Webcasts


Upcoming

Virtual Data + Data Masking = The New Approach to Security

A new, data-centric approach to security is taking hold. Rather than establishing perimeter defenses in hopes of repelling breach attempts, security-minded organizations are investing in technologies that protect the interior—the data itself. Learn more!

Date: 05/17/2016

Time: 11:00 am


LogicNow

Beyond Locky: Developing a Ransomware Incident Response Plan

It’s every IT professional’s nightmare – a frantic call from a user that indicates they can’t access mission-critical files on their device. And what’s worse, they are being held ransom for cash by the bad guys. Learn how to protecting your networks and data.

Date: 05/18/2016

Time: 9:00 am


Logo: Redmond Tech Advisor

Is Hyper-Converged Infrastructure Right for Your Business?

In this Redmond TechAdvisor we will look at some of the myths and realities of HCI, CI, CiB and AiO solutions. We will also discuss applications workload, deployment and financial considerations and much more. Read on.

Date: 05/11/2016

Time: 10:00 am


Logo: Redmond Tech Advisor

Disaster Recovery: Mitigating Risks with Modern Technologies

This Redmond supercast will provide insights intended to help you think through the potential risks of new technology and apply the latest protective measures to avoid outages and to cope with interruptions that you can’t avoid. Register!

Date: 05/05/2016

Time: 11:00 AM

Duration: 1 Hour


Logo: Dell Software

Simplify and Streamline Your Virtual Infrastructure

In this webcast, we’ll discuss ways to simplify your data center operations, speed deployments and reduce operational costs.

Date: 05/17/2016

Time: 10:00 AM


Imanami

Active Directory Group Management: How to Take Yourself Out of the Loop

What would you need to bring into your environment in order to get group management off of your back? Find out in this informative webcast with Don Jones.

Date: 05/12/2016

Time: 11:00 AM

Duration: 1 Hour


SSL Best Practices: Domain Protection

Join us as we cover key best practices for protecting your domain phishing attacks against the customer’s clientele and unsuspecting internet users. Register now!

Date: 05/24/2016

Time: 11:00 AM

Duration: 1 Hour


On Demand

logo

Exchange Availability and Performance in Virtualized Environments

Do you know the health of your Microsoft Exchange enterprise? Don’t wait for your users to start flooding the helpdesk with tickets. Find out how you can ensure optimal availability and performance for Exchange in your virtualized environments today.


logo

VM Optimization: Find the Balance

Find out how you can optimize your VMware implementation to avoid under- or over-utilization — and boost performance.


logo

Holistically Manage and Solve Virtualization Performance Issues

Your data infrastructure — servers, storage, hardware, software and virtualization — all exists to support the applications that drive your business’s profits. However, you could be operating at maximum capacity and still yield poor productivity for your business. Find out why.


Logo: Observe IT

Top Employee Security Mistakes that Put Your Data at Risk

Actionable Expert Advice for Protecting Your Enterprise from Today’s Biggest Risk to Confidential Data. This webinar will show you how to minimize insider risk and proactively prevent the leakage of data from negligent employees.

Duration: 1 Hour


Logo: Esker. Document Process Automation.

Taking Control of the Order-to-Cash Cycle with Automation

When paper is passed around and orders are handled manually, the OTC process is slow and expensive, stopping organizations from meeting their performance goals. Join this webinar as we explore the benefits of automating AR and order processing. Register!

Duration: 1 Hour


Logo: Dell Software

Ensuring the success of your IAM Projects

Leverage Dell’s knowledge gleaned from partnering and supporting hundreds of companies and real-world projects. Discover the keys to a successful, affordable and sustainable IAM implementation.

Duration: 71 Minutes


Logo: Dell Software

Making the Cloud Work for You: Rapid Recovery, Replication, DR and Microsoft Azure

Organizations are leveraging cloud-based services to implement a sound, pay-as-you-grow strategy for backup retention and disaster recovery. Learn more!


Logo: Dell Software

Ensuring the success of your IAM Projects

Leverage Dell’s knowledge gleaned from partnering and supporting hundreds of companies and real-world projects. Discover the keys to a successful, affordable and sustainable IAM implementation.

Duration: 71 Minutes


Logo: Dell Software

Ten tasks to automate in active directory to save time, prove compliance and ensure security

Explore key Active Directory topics, including user-logon naming conventions, why you should standardize department names and other organizational attributes, and how to approach provisioning and deprovisioning accounts.

Duration: 01:46:36


Logo: Observe IT

Insider Threat Law: Balancing Privacy and Protection

Explore the legal parameters of implementing an insider threat program, including the application of employee monitoring tools. Learn how to protect your corporate assets while respecting the privacy of your employees.

Duration: 1 Hour


Logo: BridgeWays

Get proactive remote monitoring in a SCOM-powered, multi-tenant SaaS solution: Tibanna

The takeaways from this webinar will be how Tibanna’s Change Management system can allow users and managers to follow a structured, detailed, web-based yet simple process for Change Management.

Duration: 1 Hour


Logo: colligo

Elevating Your Remote Support Game

Hear industry expert and founder of Techvangelism, Nick Cavalancia, as he discusses changes in support trends, expectations of the support role, and rethinking your support strategy and the tools to do so.

Duration: 1 hour


Imanami

The Role of AD Group Management & Self-Service in Your Security Strategy

When you hear “security strategy” you likely think of protecting against vulnerabilities and attacks. But there’s an even greater threat looming within your Active Directory – Groups. So, how does managing groups play into your security strategy? Find out. Register now!

Duration: 1 Hour


Logo: QuickBase

How EMC and FedEx Overcame SharePoint Limitations

In this webinar, EMC and FedEx explain how they solved for SharePoint’s customization and collaboration limitations by using QuickBase, boosting their teams’ productivity with streamlined workflows and shared data.

Duration: 58 Minutes


Be Prepared for Ransomware

Business halts…your files are inaccessible…you’re losing money, but your only option is to pay even more to a criminal who is holding your data for ransom. Join this webcast to learn how ransomeware can impact your business!

Duration: 1 Hour


Logo: Dell Software

Understanding Identity and Access Management Compliance Requirements for PCI, HIPAA, SOX and ISO 27001

Discover the role that IAM plays in compliance and security. In this webcast, you’ll hear how about the latest PCI, HIPAA, SOX and ISO 27001 requirements.

Duration: 01:20:00


Logo: Dell Software

Understanding the NIST Cybersecurity Framework: Different, Scalable and Practical

In this on-demand webcast, learn about the National Institute of Standards and Technology’s (NIST’s) cybersecurity framework, A NIST expert walks you through the Framework for Improving Critical Infrastructure Cybersecurity.

Duration: 01:20:00


Logo: Dell Software

Understanding Privileged User Compliance Requirements for PCI, HIPAA, SOX and ISO 27001

Although SOX represents only a portion of the total scope of compliance obligations faced by most organizations, it is a critical piece. Read this tech brief to see how to achieve and prove SOX compliance – along with other security mandates – with the right solutions. Plus, benefit from the security compliance insights of an auditor.

Duration: 01:48:00


Logo: Dell Software

Password hashing prevent risk security breach

Watch this on-demand webcast to learn about strategies and tools that make it easy to prevent hashes from being harvested, detect the use of harvested hashes and address the target of many attacks (privileged accounts).

Duration: 01:45:00


Logo: Dell Software

IAM as a Service (IAMaaS) is a reality today. Find out if it’s right for your organization.

Explore if identity and access management as a service (IAMaaS) is right for you? Discover how IAMaaS measures up against traditional on-premise solutions, and determine which scenario is the right fit for your organization.

Duration: 1 Hour


Okta

Office 365 Provisioning and SSO Deep Dive

In this webcast, we’ll explain how to take complex identity management requirements and make them manageable. We’ll discuss how instead of relying on legacy tools Microsoft gives away, you can remove the identity barriers for your Office 365 migration while building a foundation from which to launch your entire future cloud strategy. Learn more!

Duration: 1 Hour


Logo: colligo

Enterprise Mobility: Awakening the SharePoint Force.

This webinar explores 3 current challenges in mobile content management and present strategies to tackle them the right way with SharePoint. View now on-demand!

Duration: 1 hour


Logo: Dell Software

Best Practices for Migrating to Exchange 2016 and Office 365

Learn the key steps and best practices you need to follow to ensure a successful migration such as performing a thorough pre-migration assessment, why a streamlined Active Directory is critical, how to evaluate migration solutions and more!


Logo: Dell Software

Using OpenStack to Control VM Chaos

Are you currently using or considering OpenStack? Ever wished you could have end-to-end visibility into your OpenStack infrastructure? Hear industry experts provide a complete overview of OpenStack and Foglight for OpenStack. Learn more.


Logo: Dell Software

Delivering Business Value with IT Service Management

Please join Robert Young, research director, IT Service Management and Client Virtualization, IDC who will share how companies are leverage new service management trends and best practices to deliver IT-as-a-service, optimizing both IT and business productivity. Learn more.

Duration: 45 minutes


Imanami

Active Directory Group Management: How to Take Yourself Out of the Loop

What would you need to bring into your environment in order to get group management off of your back? Find out in this informative webcast featuring MVP Don Jones.

Duration: 1 Hour


logo

What to Know about Exchange 2016, SharePoint 2016 and Office 365

Join a panel of experts as they discuss the changes to Microsoft Exchange 2016 and SharePoint 2016. Whether you’re debating migrating, evaluating Office 365 or simply satisfying your curiosity, this webcast is for you.

Duration: 61 Minutes


Logo: Dell Software

Active Directory Disasters — Plan ahead!

Don’t let an Active Directory disaster ruin your vacation. Watch this webcast to learn more about AD planning and recovery options.


Mimecast

Email Security: It’s Time to Shut the Front Door

Without proper security measures in place, email represents one of the easiest ways for malware to “walk right in” the front door of your organization. With spear-phishing attacks on the rise, and users still falling prey to malicious email content, it’s time organizations include email security as part of their overall security posture before they become the unwitting victim. Learn more!

Duration: 1 Hour


Logo: Veeam -It Just Works!

Everything You Need to Know About Microsoft Nano Server

Join Mike Resseler for a webinar session to discuss the advantages and potential use-cases, and discover how to start with Nano to take all of the benefits to your data center. Read on.


Eliminate Print Servers - Mastering Print Management in a Highly Distributed Environment

Join technology experts as they discuss and investigate ways to simplify print management and eliminate print servers in the modern era. Register now!

Duration: 1 Hour


Logo: Veeam -It Just Works!

Managing SharePoint Server Backup and Recovery Like a Pro

Traditionally, Microsoft SharePoint has been one of the most difficult applications for performing day-to-day recovery and eDiscovery operations, posing challenges to the IT professional faced with zero-tolerance for down time. Attend this webinar to discover powerful new tools that enable instant visibility into your SharePoint databases and backups. Register now.


Logo: Redmond Tech Advisor

Mobility & Office 365: How to Enable Your Mobile Workforce with Office 365

Join Nathan O’Bryan as he explores some of the features of Office 365 that enable a mobile workforce to function as a cohesive team without the need for physical proximity. During this webcast Nathan will demonstrate how Office 365 features allow him to work mobile. Register now!

Duration: 1 Hour


Logo: colligo

4 Email Problems That SharePoint Can Solve Now

In this webinar, industry experts take a look at common email management problems and how you can solve them from a technology and policy perspective.

Duration: 49 Minutes


Imanami

AD Group Management: When to Automate and When to Delegate

Active Directory groups need to be managed continually, but IT can’t do it on their own. Join industry expert Nick Cavalancia and Jonathan Blackwell from Imanami as they explore the issues of practical automation and responsible delegation related to the management of Active Directory groups. Register now!

Duration: 1 Hour


IT Security: Why One Layer of Defense Is Not Enough

Join security expert, Ian Trump, as he explores cybercrime and its impact on small and mid-sized businesses, how businesses need to protect themselves from all angles and why using layered security is crucial to ensure it doesn’t happen to you.


Logo: Dell Software

How To Become a Data Protection Hero

Now is the time to rethink your data protection strategy addressing when, where, why and how to protect, preserve and serve your applications and data against various threats. Find out how in this webcast. Learn more.


Logo: Netwrix

How to Survive an IT Audit – and Thrive Off It!

In this webinar, you’ll learn about top control processes that should be taken care of as matters of best practice or as core components of any IT compliance.


Logo: Redmond Tech Advisor

System Hardening without Affecting Production Services

In this Redmond TechAdvisor webcast, we'll cover testing scenarios and the struggles of properly securing production Windows systems. We'll also look at keeping these systems secure by addressing compliance testing, enforcement and monitoring. Read on.

Duration: 1 hour


Logo: Redmond Tech Advisor

Rethinking Data Protection

This Redmond supercast looks at the industry trends, issues, and challenges you face as your environment quickly evolves, and helps you determine the best protection strategy and implementation for your environment. Register now!

Duration: 1.5 Hours


Logo

Crack the Code To Cloud App Security, Deployment, User Experience and Support

Get Office 365 and cloud app deployment best practices from Rightpoint’s experience deploying hundreds of enterprise cloud application projects. You will also learn the leading cause of security breaches and proven approach to meeting security and compliance.


Logo: Redmond Tech Advisor

How to Migrate from VMware to Hyper-V

In this Redmond TechAdvisor webinar we look at the various technical and business reasons for migrating to Hyper-V along with some tool discussion on how to move your VMs as well as prepare your Windows server environment. Read on.


Logo: Dell Software

Holistically Manage and Solve Virtualization Performance Issues Like a Pro

Join this webcast, as we discuss a holistic approach for monitoring and resolving virtualization performance issues that enables you to better utilize your existing infrastructure while planning for your future needs.


logo

Going Past the Simple Firewall: Implementing Security in Layers

In this webinar, security experts will cover what kind of threats exist today, how to notice these threats (encrypted or not) and how to protect your network from them.


Logo: Box

Collaboration + Security using Office 365 and Box

Microsoft Office 365 gives your users the power to collaborate on documents from anywhere, which is great for businesses, but IT departments need to work hard to keep data secure no matter where it lives.


Logo: Box

Secure Mobile Collaboration with Sharepoint and Box

This session examines how Microsoft SharePoint environments handle file sharing and collaboration, and some of the challenges businesses face adapting these legacy technologies to a new, more mobile world.