Traditional data center models simply can’t keep up with business demands without heavily taxing IT. So, how can organizations ensure manageability as the modern data center grows? Watch now.

Duration: 1 Hour

How To Social Engineer Your End Users Into More Secure Behavior

In this webinar, you’ll learn the strategies and techniques that social engineers are finding success with. You’ll also learn how to implement an effective security awareness program that focuses on preventing socially engineered attacks and how to validate the results of your training with simulate phishing campaigns. Watch it now!

Duration: 1 Hour

Learn How To Protect Against Ransomware

One of the largest threats to IT departments today is ransomware. Listen to this Redmond webcast to learn how to protect your organization against these attacks. Microsoft MVP Nathan O'Bryan will discuss actionable tips you can use to ensure your data is protected from ransomware attacks. Watch it today.

Optimize Availability with Purpose-built Backup Appliances

Join experts from Storage Swiss and Veeam to learn more about the different types of PBBAs and how to choose industry-leading Availability solutions that’s storage-agnostic, cloud-ready and can support the demands of the always-on enterprise.

Duration: 1 hour

Beyond the Basics: Migrating to Office 365 with Advanced Tools

In this webcast, Microsoft MVP Mike Crowley will describe the tools and techniques used to tackle these types of projects.

Solving Your Top Database Security Challenges

Did you know that by 2020 1.7 megabytes of new information will be created every second for every human being on the planet?But with that volume of data comes great risk - both personal and organizational. Therefore, it is essential to understand the variety of data threats and solutions available. During this session, we will break down database security essentials and the various features and functionalities available to us in Microsoft SQL Server 2016 and how they can be employed to better secure your data and help you create a complete and proactive data security strategy.

Duration: 1 Hour

NEED FOR SPEED: Data Recovery in a Non-Stop World

This presentation by Jon Toigo, veteran DR planner and author of five books on disaster recovery and data protection, will provide a level set on the state of data recovery. Toigo will be joined by Quest to learn more about their leading edge data protection and rapid recovery solutions. Watch it now.

4 Ways Identity Can Improve Your Security Posture

Join this webinar to learn why identity must not simply be a "first step" but the foundation for the future of security as well as 4 ways to leverage identity to enhance your security posture. Learn more.

Reimagining Legacy Information Management and Protection

See how a next-generation scale-out storage solution seamlessly scales from a few TBs to PBs with zero configuration, delivers an all-flash storage solution for virtual environments and high performing backup/recovery at less than $.40/GB, and much more.

Achieving Availability in an Always-On Data Center

Join Nick Cavalancia, industry expert and founder of Techvangelism, and experts from Cisco and Veeam as they discuss the availability challenge in the modern data center, how hyperconvergence can help to achieve availability, and why backups play an equally critical role in maintaining an available data center. Learn more.

Catch It All: Adopt Office 365 With Modern Data Protection and Compliance Measures

Across organizations, Office 365 is accelerating the digital transformation. This transformation also includes many other popular SaaS applications. This means new ways of communication and collaboration. As employees feel empowered to achieve more, what new considerations does this means for you to ensure security, protect data, and mitigate compliance risk? Watch it now!

Duration: 1 Hour

GDPR Compliance Planning for Microsoft Environments

This webinar looks at the General Data Protection Regulation (GDPR) and its impact on Microsoft environments. Specifically, we look at how GDPR along with other future compliance directives impact Microsoft cloud, on premise and hybrid environments, as well as what you can do to be prepared before the deadline.

IT and Business Benefits of Cloud Faxing

Watch this webinar to learn how you can deploy faxing for your entire organization — with features like real-time status updates and 24/7 availability — quickly, easily and cost-effectively. Plus, find out how cloud services lay the foundation for data capture, workflow tools, postal mail automation and business process improvements that go far beyond fax.

Duration: 1 Hour

Migrate and Protect Workloads in Azure - What You Need to Know

Join Microsoft Cloud & Datacenter MVP Tim Warner and Zerto for an informal conversation on how you can use Azure as a disaster recovery site.

Take Me Out of the Loop: Getting Rid of Active Directory and Group Management

Remember how, when you were applying for your first IT job, you thought, “wow, I can’t wait to spend all day updating AD information and managing group memberships!” No? Microsoft MVP Don Jones is right there with you, and wonders why and how IT got saddled with this ridiculous, distinctly non-technical job task. Better yet, he’ll outline key capabilities you can implement to take yourself out of that rat race forever. Watch it now.

Take Me Out of the Loop: Getting Rid of Active Directory and Group Management

Remember how, when you were applying for your first IT job, you thought, “wow, I can’t wait to spend all day updating AD information and managing group memberships!” No? Microsoft MVP Don Jones is right there with you, and wonders why and how IT got saddled with this ridiculous, distinctly non-technical job task. Better yet, he’ll outline key capabilities you can implement to take yourself out of that rat race forever. Watch it now.

Tales from the Trenches: How AD Groups Got Us Hacked

Join Microsoft MVP Don Jones for a harrowing, true-life tale of terror. Don shares the anonymized details of a colleague whose organization was hacked, costing them over a quarter million in damages and mitigations, all traceable to a specific problem with their AD group management. Learn more.

Office 365 Security - How to Secure Access Control in Office 365 Environments

Moving to the cloud empowers your business – but it may weaken security. In this on-demand webast, get best practices for minimizing the risks of moving to the cloud. Watch now!

Duration: 1 Hour

How to Audit Office 365 and Exchange Online Privileged Operations and Mailbox Access

Moving Exchange to the cloud? It’s time to consider your compliance and security responsibilities. Watch this on-demand webcast for ways to keep your complex cloud or hybrid environment secure and in compliance. Watch now!

Duration: 1 Hour

Warned and Armed: How to Shield Your IT Infrastructure from Ransomware

Join our new webinar and learn how to detect the ransomware on time and stop it from spreading through your network!

How to Build a Hybrid-Cloud Edge Architecture

Learn how to easily and securely enable application deployment in hybrid cloud environments and how to make your infrastructure cloud ready. Find out how you can become a cloud enabler. Register now.

Predicting the Future of Endpoint Management in a Mobile World

Join Microsoft MVP Timothy Warner and KACE Sales Engineer Nick Morea to get a feel for looming changes in the endpoint management landscape over the next 6 months to 5 years and learn about imminent trends, risks and opportunities. Learn more.

Address GDPR Requirements with Netwrix Auditor

Watch this webinar recording, which is all about the GDPR and practical tips on how Netwrix Auditor can help you address its requirements. View now!

Duration: 1 Hour

Get Ahead of Your Windows 10 Migration

In this webinar, you’ll get practical advice on how to reduce complexity, ease migration challenges, and migrate users with minimal interruption during a Windows 10 migration. Learn more.

Live Webcast - VMware Backup: Best Practices and Strategies

Join Michael White and learn about the realities and challenges of the most widely used VMware backup strategies, the differences between image-based and file-based backups for VMware VMs and VMware backup best practices. Learn more.

How to Rapidly Deploy Active Directory

Join Greg Shields, author evangelist with Pluralsight, in this exploration into rapid deployment for Active Directory. Greg will show you two easy-to-generate scripts that use PowerShell Desired State Configuration to swiftly hydrate a test-ready Active Directory into existence. Learn more.

The Rise of Office 365 and Cloud Apps: Expanding Protection to All End-User Data

Join Dan Canning, of Microsoft, who’ll share details on Office 365’s benefits, adoption rate, and enterprise use cases; and Seyi Verma, from Druva, on the need to protect, manage, centralized and backup fragmented information across cloud apps and services. Read on.

Tips, Best Practices and Pitfalls for AD Group Management

Join MVP and author Don Jones for a concise look at some of the best practices and tips the industry has developed in a decade-plus of AD group management…and to learn about the group management pitfalls that still plague so many companies. Learn more.

How Skype for Business and Enterprise Mobility are Redefining Workplace Collaboration

Join Brent Kelly, Ph.D., Principal Analyst at KelCor for an illustration on how the integration of enterprise mobility solutions with Microsoft Skype for Business can improve employee collaboration and productivity. Read on.

Too Many Threats. Not Enough Defenses.

This webcast takes a strategic approach to IT threats from spear phishing and fraud to targeted attacks to insider threats. You’ll learn how to evaluate your approach to protect your company.

Defeating the Encrypted Threat!

Once you have seen what the bad guys have been up to today, you will be exposed to a crash course of security policy management and network security architecture design that will help prevent the breach of tomorrow.

Email Archiving, Compliance and Ransomware: How to Reduce Risk, Cost and Complexity

In this webinar, we’ll look at the key cost, compliance and risk-based challenges for midsize and decentralized organizations, with solutions for midsize and ROBO environments. Learn more.

Endpoint Security vs. Ransomware: The 2017 State of the Battle

In this informative webcast, join industry expert Nick Cavalancia, and Stu Sjouwerman from KnowBe4, as they share the results of KnowBe4’s 2017 Endpoint Protection Ransomware Effectiveness Report. You will receive an overview of the current state of ransomware, learn the use and effectiveness of methods in use today and explore practical ways to stop ransomware. Learn more.

SaaS-Based Print Management: Kill the Print Server

Join technology expert and founder of Techvangelism, Nick Cavalancia, and Jordan Pusey, Product Marketing Manager at PrinterLogic, as they explore and discuss the benefits of moving to the cloud to eliminate print servers and simplify print management.

So You've Migrated to Office 365. Now What?

Join Microsoft Cloud & Datacenter MVP Tim Warner and Quest Product Manager Shawn Barker as they break down, in clear language and with hands-on demos, how you can reach your learning curve with the Office 365 platform while preserving your sanity. Learn more.

Office 365 Best Practices That You Are Not Thinking About: Managing Security and Compliance

In this webcast Microsoft MVP Mike Crowley from Baseline Technologies will explain how to translate your existing security and compliance requirements to Microsoft’s cloud-based tools.

Reducing Risk in Application Deployment Lifecycle

Microsoft MVP Tim Warner outlines the problem and offers practical strategies for transitioning your application publishing infrastructure from a reactive to a proactive position. You'll learn new methods for scanning and verifying software, and how to publish the vetted apps to System Center Configuration Manager (SCCM) or to an enterprise app store to facilitate self-service. Learn more.

Architectural Decisions that Maximize Office 365 Benefits

In this session, you will get a deep dive on common pitfalls when deploying Office 365, why they are overlooked and how to avoid similar challenges. You'll also learn about real world use cases architected around best-of-breed technologies that enabled and accelerated Office 365 deployments. Find out more.

Replacing Your Disaster Recovery Site with Microsoft Azure: How to Get Started

In this session, Microsoft MVP Tim Warner explains in plain language what you need to think about in planning disaster recovery sites in the Microsoft Azure public cloud. Learn more.

Duration: 1.5 hours

Enforcing Modern Authentication Factors for Microsoft Office 365

Over the last 20 years, cyber security has evolved and now dominates the headlines. More than ever, users are accessing their messaging and productivity tools from untrusted networks, devices and workstations and providing multi-factor and analytics has never been more critical. On this webinar, Okta's Marc Jordan and Anat Shiwak discuss how to remove the identity barriers for your Office 365 migration while building a modern, secure foundation for your Office 365 migration and future cloud strategy that doesn't rely on legacy security tools.

Duration: 1 Hour

Office 365 Lifecycle Management Deep Dive

Customers migrating to Office 365 have complex requirements, such as having to work around unique user access and governance challenges that may involve their employees, customers, partners and providers. Solving these unique challenges while providing seamless access across your user populations is an issue many businesses face – but management can be achieved.

Duration: 1 Hour

Mitigating the Threat of Data Theft by Departing Employees

Every day, your employees access a wide variety of electronic information, ranging from trivial to important and highly confidential. However, your organization may be in jeopardy when one of these employees when leaving the company decides to grab sensitive data. Can you prevent this from happening? Register for this webcast and find out how!

Duration: 1 Hour

Top Five Office 365 Migration Headaches and How to Avoid Them

In this on-demand webcast, discover the top five Microsoft Office 365 migration challenges – and how to avoid them – so you have a seamless transition to with little or no business impact.

Duration: 1 Hour