Webcasts


Upcoming

Okta

Office 365 Business Driven Provisioning Deep Dive

In this webcast, we explain how to take complex identity management requirements and make them manageable. We discuss how instead of relying on legacy tools Microsoft gives away, you can remove the identity barriers for your Office 365 migration while building a foundation from which to launch your entire future cloud strategy. Read on.

Date: 06/22/2016

Time: 11:00 am


Logo: Dell Software

VSANs, VVOLs and SSDs. Oh, my!

Industry experts discuss the increasing importance of VSANs, VVOLs, and SSDs in today’s virtual infrastructures.

Date: 06/28/2016

Time: 11:00 am


Logo: Esker. Document Process Automation.

Fax Survival Webcast: How to Avoid a Doomsday Disaster with Cloud Fax Services

Register for this free webinar to learn how your company can forget about the headaches and hassles of fax by moving your operations to the cloud! Learn more.

Date: 06/28/2016

Time: 11:00 AM

Duration: 1 Hour


Imanami

The Problem(s) with Active Directory Groups: A Real-World Discussion

Join in on the discussion with industry expert and founder of Techvangelism, Nick Cavalancia, and Jonathan Blackwell from Imanami, as they engage with you to discuss how to get the most out of AD groups. They'll discuss how to delegate and enforce ownership and management, dynamic group needs and integration with AAD, SSO, and federated services. Learn more.

Date: 06/15/2016

Time: 11:00 am


logo

Protect Your Office 365 Email from Three Key Threats

Hear about key requirements for catching email spoofs, emerging and zero day threats, and even commodity threats. Considerations for threat visibility and response requirements will also be explored during this free webcast.

Date: 06/23/2016

Time: 11:00 am


Logo: CloudFlare

5 Ways to Secure Your Cloud Investment

While many businesses are eager to take advantage of the increased efficiencies and improved cash flow the cloud offers, security requirements inherited from the traditional on-premise model can make migrating to the cloud computing a painful journey. CloudFlare provides a suite of security features that will help IT professional tackle complex information security issues with relative ease. Register now and learn more!

Date: 06/21/2016

Time: 11:00 AM

Duration: 1 Hour


Logo: Dell Software

What You Need to Know about Active Directory Hybrid Governance

In this webcast, we will explore exactly what a hybrid directory environment looks like and what it takes to make it secure, manageable and available. We will talk through detailed explanations and checklists for improving your security posture and keeping on-premises AD from becoming the Achilles' heel of your hybrid directory environment. Learn more.

Date: 06/21/2016

Time: 11:00 am


Logo: Observe IT

Get expert advice on how to engage with an insider threat after a security incident

This webinar will show insider threat program managers and security experts how to proactively interview an insider threat and communicate with Human Resources after a security incident.

Date: 06/02/2016

Time: 1:30 PM

Duration: 1 Hour


On Demand

Logo: Dell Software

IAM as a Service (IAMaaS) is a reality today. Find out if it’s right for your organization.

Explore if identity and access management as a service (IAMaaS) is right for you? Discover how IAMaaS measures up against traditional on-premise solutions, and determine which scenario is the right fit for your organization.


Logo: Dell Software

Understanding Identity and Access Management Compliance Requirements for PCI, HIPAA, SOX and ISO 27001

Discover the role that IAM plays in compliance and security. In this webcast, you’ll hear how about the latest PCI, HIPAA, SOX and ISO 27001 requirements.


Logo: Dell Software

Understanding the NIST Cybersecurity Framework: Different, Scalable and Practical

In this on-demand webcast, learn about the National Institute of Standards and Technology’s (NIST’s) cybersecurity framework, A NIST expert walks you through the Framework for Improving Critical Infrastructure Cybersecurity.


Logo: Redmond Tech Advisor

Is Hyper-Converged Infrastructure Right for Your Business?

In this Redmond TechAdvisor we will look at some of the myths and realities of hyper-converged infrastructure solutions. We will also discuss applications workload, deployment and financial considerations and much more. Read on.


Logo: Dell Software

Protecting AD from Malicious and Accidental Destruction

Find out how to deal with the four types of AD disasters, prepare for and execute a successful forest recovery and automatically protect your AD. Watch this on-demand webcast.


Logo: Dell Software

Top 10 Indicators of Tampering with Privileged Accounts

Watch this on-demand webcast to see how to tell when your privileged accounts are being tampered with, and how administrative authority can be obtained or stolen at each level.


Logo: Dell Software

Anatomy of an Insider Threat—Protecting Active Directory is Key

Learn about the five key insider threat trends facing organizations, the importance of protecting your AD and the best ways to achieve that goal.


Logo: Dell Software

Ten tasks to automate in active directory to save time, prove compliance and ensure security

Explore key Active Directory topics, including user-logon naming conventions, why you should standardize department names and other organizational attributes, and how to approach provisioning and deprovisioning accounts.

Duration: 01:46:36


Logo: Dell Software

Ensuring the success of your IAM Projects

Leverage Dell’s knowledge gleaned from partnering and supporting hundreds of companies and real-world projects. Discover the keys to a successful, affordable and sustainable IAM implementation.

Duration: 71 Minutes


logo

Exchange Availability and Performance in Virtualized Environments

Do you know the health of your Microsoft Exchange enterprise? Don’t wait for your users to start flooding the helpdesk with tickets. Find out how you can ensure optimal availability and performance for Exchange in your virtualized environments today.


logo

Holistically Manage and Solve Virtualization Performance Issues

Your data infrastructure — servers, storage, hardware, software and virtualization — all exists to support the applications that drive your business’s profits. However, you could be operating at maximum capacity and still yield poor productivity for your business. Find out why.


logo

VM Optimization: Find the Balance

Find out how you can optimize your VMware implementation to avoid under- or over-utilization — and boost performance.


How To Fight Against Shape Shifting Type Threats

Join us to learn simple steps to protect your organization from advanced hacking tools. We’ll discuss the recently released 2016 Dell Security Annual Threat Report, and explore top threat findings from 2015, current and emerging threats and key recommendations to defend against advanced adversaries and threats. Read on.


logo

IT Security Fundamentals

Fifty-five percent of companies surveyed did not experience a breach in 2015 and were successful by implementing a handful of vital security technologies and best practices. Join this webcast to explore the surprising security research results and get practical recommendations that you can use to improve your IT security posture this year.


Virtual Data + Data Masking = The New Approach to Security

A new, data-centric approach to security is taking hold. Rather than establishing perimeter defenses in hopes of repelling breach attempts, security-minded organizations are investing in technologies that protect the interior—the data itself. Learn more!


Logo: Esker. Document Process Automation.

IT and Business Benefits of Cloud Faxing

Join us for this webinar to learn how you can deploy faxing for your entire organization — with features like real-time status updates and 24/7 availability — quickly, easily and cost-effectively. Register now!

Duration: 1 Hour


LogicNow

Beyond Locky: Developing a Ransomware Incident Response Plan

It’s every IT professional’s nightmare – a frantic call from a user that indicates they can’t access mission-critical files on their device. And what’s worse, they are being held ransom for cash by the bad guys. Learn how to protecting your networks and data.


Logo: Observe IT

Top Employee Security Mistakes that Put Your Data at Risk

Actionable Expert Advice for Protecting Your Enterprise from Today’s Biggest Risk to Confidential Data. This webinar will show you how to minimize insider risk and proactively prevent the leakage of data from negligent employees.

Duration: 1 Hour


Logo: TransVault

Mastering the Migration Series: Shift those PSTs to the Cloud with Confidence!

By attending this webcast you will hear how TransVault Insight addresses the many varied issues involved in tackling PSTs, which include tracking them down; understanding what’s inside them; minimizing network impact; avoiding duplicates and ensuring a seamless user experience - all while getting the assurance you need that your mass PST move is being fully tracked and audited, and is in line with your business compliance and data retention remit. Register today!

Duration: 1 Hour


Logo: Redmond Tech Advisor

Disaster Recovery: Mitigating Risks with Modern Technologies

This Redmond supercast will provide insights intended to help you think through the potential risks of new technology and apply the latest protective measures to avoid outages and to cope with interruptions that you can’t avoid. Watch it now!

Duration: 1 Hour


Logo: Dell Software

Simplify and Streamline Your Virtual Infrastructure

In this webcast, we’ll discuss ways to simplify your data center operations, speed deployments and reduce operational costs.


Imanami

Active Directory Group Management: How to Take Yourself Out of the Loop

What would you need to bring into your environment in order to get group management off of your back? Find out in this informative webcast with Don Jones.

Duration: 1 Hour


SSL Best Practices: Domain Protection

Join us as we cover key best practices for protecting your domain phishing attacks against the customer’s clientele and unsuspecting internet users. Register now!

Duration: 1 Hour


Logo: Esker. Document Process Automation.

Taking Control of the Order-to-Cash Cycle with Automation

When paper is passed around and orders are handled manually, the OTC process is slow and expensive, stopping organizations from meeting their performance goals. Join this webinar as we explore the benefits of automating AR and order processing. Register!

Duration: 1 Hour


Logo: Dell Software

Ensuring the success of your IAM Projects

Leverage Dell’s knowledge gleaned from partnering and supporting hundreds of companies and real-world projects. Discover the keys to a successful, affordable and sustainable IAM implementation.

Duration: 71 Minutes


Logo: Dell Software

Making the Cloud Work for You: Rapid Recovery, Replication, DR and Microsoft Azure

Organizations are leveraging cloud-based services to implement a sound, pay-as-you-grow strategy for backup retention and disaster recovery. Learn more!


Logo: BridgeWays

Get proactive remote monitoring in a SCOM-powered, multi-tenant SaaS solution: Tibanna

The takeaways from this webinar will be how Tibanna’s Change Management system can allow users and managers to follow a structured, detailed, web-based yet simple process for Change Management.

Duration: 1 Hour


Imanami

The Role of AD Group Management & Self-Service in Your Security Strategy

When you hear “security strategy” you likely think of protecting against vulnerabilities and attacks. But there’s an even greater threat looming within your Active Directory – Groups. So, how does managing groups play into your security strategy? Find out. Register now!

Duration: 1 Hour


Be Prepared for Ransomware

Business halts…your files are inaccessible…you’re losing money, but your only option is to pay even more to a criminal who is holding your data for ransom. Join this webcast to learn how ransomeware can impact your business!

Duration: 1 Hour


Logo: Dell Software

Password hashing prevent risk security breach

Watch this on-demand webcast to learn about strategies and tools that make it easy to prevent hashes from being harvested, detect the use of harvested hashes and address the target of many attacks (privileged accounts).

Duration: 01:45:00


Logo: Dell Software

Understanding Privileged User Compliance Requirements for PCI, HIPAA, SOX and ISO 27001

Although SOX represents only a portion of the total scope of compliance obligations faced by most organizations, it is a critical piece. Read this tech brief to see how to achieve and prove SOX compliance – along with other security mandates – with the right solutions. Plus, benefit from the security compliance insights of an auditor.

Duration: 01:48:00


Okta

Office 365 Provisioning and SSO Deep Dive

In this webcast, we’ll explain how to take complex identity management requirements and make them manageable. We’ll discuss how instead of relying on legacy tools Microsoft gives away, you can remove the identity barriers for your Office 365 migration while building a foundation from which to launch your entire future cloud strategy. Learn more!

Duration: 1 Hour


Logo: colligo

Enterprise Mobility: Awakening the SharePoint Force.

This webinar explores 3 current challenges in mobile content management and present strategies to tackle them the right way with SharePoint. View now on-demand!

Duration: 1 hour


Logo: Dell Software

Best Practices for Migrating to Exchange 2016 and Office 365

Learn the key steps and best practices you need to follow to ensure a successful migration such as performing a thorough pre-migration assessment, why a streamlined Active Directory is critical, how to evaluate migration solutions and more!


Logo: Dell Software

Delivering Business Value with IT Service Management

Please join Robert Young, research director, IT Service Management and Client Virtualization, IDC who will share how companies are leverage new service management trends and best practices to deliver IT-as-a-service, optimizing both IT and business productivity. Learn more.

Duration: 45 minutes


logo

What to Know about Exchange 2016, SharePoint 2016 and Office 365

Join a panel of experts as they discuss the changes to Microsoft Exchange 2016 and SharePoint 2016. Whether you’re debating migrating, evaluating Office 365 or simply satisfying your curiosity, this webcast is for you.

Duration: 61 Minutes


Logo: Dell Software

Active Directory Disasters — Plan ahead!

Don’t let an Active Directory disaster ruin your vacation. Watch this webcast to learn more about AD planning and recovery options.


Mimecast

Email Security: It’s Time to Shut the Front Door

Without proper security measures in place, email represents one of the easiest ways for malware to “walk right in” the front door of your organization. With spear-phishing attacks on the rise, and users still falling prey to malicious email content, it’s time organizations include email security as part of their overall security posture before they become the unwitting victim. Learn more!

Duration: 1 Hour


Logo: Veeam -It Just Works!

Everything You Need to Know About Microsoft Nano Server

Join Mike Resseler for a webinar session to discuss the advantages and potential use-cases, and discover how to start with Nano to take all of the benefits to your data center. Read on.


Eliminate Print Servers - Mastering Print Management in a Highly Distributed Environment

Join technology experts as they discuss and investigate ways to simplify print management and eliminate print servers in the modern era. Register now!

Duration: 1 Hour


Logo: Redmond Tech Advisor

Mobility & Office 365: How to Enable Your Mobile Workforce with Office 365

Join Nathan O’Bryan as he explores some of the features of Office 365 that enable a mobile workforce to function as a cohesive team without the need for physical proximity. During this webcast Nathan will demonstrate how Office 365 features allow him to work mobile. Register now!

Duration: 1 Hour


Logo: colligo

4 Email Problems That SharePoint Can Solve Now

In this webinar, industry experts take a look at common email management problems and how you can solve them from a technology and policy perspective.

Duration: 49 Minutes


IT Security: Why One Layer of Defense Is Not Enough

Join security expert, Ian Trump, as he explores cybercrime and its impact on small and mid-sized businesses, how businesses need to protect themselves from all angles and why using layered security is crucial to ensure it doesn’t happen to you.


Logo: Netwrix

How to Survive an IT Audit – and Thrive Off It!

In this webinar, you’ll learn about top control processes that should be taken care of as matters of best practice or as core components of any IT compliance.


Logo

Crack the Code To Cloud App Security, Deployment, User Experience and Support

Get Office 365 and cloud app deployment best practices from Rightpoint’s experience deploying hundreds of enterprise cloud application projects. You will also learn the leading cause of security breaches and proven approach to meeting security and compliance.


Logo: Box

Secure Mobile Collaboration with Sharepoint and Box

This session examines how Microsoft SharePoint environments handle file sharing and collaboration, and some of the challenges businesses face adapting these legacy technologies to a new, more mobile world.


Logo: Box

Collaboration + Security using Office 365 and Box

Microsoft Office 365 gives your users the power to collaborate on documents from anywhere, which is great for businesses, but IT departments need to work hard to keep data secure no matter where it lives.