Mind the Multi-Cloud Gaps! What IT Needs to Know NOW About What Data Isn't Protected

In this webcast, Redmond editors explore the best way to make sure your data estate is fully protected in this mixed cloud reality. Learn more!

Date: 08/27/2019

Time: 11:00 am

Steps You Need to Take to Secure Office 365

Microsoft’s Office 365 is now the most widely used enterprise cloud service by user count. While Office 365 is a robust, secure platform with extensive compliance and governance capabilities, it is essential that organizations lay the groundwork for a cyber secure Office 365 adoption. Learn more.

Date: 09/05/2019

Time: 11:00am

Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network

The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. Learn more.

Date: 09/10/2019

Time: 11:00am

Zerto and Azure - From Nut to Shell

In this webinar, Zerto Solutions Architect and Microsoft Azure SME Kyle Bromley, will discuss how to “right size” your workloads in Azure with Zerto and what hyperscale-level IT resilience really looks like. Learn more!

Date: 09/10/2019

Time: 11:00am

Moving Workloads to the Cloud: You Need to Have a Plan

There’s more to migrating workloads to Azure or AWS than simply “lifting and shifting”. Organizations need to plan for performance impacts, changes in operating costs, and making certain the right workloads are hosted in the right cloud. Learn more.

Date: 09/12/2019

Time: 9:00am

Five Key Data Protection Considerations for Your Move to AWS

Data protection is your responsibility, not matter where your data resides—including the cloud. Learn more.

Date: 09/19/2019

Time: 11:00AM

A Three Step Approach to Keeping Your Network Safe from Ransomware

One of the biggest mistakes that organizations tend to make in their fight against ransomware is that of basing their defenses around a product rather than a strategy. Learn more.

Date: 09/25/2019

Time: 11:00AM

People, Process and Technology for a High-Performance Security Team

Small to medium enterprises are top targets for cybercriminals. Verizon reports that 43% of all breaches target SMBs. Why? Because most SMBs are under-protected and offer the least resistance and quickest return for threat actors. Today’s attacks are sophisticated, fast-moving and continuously evolving. Security teams need to be equally sophisticated, fast-moving and continuously evolving.  Learn more.

Date: 10/03/2019

Time: 11:00am

On Demand

The Security Risk in SSL/TLS Traffic: Architecting Visibility and Security Through Decryption

Nearly all commerce, communications, and data traffic going over the web is encrypted. As organizations transform operations, leverage more of the cloud, expanding locations, and utilizing remote workforces, IT’s lack of visibility into encrypted traffic puts the organization at risk for a cyberattack, data breach and compliance failures. Learn more.

Windows Server 2008 EOS Is Coming! So Is The Silver Lining

End of support for Windows 2008 servers is only 6 short months away. The good news is it’s not too late to build your plan and take action before January 14, 2020. Learn more.

Rethinking Storage for a Data-centric World

Digital transformation is top of mind for nearly all IT decision makers. Data is the lifeblood of that process. IT leaders struggle to simultaneously manage the exponential growth of unstructured data while leveraging this data drive greater business value. Legacy infrastructure impedes the access and use of data as it was not built to handle either the new volume of data or the use cases that enterprises are taking on. Learn more.

Database as a Service For Your Enterprise Cloud

Many organizations are moving to a database as a service (DBaaS) model for managing and operating their databases because DBaaS model is efficient, agile, cost-effective and scalable. What if copying a database were as easy as the copy and paste operations on your computer? Learn how to automate and simplify database management.

Migrating & Managing 2,000 Windows Devices

With a growing number of computer imaging solutions to choose from, IT teams now have the ability to hand-pick a tool that meets the exact requirements of their modern computing environment. This 30-minute technical discussion includes tips for managing a Windows 10 environment, a comparison of leading imaging solutions and considerations when evaluating a computer provisioning solution. Watch now.

A Day in the Life of a Security Operations Center: How to Prevent Incidents from Becoming Breaches

Cybersecurity threats are increasing, becoming more sophisticated, and creating more damage. 44% percent of legitimate alerts are not investigated*. Security Operations are inundated with a deluge of alerts from disparate security solutions. Learn more.

The Biggest Causes of Data Loss in 2019 and How to Counter Them

When it comes to data loss, natural disasters and ransomware grab the most headlines. Yet the exact incident that's most likely to cause you problems on a day-to-day basis tends to be much more mundane. Learn more.

Empowering Your Human Firewall: The Art and Science of Secure Behavior

You know that "security awareness" is key to a comprehensive security strategy. But just because someone is aware doesn't mean they care. So how can you design programs that work with, rather than against, human nature? View now!

The Biggest Mistake You're Making with Office 365

If you’re using Office 365, don’t ignore your data protection responsibilities — or you may be putting your critical data at risk. Making assumptions about how cloud applications protect your data can be a huge oversight, and with limited built-in data recovery capabilities, Office 365 is an app that’s commonly overlooked.

“Honeytokens” – Using Honeypots to Detect Credential Compromise

Commonly used and highly successful credential compromise techniques like Pass-the-Hash and Pass-the-Ticket are notoriously difficult to detect amidst the noise of everyday activities within Active Directory. To an observer, they appear to be legitimate authentication events and to Active Directory, they are.

Alleviate the Stress of Your Windows 7 Migration

Microsoft extended end of support for Windows 7 to January 14, 2020. This may seem far away, but migrations occur slowly for many organizations due to a lack of automated user state and data provisioning, resource requirements, and remote workforce deployment. So, how can you alleviate the stress of migrating and gain critical insights into your business data?

Hybrid Office 365 Virtual Summit 2019

In this recorded virtual summit, you will hear from Stephen Gee from Zix and Michael Osterman of Osterman Research to learn about the issues and complexities involved with running hybrid and MS Office 365 environments and why organizations of all sizes may need to supplement the native features with third-party solutions, especially in the security, archiving, and encryption areas.

DRaaS: How Disaster Recovery as a Service Fits into a Complete DR Plan

The cloud expands organizations' options for robust offsite recovery. Learn more.

The US Department of Homeland Security's Office 365 Security Recommendations

The Cybersecurity and Infrastructure Security Agency (CISA) of the Department of Homeland Security (DHS) recently issued the AR19-133A report to help admins address the vulnerabilities and risks their organizations face after an Office 365 transition, so they can protect their Office 365 service from attacks. Learn more.

How a Comprehensive Password Management Tool Can Help You Prevent Password Breaches

Your organization is only as strong as its weakest link—which is often weak passwords—and hackers know this, meaning they always are on the lookout for user accounts with passwords that can be easily compromised. Learn more.

Top 5 Pitfalls to Avoid with Bare-Metal Recovery for Active Directory

Learn why bare-metal backups are usually NOT the best option for disaster recovery from cyberattacks. Learn more.

Better IT Asset Management and Data Quality for IT Teams

In today’s competitive world, using new technology to set your business apart can make the difference between getting ahead or falling behind. But staying in control of the growing complexity is tough. Learn more.

Office 365 Security & Compliance Auditing Best Practices

In this educational webcast, join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, and Rob Tovar, from Quest Software, as they discuss the best way to simplify auditing to meet security and compliance requirements. Learn more.

Destroyer of Cities: Lessons from the Latest Ransomware Attacks

A rash of ransomware attacks has hit small and local governments in recent months. From a trio of municipalities in Florida, to the ongoing problems in Baltimore to the expensive remediation in Atlanta, city governments falling victim to ransomware has become all too common. Learn more.

Top Tips to Defend Against Stolen Credentials

Stolen credentials and passwords are a lingering security loophole these days. Learn more.

The Great Office 365 Migration: Are We There Yet?

In this webinar, you'll learn why companies are migrating to Office 365 and hear about their experiences, including delays, cost overages, problem applications, and more. Watch now!

Cloud Ready Data Protection for Hybrid Data Centers

Join Microsoft MVP, VMware vExpert and IT analyst Greg Schulz of Server StorageIO along with Michael Gogos, Data Protection expert from Quest, as they discuss how to become hybrid and cloud data protection ready, and much more. Read on.

The Ransomware Hostage Rescue Guide

It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. Learn more.

Covering your Assets: Office 365 Data Protection Measures for End Users and Administrators

How can you protect your content from the very people that have access and either accidentally or intentionally delete important information? Learn more.

Automate Endpoint Security Patching

In this on-demand webcast, experts from the Spiceworks Community and Quest review how you can tackle your security challenges. Learn more.

Is Your Backup Process Built for the Way Your Users Store Their Critical Files?

Backup and recovery has its origins in a structured world. As always, the key business assets that cry out for backup are the order databases, the payroll systems, ERP and the like. Learn more.

Why YOU Need to Protect Your Microsoft Office 365 Data

Join us in this webcast for an in-depth look at how to address your most pressing needs when it comes to protecting Office 365 data and all the common pitfalls to avoid when implementing backup for this important data source. Sign up.

Tips, Tools and Techniques for Overcoming Data Protection Challenges

Register now for a dynamic panel discussion. Register Now!

Active Directory Security: Early Stage Attack Activities to Watch For

Join us at this webcast as we discuss two early stage attack activities: LDAP reconnaissance and Password Spraying – that allow attackers to map out the target infrastructure to plan out their attack and begin to take over accounts. Detection strategies and mitigation steps will also be explained. Sign up.

Stay Out of the Net: Your Ultimate Guide to Phishing Mitigation

Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, as he explores techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. Roger won't just cover one angle. He'll come at it from all angles! Read on.

Active Directory Security: Detecting Internal Attacks

In this webinar, MVP Derek Melber will guide you through how you can configure your SIEM to detect direct attacks and also improve your SIEM with technologies such as user behavior analytics. Find out more.

Ooops! Your AD is Encrypted…!

Don't let Active Directory fall victim to a cyber attack! When it comes to protecting your Active Directory, there is no room for error. In this On Demand Webcast , join Dale Meredith, cyber security expert as he explores ways to protect AD from cyber criminals. Watch now!

Leveraging Cloud-Based Object Storage as Part of a Modern Data Protection Strategy

In this discussion, Dave Russell Vice President of Enterprise Strategy of Veeam reviews the considerations for adopting cloud-based object storage and how to leverage cloud object storage for the best outcome. Learn more.

Recovering the CEO's Lost Presentation and Other Backup Nightmares

Join experts from Redmondmag.com as they share backup and recovery horror stories. You'll hear about business that thought they did everything right, only to find out about their data was not recoverable due planning mistakes, technical limitations or glitches. Learn more.

4 Best Practices for Azure Cloud Management

In this webinar, we'll offer you best practices and key trends to help you maximize the return on your Azure cloud investment and gain control of your scaling cloud infrastructure. Learn more.

Simplifying Data Protection Management in the Cloud

Join iland's Justin Augat, VP of Product Marketing and Will Urban, Senior Cloud Technologist, to learn more about how Veeam and iland are changing data protection for your business. Learn more.

Do You "3-2-1" or Is Hope Your Current Backup Strategy?

Data backup and recovery programs are often not prioritized until there is a problem and then it’s everyone’s problem. Many IT leaders believe they have an adequate backup strategy in place but they are often missing key components that would ensure success. Learn more.

How Small and Midsize Organizations Can Achieve the Same Level of Security as the Largest and Most Well Defended Organizations?

Join David Etue, cybersecurity expert from BlueVoyant, as he delivers valuable insight into the risks your SMB organization faces and provides guidance on how to achieve the optimum level of cybersecurity. Learn more.

How to Keep the Personal Data of Citizens Secure

Learn from the first-hand experience of the CIO of Central Arizona College. Register Now!

The Future of Business Critical Asset Data and Analytics

In today’s competitive world, using new technology to set your business apart can make the difference between getting ahead or falling behind. But staying in control of the growing complexity is tough. Learn more.

Natural Disasters: Top Tips to Help IT Keep the Business Going

It's been said that North America has some of the wildest weather on Earth. With the summer months approaching, it's the season for thunderstorms, tornados, hurricanes, wildfires and floods. Is your business data prepared to weather any approaching storms? Learn more.

Breaking Down the Relentless Risk of Ransomware

More than half of enterprises report that they've experienced at least one ransomware attack during the previous 12 months* and most were attacked more than once. Learn more.

What Keeps IT Pros Like You Up at Night

When attempting to protect your organization, you’re being pulled in a million directions, trying to secure every possible attack vector. Learn more.

Shed On-Prem Identity Complexity in a Cloud-First World

The shift to the cloud always seems to focus on enhanced productivity for an organization overall. But cloud adoption also means IT must figure out how to integrate “all-things-cloud” with on-prem Active Directory. Learn more.

Ransomware Update: Biggest Emerging Risks, Aftermath of Recent Events & IT Best Practices

If there's one silver lining to the emergence of ransomware in the last few years, it's this -- it's brought into sharp relief how interrelated security, backup and recovery, disaster recovery, business continuity, training and organizational policies are in a solid defense strategy. Learn more.

Why Microsoft's Latest Data Protection Enhancements Aren’t Enough

Industry analysts and leaders agree that you need to add backup and recovery tools to Office 365 for more comprehensive data management and retention. Learn more!

Why Microsoft's Latest Data Protection Enhancements Aren’t Enough

Industry analysts and leaders agree that you need to add backup and recovery tools to Office 365 for more comprehensive data management and retention. Learn more!

The Biggest Mistake You’re Making with Office 365

If you’re using Office 365, don’t ignore your data protection responsibilities — or you may be putting your critical data at risk. Industry analysts and leaders agree that you need to add backup and recovery tools to Office 365 for more comprehensive data management in protection. Watch now!

Encryption for End Users: What IT Managers Need to Know

When it comes to end-user security, hard-drive encryption is a key pillar to consider for your security strategy. Yet while it adds a layer of security and can be required for compliance, it also adds some challenges and creates risks of accidental data loss on individual PCs. Learn more.

How to Accelerate Your Veeam Backups to Azure

Using your Veeam solution for backup and replication to the Microsoft Azure cloud is a great start, but did you know it’s possible to make it better and faster? Read on.

The Extended Enterprise: Top 5 Things IT Must Know

Many organizations need to provide network access to their extended enterprise -- contractors, temp workers, partners, vendors, and others -- to effectively run their business. However, these users create unique challenges and introduce new cybersecurity risks. Join us to learn the top five questions IT must address to successfully manage the extended enterprise. Learn more.

Active Directory Migration Planning

Active Directory is the living heart of most IT organizations. No matter if your organization is on-premises, in the cloud, or in some hybrid situation somewhere in-between your on-premises Active Directory is most likely the most important part of your IT infrastructure. Read on.

10 Ways to Fail at Enterprise Data Protection in 2019

The data estate that organizations have to protect in 2019 is more complicated than ever. The old concept of a network perimeter is gone, bulldozed by cloud storage, Software as a Service applications, bring your own device practices, data on mobile phones and many employees who never really go off the clock no matter where they are. Learn more.

Protecting Sensitive Data in an M&A World

Understanding where your sensitive data resides, who can access it, who is using it, and what’s being done to it is a relatively tall order for any organization. But compliance mandates, security initiatives, and just keeping the business running demands it. Learn more.

Cloud-first strategy with Veeam and Microsoft: Backing up to Microsoft Azure

A cloud-first strategy, implemented by many public sector organizations in the UK, requires that any given data management platform is tightly integrated with cloud technologies and allows customers to easily tier the data off to a cloud-based data center. Learn more.

vSphere 5.5 end of support by VMware: Get your data ready

Watch this Live Show video to learn what happens if you are still running vSphere 5.5 in production

Veeam and AWS avengers: Guardians of recovery

Watch this video to learn about key considerations for ensuring the portability of workloads to the cloud, built-in Veeam features for successful workload recovery into AWS and more! Watch this today!

The Biggest Mistake You Are Making with Office 365

If you're using Office 365, don't ignore your data protection responsibilities—or you may be putting your critical data at risk. Making assumptions about how cloud applications protect your data can be a huge oversight, and with limited built-in data recovery capabilities, Office 365 is an app that's commonly overlooked.

Levers of Human Deception: The Science and Methodology Behind Social Engineering

No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding. Learn more.

4 Best Practices for Azure Cloud Management

Success in the cloud hinges on effective cloud management. In this webinar, we’ll offer ways to help you maximize the return on your Azure cloud investment and gain control of your scaling cloud infrastructure. Read more.

The Practitioner’s Guide to Security Monitoring in the Cloud

Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads, but has also introduced a host of new security threats and challenges. Read on.

10 Tips to Help Improve IT Security and Safeguard Your Job

In this fast-moving world of cybersecurity, it seems a week doesn’t go by without another company making headlines with a data breach or attack that compromise their data. Read on.

Your Best Route for Office 365 Migration

Migrating to Microsoft Office 365 can be complicated. Even with careful planning, deploying Office 365 and delivering a fast user and application experience can be a challenge. While most organizations assume their traditional networks are ready for the migration, many don’t realize that Microsoft recommends a different strategy. Read on.

Leave Nothing Behind: Cloud Migration Done Right

Join Quest Software and Microsoft MVP Tim Warner for a thoughtful discussion how you can reduce risk, optimize spend and gain full visibility of your on-premises and cloud infrastructure. Learn more!

Deep Dive: How to Detect Abnormal User Behavior before a Breach Occurs

Join us for a 30-minute deep dive into Netwrix Auditor’s abnormal user behavior analytics. Register today!

No Passwords, No Problem: Using WebAuthn to Stop Account Takeover

Want to eliminate passwords? We all do. WebAuthn is a new web standard published by the World Wide Web Consortium (W3C) for users in the era of passwordless authentication for web applications. Learn more.

Beat the Clock with Best Practices for Handling Enterprise Windows 7 Migrations

Jan. 14, 2020 is a huge day in the IT world. That's when Windows 7, which was in many ways Microsoft's most popular operating system to date, falls out of support. Learn more.

Security Awareness Training On Your Terms: You Want to Be in IT, Not an IT Trainer

You got into IT because you enjoy working with cutting edge technology and you love working hands-on with powerful cool boxes that, unlike humans, do what they are programmed to do. Learn more.

An In-Depth Look at Backupify’s State of the Industry Ransomware Report

Ransomware remains a massive threat to businesses and the number of ransomware attacks are not expected to decrease any time soon. Backupify’s 2019 ransomware report* provides unique visibility into the state of ransomware from the perspective of IT professionals and their clients dealing with infections on a daily basis. Learn more

The State of Ransomware and Its Drastic Impact on Business

This webcast provides an in-depth look at Backupify’s report. You’ll gain useful insight into preparing your first line of defense, developing a multiple solution approach to prepare for the worst, and implementing recommendations to ensure recovery and continuity after an attack. Learn more!

You Know You Need to Protect O365 Data. Here’s How.

A vital part of your company’s cloud-adoption story is moving valuable data to Office 365. As an IT professional you recognize the need for vigorous data protection. It must mitigate threats including ill-intentioned insiders, accidental deletions, and even Office 365 outages preventing your workforce from working. Learn more.

Best Practices for Ransomware Preparedness and Recovery

Join as NewCloud Networks and Veeam Software explore Ransomware preparedness best practices and how to fight ransomware. Learn more.

Best Cloud Strategies for Ransomware Resilience

Ransomware continues to be a top of mind problem for IT professionals and IT decision makers worldwide as they face the potential disastrous aftermath of successful attacks from losing critical data on a certain endpoint to suffering brand reputation damage. Join our session to learn more!

Top 5 Hybrid AD Management Mistakes and How to Avoid Them

While Hybrid messaging and collaboration with MS Office 365 offers compelling benefits to larger organizations and the enterprises, it comes with new security and compliance risks. Learn more.

The Multi-Cloud Enterprise: How to Deliver Data Management and Availability

The nature of the senior data center executive’s job is evolving from delivery executive to IT business executive. The webinar will cover the increasingly changing landscape of infrastructure and processes of multi-cloud environments. Learn more!

New Research: Top 5 Data Protection Gaps in Office 365

Do you think the native capabilities of Office 365 are enough to protect your business? Would you bet your career on it? We wouldn’t - and neither would industry expert, Michael Osterman. Sign up to learn why!

Power Up Your Password Policy

This editorial webcast, presented by Redmond magazine, will explore the viability of the NIST password framework, and provide some updated techniques and tactics for ensuring a rock-solid password policy. Read on.

Live Demo: Netwrix Auditor – Data Discovery & Classification Edition

Modern IT environments are so large and dynamic that it has become extremely difficult to keep track of all the critical and sensitive data stored there. Register now to find out how Netwrix Auditor — Data Discovery and Classification Edition can help. Register today!

12 Ways to Defeat Two-Factor Authentication

Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years of experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite 2FA solution. Learn more!

Three Ways Lenovo is Delivering Enterprise Productivity

Today’s modern, mobile workforce needs advanced technology that keeps them connected, collaborative and, most of all, productive. In this engaging webinar, three Lenovo experts — Alli Heeter, Brand Ambassador, Jimmy Smith, ThinkVision Product Manager and Aaron Buckner, ThinkPad Mobile Workstation Product Manager — sit down to discuss how to support enterprise users working at full capacity in the office and on the move.

Deep Dive: Insider Threat Detection

Join Netwrix expert Bob Cordisco in the new 25-minute deep dive demo to learn how to be notified about high-risk insider threat patterns and more. Register today!

Most Useful PowerShell Cmdlets for Managing and Securing Active Directory

In this webinar, IT consultant and author Russell Smith will show you how to use PowerShell to manage Active Directory and track configuration changes. Learn more.

[PowerShell Tutorials] How to Become a Master of Automation

Enroll in our free online course created by PowerShell experts Russell Smith and Jaap Brasser and learn how to automate common tasks in Active Directory and Windows file servers. Plus, you’ll find out how to investigate and resolve security incidents in Office 365 using short PowerShell scripts. Learn more.

[Trust but Verify] Protect Yourself from Third-Party Risks

Join Liam Cleary and Jeff Melnick as they discuss a real-world attack that involved credentials issued to a third party and learn how to keep your sensitive data safe. Learn more.

Maintaining Hybrid AD Security in an M&A World

So, how do you make sense of and protect this constantly moving hybrid AD target? In this interactive webcast, join Microsoft Cloud & Data Center MVP Nick Cavalancia, and Matthew Vinton from Quest, as they discuss how. Register now!

The Biggest Mistake You’re Making with Office 365

If you’re using Office 365, don’t ignore your data protection responsibilities — or you may be putting your critical data at risk. Industry analysts and leaders agree that you need to add backup and recovery tools to Office 365 for more comprehensive data management in protection. Read on!

10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys

Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert as he explores 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Read on.

Avoiding GDPR Penalties – 5 Key Principles. Veeam Compliancy Experience Shared

The GDPR grace period for businesses to get themselves compliant ends on May 25, 2018, which touches over 500 million EU residents your company might be working with. Your inaccurate GDPR compliance might result in €20 million of fines or even more. Learn more.

Deep Dive: Unveil Your Hidden Risks with Netwrix Auditor

Take part in a 25-minute session as Roy Lopez of Netwrix explains how to keep your IT infrastructure secure with Netwrix Auditor. Learn more.

Behind the Scenes: 4 Ways Your Organization Can Be Hacked

In this webinar, Brian Johnson from 7 Minute Security will reveal some of the security gaps that attackers use to breach organizations, based on his firsthand experience with clients. Learn more!

Using Synchronization Technology for Migration and Content Integration

In this webinar, we showed how you can make your migration and integration projects seamless and disruption-free for the end-users. With a synchronization methodology, we showed you how you can take your time for your migration and integration, focusing on change management, user adoption, and end-user training. Watch now!

How to Protect Identities and Secure Your Azure Environment

Azure AD allows you to layer features such as conditional access and multifactor authentication to help protect your users and data. Along with Azure Security Center, it helps monitor security across on-premises and cloud workloads. Unfortunately, incorporating Microsoft’s native tools alone is rarely enough to maintain a strong security posture of your Azure infrastructure. Learn more.

Traditional Fax vs. Desktop Cloud Fax: 6 Reasons to Move to Cloud Faxing

Watch this On Demand Webinar to discover all 6 Reasons to Move to Cloud Faxing and how making the move to cloud-based faxing can benefit your business! Learn more!

What the California Consumer Privacy Act Means for IT Pros

Data privacy and data security have been among the hottest topics of 2018, mainly due to the GDPR, which came in force on May 25. However, 2018 also saw the signing of another important law, the California Consumer Privacy Act (CCPA). Although it has gotten a lot less press than the GDPR, it is nearly as sweeping, since it applies to all organizations that store the personal information of California residents. Learn more.

Citrix Virtual Tech Summit

As your environment grows more diverse—more clouds, more devices, more types of apps—you need a more efficient and secure approach to management. At this technical online event for hands-on IT leaders, we’ll discuss the building blocks of a modern digital workspace. Register now!

5 Simple Steps to Replacing Your DR Site with Azure

In this webinar we’ll show you just how easy it is to connect your VMware vSphere and Microsoft Hyper-V environments into Microsoft Azure, removing the need for you to host your own secondary DR site altogether! 5 simple steps is all it takes to begin your journey to the cloud, by utilizing the cost-effective storage and on-demand capacity of Azure to protect your data and applications. Learn more.

The 3 Pillars of SharePoint Security

Many organizations purchase and implement software solutions based on factors like a rich feature set, a low price and an appealing user interface. Unfortunately, security issues are often pushed to the side or forgotten altogether. Consider SharePoint, Microsoft’s flagship collaboration platform. Learn more.

Best Practices for Office 365 Migration

During this webcast, we provided scenario-based guidance so you can kickstart or build upon your cloud migration journey. We also covered the latest Office 365 updates and industry best practices. watch now!

5 Steps to Accelerate Your Data Management - Considered Advice from Thought Leaders

Join Jon Toigo, Chairman of the Data Management Institute, and Dave Russell, Vice President of Enterprise Strategy for Veeam, as they discuss the five stages to achieving effective data management. Learn more!

How to Spend Your Security Budget in a DevOps World

In this session, Threat Stack Security Engineer, Mark Moore, and CFO, Kevin Durkin, will discuss the current state of security processes and investments as organizations shift to the cloud. Learn how to build a scalable security program that fits your organization’s budget. Join us on November 8th at 1pm ET! Sign up today!

Gain Control Over Windows 10 Updates

There’s no doubt about it, Windows 10 upgrades have caused disruption across IT departments. Our team of Windows 10 specialists will share stories from the field and tips for successful management of Windows 10 in this technical discussion. We’ll highlight the latest best practices that every company should follow and explore the usability of unified endpoint management toolsets from VMware, Citrix, and Microsoft asking, “Do they really solve the need?”

IT Security Horrors that Keep You Up at Night

One reason companies continue to get breached is that they are too focused on the wrong things. You lose sleep over the “shock and awe” security headlines in the news — while your executives and directors use a password of monkey123 without 2-factor authentication for their email. The good news is you can greatly increase the security of your network without spending thousands of dollars on shiny new boxes with pretty blinking lights!

From Legacy to the Cloud: Modernizing your Archiving Strategy

Like most organizations, you’re either planning for, or have made, the shift to Office 365. But, you’re still not sure what to do about your on-prem archive. Find out what a modern archiving strategy looks like and how to get there. Learn more.

Email and the Web - Go Great Together for Attackers, But What About for the Defenders?

With nearly all security incidents and breaches originating from both email and the web -- and the necessity of these tools for your organizations day to day operations -- how can you protect your organization from the cyberattackers and their malicious work? Find out in this webcast.

Intelligent Manufacturing with Nutanix Xi IoT

Industry 4.0 has begun -- are you poised for success in the new era? Industry 4.0 is powered by IoT devices, sensors, and web-enabled applications that can process streams of manufacturing data right on the shop floor. IoT represents a computing paradigm shift from the centralized cloud model to the decentralized edge computing model. Learn more.

Should I Stay or Should I Go? – Keeping Legacy Data from Clashing with the Cloud

In this interactive webc ast, join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, and Chris Clark, CEO of Trusted Data Solutions, as they discuss moving legacy data to the cloud and actions you should take in regards to policy, planning and people. Learn more.

Things You Don’t Know About Single Sign-On

Watch this webinar to discuss the common questions Okta hears from customers around single sign-on and learn why SSO is not what you think it is. Learn more.

How to Prepare for Windows Server 2008 End of Support

Join us at this webcast to learn the best ways to secure, migrate and future-proof your legacy Windows Server applications without having to recode them. Learn more.

Group Policy Monitoring, Reporting, and Alerting

In this webinar, MVP Derek Melber will guide you through the technical concepts of Group Policy which make monitoring, reporting, and alerting of changes nearly impossible. Then, Derek will give you precise guidance on how to accomplish your needs around Group Policy. Get the details.

Making Multi-Cloud Management Invisible

Businesses seek to adopt multi-cloud architecture to foster better agility and enable more rapid innovation. However, the complexity of adopting a variety of services across multiple clouds with varying pricing models leads to lack of cloud interoperability, limited visibility and uncontrolled spend. The result is a combination of business and operational challenges for multi-cloud management.

How VDI Can Drive Disruptive Innovation

Join this webinar to see how HCI and EUC leaders, Nutanix and Citrix, enable disruptive innovation with VDI from on-premises to Citrix Cloud. Learn more!

Accelerating Office 365 Adoption: Making the Cloud Less Cloudy

Join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Matthew Vinton from Quest Software as they discuss migrating to, management of, and securing of Office 365. Learn more.

Secure your Endpoints - Don’t Fall Victim to Cyberattacks

Your endpoint environment is growing and you know that every network connected device represents a security risk. One ransomware attack can wreak havoc on your environment. Find out what you can do to protect your IT infrastructure with solutions that are available now. Learn more.

Availability Evolved: From Data Protector to Data Mover

Join Jon Toigo of Toigo Partners International and the Data Management Institute and Jason Buffington of Veeam Software for a deep dive into the changing role of data availability tools and their evolution toward a more comprehensive data mover and data management functionality set. Learn more.

5 Best Practices for Enforcing Password Policies

During this editorial webcast, experts from Redmond magazine will discuss best practices for ensuring passwords are indeed protecting your organization’s digital assets and step you can take to make your password policies as effective as possible. Learn more.

SecOps 101: Get Operations and Security Working Hand in Hand

During this editorial webcast, experts from Redmond magazine will discuss strategies and tactics to better align your operations and security teams and get them working together hand in hand to improve your overall security posture. Learn more.

The Hyper-Available FlashStack

Join Microsoft MVP, VMware vExpert, Greg Schulz of Server StorageIO with with Andrea R. Acosta of Veeam and Colin Gallagher of Pure Storage as they explore how organizations of all sizes benefit from on-prem data infrastructure with public cloud ease of use without the associated loss of control, complexity or compromise.

Top Nine Insider Attacks and How to Spot Them

In this live webcast, Quest experts Shawn Barker and Ghazwan Khairi will be introducing our brand new product Change Auditor Threat Detection — a powerful solution for proactively detecting anomalous behavior based on user activity. You will discover ways to minimize your insider threat risk. Learn more.

5 Reasons to Consider EV SSL for Your Online Business

Join IT professional, industry analyst, and technical trainer Tim Warner for a roundup of the top five reasons why you should consider an EV SSL certificate for your online business. Register now!

The Business Value of Using Veeam and NetApp to Reduce Data-Related Risks

Data is increasingly at the core of any business or organization and is fueling new Digital Transformation (DX) initiatives. And as data becomes more distributed, dynamic and diverse, data Availability has never been more essential. Join this webinar to learn how joint Veeam and NetApp solutions mitigate risk, enhance availability, reduce IT complexity and lower costs.

Migrating Workloads to the Cloud: It’s More than “Lifting and Shifting”

In this educational webcast, join Microsoft Cloud and Datacenter MVP Nick Cavalancia, and Chris Jones from Quest Software, to learn how do you avoid complexities and ensure the most cost-effective move to the cloud.

Hacking Order Management: 5 IT Benefits of an Automated Solution

The connection between order management and IT departments is one often overlooked. Problems on the order side often cause IT to drop what they’re doing and help fix the issue ¬— but not when you have the ultimate order management hack in place: an AI-driven automation solution. Learn more.

The 5 Benefits of Implementing Advanced Load Balancing in Azure

Businesses today are rapidly migrating their application workloads to Microsoft Azure Cloud or hybrid infrastructures, spanning on-premises to public clouds. Learn the benefits of implementing modern, advanced load balancing in Azure – cloud-native in Azure, integrated with Kubernetes and multi-cloud. See a demonstration!

Critical Malware 101: Threats You Need to Prepare for in the Year Ahead

During this editorial webcast, experts from Redmond magazine will outline some of the critical steps organizations must take to best defend themselves against all types of malware. We will provide tactical steps you can put into place right away to improve your security posture and keep malware at bay. Learn more.

Session 1 - The Human Factor: Malicious Insiders vs. Negligent End Users

Breaches resulting from insider misdeeds are front-page news on a regular basis. Unfortunately, the average employee misses a critical common thread across many these stories. It’s up to IT pros to understand the techniques attackers use, educate their users to avoid common traps, and take the necessary steps to avoid breaches. Learn more.

Don’t Let Your Users Be Your Organization's Biggest Risk

Take a peek behind the curtain of an organization's biggest risk - their own users. How do we prepare for and prevent these attacks? How do we monitor these users and hold them accountable?, How do we identify our biggest risks and avoid becoming the next negative headline? Join this session to find out.

Quickly Detect and Fix SQL Server Performance Issues to Keep Applications Responsive

Problematic SQL queries can severely reduce the performance of SQL Server and the business-critical applications that it supports. Everyone wants their SQL queries to run faster, but how can you achieve that? It is essential to have access to detailed, real-time information on the performance of SQL Server instances and databases. Learn more.

Latest Business Email Compromise Scams - Don't Be the Next Victim

Join us in this webinar, as we take an in-depth look at how the latest attacks work and the psychology and mechanics behind them. We will also discuss defensive measures you can take now to defend your organization against these attacks. Learn more.

Top 5 Office 365 Backup Concerns: Best Practices for Protecting Your Data

Organizations are increasingly migrating to Office 365 for their email, productivity and collaboration tools. However, many of these organizations are also realizing that Office 365’s native capabilities do not provide essential data protection capabilities, nor does it meet their standards for eDiscovery, archiving, malware recovery, and other requirements. Learn more.

Reduce Your Security and Compliance Risks with IT Asset Inventory Management

To minimize security and compliance risks, as well as reduce costs on under-utilized hardware and software, IT pros need to inventory all IT assets their organization has and track changes to them. If done manually, these tasks require hours of tedious work, so many organizations seek tools that streamline the process. Learn more.

Identity Management Key to IT Modernization

Enterprises are saddled with an IT architecture that has evolved organically over time. With the adoption of cloud and a drive to a more distributed workforce, IT is tasked with securely managing more users, on more devices, in more locations, and accessing more applications. The demands on IT are compounding quickly. And, limited staffing and budgets mean IT is constantly being asked to do more with less. Learn more.

Align HR and IT to Streamline Employee Onboarding

Growing companies onboard 30 new employees, on average, each month. This is no small challenge for the HR and IT teams. Now is the time for onboarding processes that are automatic, efficient and secure. Learn more.

Office 365 Migration - It's Just a Migration, What Could Possibly Go Wrong?

If your organization is one that has a complex migration into Office 365 coming up, you’re not going to want to miss this webcast. Nathan O’Bryan (MCSM/MVP) and Ron Robbins will talk about some of the ways these complex Office 365 migrations can go wrong, and what you can do to ensure yours is completed successfully. Learn more!

Intelligent Data Management 101: What It Is and What You Need to Know

During this editorial webcast, experts from Redmond magazine will outline some of the critical functions to which enterprises must pay attention to ensure they’re getting the full value from their corporate data—ensuring its security and, finally, ensuring it is always available across all platforms to drive their business. Learn more.

Beat the Top 3 Security Challenges Facing Office 365 Customers Today

Join Proofpoint security experts as they discuss top security threats affecting organizations today, including account compromise, email fraud and phishing, and data protection in the cloud. Learn more.

Reduce Risks to Office 365 Data

This editorial webcast, produced by Redmond magazine, will provide an overview of the most glaring data protection gaps in Office 365 and some high-level steps you can take to mitigate the risks and ensure your data is protected. Read more.

How to Chart Your Business Team's Journey from Spreadsheets to Business Intelligence

For many business leaders, spreadsheets still serve as the default tools for generating reports, but they are proving to be insufficient for supporting the level of analysis senior executives expect. During this Webcast, we will reveal how business leaders can enable their companies to broaden their perspectives on performance. Read on.

Insights for Windows 10 in the Enterprise Series

Get the latest tips for improving the move to Windows 10 as well as helpful tips to improve your processes for managing Windows as a service. Learn more!

Recent Changes to Google Chrome that Every Online Business Needs to Know

The days of "We'll enforce HTTPS on our public website someday" are officially over. In July 2018 Google made changes to its Chrome browser that marks all unencrypted HTTP websites "not secure." Join IT professional and technical trainer Tim Warner for an information-packed session. Register now!

Critical Event Response: The Expanding Focus of IT Recovery Planning

The increasing frequency of security-related threats is forcing IT managers to enlarge the scope of IT recovery plans. Join us as we define the basic capabilities for ensuring rapid recovery from a security-related downtime. Learn more.

Turbulence Ahead: The Changing Role of Data Protection in a Hyper Growth Multi-Cloud Environment

With the unprecedented growth of digital information, IT planners are leveraging hyper-scale infrastructure to host all the bits. Author, columnist and data protection expert, Jon Toigo, will join Dave Russell in this thoughtful and probing discussion of the turbulent times ahead and the efforts by Veeam and other technology innovators to get ready for the storm. Learn more!

Netwrix Auditor – Data Discovery & Classification Edition

Meet the brand-new Netwrix Auditor – Data Discovery and Classification Edition, which provides complete visibility into where sensitive files are, what content is inside them, who can access the files and who actually uses them. Learn more!

A Hacker Explains: How Attackers Exploit Office 365 Vulnerabilities

Office 365 has become the platform of choice for document collaboration and sharing. If you’re using Office 365 or planning to migrate there, understanding the types of security attacks you can expect is imperative. Microsoft provides tools for testing your end users by simulating some of the most common attacks, so you can educate them as part of your broader defense strategy. Learn more.

Disaster Recovery Gaps in Hybrid AD Environments

Learn how Azure AD is not (and cannot be) seen as a 100% slave to Active Directory and how this impacts your backup and restore strategy both in terms of changes and deletions. Backing up AD, but not Azure AD? You might be in trouble…

How to Enhance the Resilience of Your Office 365 Deployment

Join Microsoft MVP Tim Warner for a practical deep-dive into how third-party cloud services can integrate with Office 365 to give you full-spectrum security and data protection. You will walk away from this session with practical steps on where the Office 365 pain points are, and how you can address them to meet your SLAs and sleep better at night.

HPE and Veeam Go ALL-IN to Deliver Hyper-Availability

Join this interactive discussion to learn how HPE and Veeam can help with the transition into Hyper Availability and how enterprises are using Hyper Availability to create a business advantage.

Office 365: Cache Roaming and OneDrive

Complete with demos and previews of upcoming features Ivanti will guide you through the journey that many of their customers have already successfully completed.

Levers of Human Deception: The Science and Methodology Behind Social Engineering

Join Erich Kron CISSP as he provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by oily car dealers, to sophisticated social engineering and online scams. Additionally, he'll look at how to ethically use the very same levers when educating users.

Better Data Protection with Hybrid Cloud and Software Defined Secondary Storage

Join industry experts as they explore what you can do today to improve your data protection across local on-site and hybrid clouds.

The Role of Virtualization in the Hybrid Cloud Era

Join us on this webinar to learn how both on premises infrastructure and public cloud can play a role giving enterprise IT the freedom to leverage the best attributes of both by creating a hybrid cloud environment making the deployment and transition between environments simple and seamless. Learn more.

Solving Hyper-V Backup Challenges with the Cloud

Join us for this webinar discussion on how to leverage the public cloud to solve several challenges organizations and IT professionals face when it comes to providing effective availability within Microsoft Hyper-V environments.

Five Expert Tips to Overcome Compliance Challenges

Regulatory compliance is one of the biggest challenges that IT pros face today, regardless of their organization’s location, size or industry. Although GDPR, PCI DSS, HIPAA, GLBA, CJIS and other compliance regulations focus on different things, the underlying objective is the same — securing the data. Register now!

Achieving Migration Zen: The Art of Simplifying Email Archive Migrations

While choosing the right archiving solution the best fits your organization’s needs is important, equally as important is HOW you migrate - with compliance and regulation risks on the line, companies cannot afford an archive migration failure. Find out the best way to migrate email archives without the headache. Read on.

4 Powerful Levers from Lenovo and Forrester to Implement Zero Trust

Join experts from Forrester, Lenovo and Microsoft as they discuss Forrester’s newly updated Zero Trust Extended framework and how the four core components of Lenovo’s Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT assets. Read on.

Accelerate Digital Transformation by Getting Cloud Migration First-Time-Right

Join us for this webinar to learn more about the Azure migration solution that allows enterprises to reap the benefits of the cloud.

Netwrix Auditor Product Demo

See what the new Netwrix Auditor 9.6 has to offer, including how you can now classify and secure your data. Register today!

Solving Application Server I/O Performance Bottlenecks

This webinar is for those whose applications have the need for speed including database, VDI, SharePoint, Exchange, AI, ML and other I/O intensive workloads. Learn more.

Top 5 Challenges with Managing Hybrid Data and How to Overcome Them

In this editorial webcast, experts explore issues and emerging solutions surrounding hybrid data such as integration, storage and backup, security, advanced data analytics, compliance and maintaining data quality across a wide variety of external sources.

Mitigating IT Risks with Data Classification and Access Control

Join industry analyst Tim Warner and Netwrix Systems Engineer Jeff Melnick to learn how to start a corporate data classification and protection scheme right now. Ask Jeff and Tim questions and leave the webinar armed with practical advice and next step actions. Learn more.

How to Simplify Your Migration to Windows 10

Learn tips that IT managers can use to streamline the OS migration process, while maintaining business productivity by leveraging endpoint data protection.

Nutanix X-Powered Private Clouds: Best Practice

Join Nutanix experts to learn how to development a secure and high performing private cloud stack with Nutanix Enterprise Cloud OS. Read on.

Analyze Active Directory Security for Fun and Profit

Join Microsoft MVP Tim Warner to learn how to audit, analyze, configure, and report on AD DS by using Microsoft "in box" tools. We will then transition into the need for a third-party auditing and risk management solution.

Driving Fax, Email and EDI Order Automation with AI

Join the live webinar to discover how organizations can stop relying on IT to fix issues like EDI errors and start leveraging AI-driven technology to automate the tedious parts of order processing. Learn more!

Simplifying Cloud Access and Provisioning with a Federated Identity Service

This webcast explores how you can best manage identity in a hybrid environment that includes both on-prem and cloud-based identity sources, and how a federated identity service can simplify access and provisioning to the cloud. Read on.

Making Awareness Stick: Secrets to a Successful Security Awareness Training Program

Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, as he shares results-focused strategies and practical insight on how to build a world-class program. Learn more.

Netwrix Auditor Product Demo

See what the new Netwrix Auditor 9.6 has to offer, including how you can now classify and secure your data. Register today!

How to Leverage Endpoint Data to Better Detect, Analyze and Predict Attacks

Join us to learn how to leverage endpoint data to make sense of the software capabilities, capabilities of code in memory, and even the attacker’s capabilities in order to better detect, analyze and PREDICT attacks BEFORE they occur. Learn more.

Don’t Just Survive Office 365 Tenant Migration – Master It!

Find out about best practices for quick and easy Office 365 tenant to tenant migration.

VIDEO: Optimize Your Connection to Oracle Cloud with Equinix

Learn how Oracle and Equinix help organizations to transform their business by integrating hybrid and multicloud environments to increase operational efficiency, enhance system processes, improve customer experiences and grow revenues. Learn more.

VIDEO: Optimize Your Connection to Oracle Cloud with Equinix

Learn how Oracle and Equinix help organizations to transform their business by integrating hybrid and multicloud environments to increase operational efficiency, enhance system processes, improve customer experiences and grow revenues. Learn more.

How to Secure Your VPN, Mobile Devices, and Network Devices Via Certificates

See what certificate management in action looks like as we show you how one globally distributed company with thousands of remote offices secured its transactions, and improved the customer and employee experience. Read on.

Securing Virtual Machines in Azure

In this webcast Nathan O’Bryan (MCSM/MVP) will cover some simple steps you can take to secure your virtual machines hosted in Azure. Learn more.

What Happens When Office 365 Fails: Backup & Recovery

There is a widespread misconception that data created and stored in the cloud does not need to be backed up. When data is deleted or corrupted, companies face three major problems: lost data, lost time and lost cash. Learn about cloud data recoverability and how to take control of your Office 365 data at this webinar.

Fax Survival Guide: How to Avoid Disaster and Distress with Cloud Fax Services

Attend to learn how your company can forget about the headaches and hassles of fax by moving your operations to the cloud! Get the details.

Multi-Cloud Governance at Your Finger Tips

Join us for a discussion about multi-cloud management and learn how Nutanix can enable you to drive better visibility, cost optimization and intelligent resource planning for hybrid and multi-cloud deployments. Learn more.

Office 365: Expert Tips for Protecting the Parts that Microsoft Doesn’t Handle

Join Office 365 experts to learn about potential security risks present in O365 and how best to mitigate those risks.

Windows as a Service – Resolving the Upgrade Versus Update Dilemma

Attend and learn about Windows as a service, how it will impact enterprises and get a cheat sheet for a hassle free transition to Windows as a service.

Solved: Advanced Data Classification and Leak Prevention in Office 365

In this webinar, we will look at the built-in DLP capabilities and demonstrate how you can apply advanced data classification tools provided by Symantec, McAfee, GTB or any of the leading DLP vendors. We will show how you can integrate them into policy workflows that manage share policies, interact with users and even incorporate your choice of file encryption.

7 IT Pro Secrets for Backing Up Office 365 Data

During this editorial webcast, experts from Redmond magazine walk through the best practices organizations are using to manage the Office 365 backup process. Join us.

Netwrix Auditor Product Demo

Netwrix Auditor provides security intelligence to identify security holes, detect anomalies in user behavior and investigate threat patterns in time to prevent real damage. Sign up for the live demo now! Read on.

Deprovision Your Cloud Users Like a Pro

Your organization needs a comprehensive deprovisioning strategy to accompany your use of SaaS apps. In this session, Joe Ochs of Backupify shows you how easy user lifecycle management can be. Read on.

Best Practices for Pulling Identities Together: What Enterprises Are Doing Now to Stay Secure

Join Microsoft MVP Sander Berkouwer and come away from this session with actionable tactics for minimizing the gaps in your company's identity and authentication security posture. Learn more.

How Active Directory Groups Get You Hacked

Join Microsoft MVP and book author Don Jones for a close look at how groups can set you up for an intrusion, and how you can wrangle them into a safer position while minimizing your own work effort. Register now.

A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.

A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.

A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.

A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.

A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.

IT Asset Management: It’s More than Just a Spreadsheet of Machines!

Hear Dale Meredith, Microsoft MVP and Quest KACE’s James Rico as they discuss approaches and best practices of IT asset management and how building a solid asset management foundation can lead you down a path of unified endpoint management. Watch it now.

Netwrix Auditor Product Demo

In this technical webinar, we will guide you through the key functionality of Netwrix Auditor 9.5. You’ll learn how to use Netwrix Auditor more effectively to audit critical systems such as Active Directory, Windows file servers, Microsoft SQL Server and many more.

Benefits of Moving Hyper-V Disaster Recovery to the Cloud

By attending this session, you will learn how to plan a customized and right-sized DRaaS solution featuring Veeam Backup & Replication for your Hyper-V environment.

Availability On-Premises, In The Cloud And On The Go with Veeam Agent for Microsoft Windows

Are you looking to find out more about avoiding downtime and data loss quickly and easily for Windows-based physical or public-cloud workloads? How can you bring more Availability to these workloads? Learn more.

How the Cloud Drives Availability and Data Protection

Data is to this century what oil was to the last century – a driver of massive growth and change. This is not just about technology, but also new ways of doing business. And yet, Availability and data protection are among the biggest challenges facing IT leaders today, particularly with the recent increases in cyberattacks, such as ransomware, which have affected companies of all sizes. Learn more.

Availability Outside of the Data Center

Take a deep dive into how Veeam® Agents deliver Availability for Windows-based physical servers and Linux-based server instances. We’ll discuss how to meet RPOs and reduce the risk of data loss for laptops and tablets outside the corporate network. We will also discuss how you can solve key challenges like managing remote offices, offering Backup as a Service and Disaster Recovery as a Service, and more.

To The Cloud, From The Cloud, Within The Cloud

Learn from Mike Jones on what modern approaches exist to do what you want with your data in the cloud. Whether you are starting your cloud journey, already underway or not sure how to meet your technical and business requirements in a cloud-ready world, there is something for everyone on this webinar. Watch it now.

Hyper-V 2016: The Next Generation of Virtualization

Watch this interactive, demo-filled webinar that will provide all of the details on the largest announcements within Hyper-V 2016. Join Microsoft Cloud and Datacenter Management MVP, Clint Wyckoff, as he illustrates the pieces of Hyper-V 2016! Learn more.

Total Control and Protection of Email Data with Veeam Backup for Microsoft Office 365

Whether you have completely migrated to Microsoft Office 365, or have a hybrid exchange and Office 365 deployment, your business objectives remain the same. You must remain in control of your data and be able to backup and recover Microsoft Office 365 items at all times. Veeam® Backup for Microsoft Office 365 enables you to mitigate the risk of losing access to Office 365 email data and ensure Availability for users. Learn more.

Office 365 Data Protection: Mind the (Backup) Gaps

Join us for this live webinar on how to best protect your Office 365 data.

2017 Survival Guide: Disaster Recovery in the Age of Ransomware

Listen to Microsoft MVP Tim Warner for a discussion on the new ransomware trends from 2017; how ransomware targets your end users; proactive security solutions; and much more.

Defeating the Encrypted Threat!

Once you have seen what the bad guys have been up to today, you will be exposed to a crash course of security policy management and network security architecture design that will help prevent the breach of tomorrow.

How to Rapidly Deploy Active Directory

Join Greg Shields, author evangelist with Pluralsight, in this exploration into rapid deployment for Active Directory. Greg will show you two easy-to-generate scripts that use PowerShell Desired State Configuration to swiftly hydrate a test-ready Active Directory into existence. Learn more.

IT Juggling Just got Easier

Learn time saving tips and get a tour of the latest SmartDeploy features, driven by customer requests, including one-click User Data Migration, native multicast, Wake on LAN, and scheduled zero-touch deployments.

Containing Attacks on the Endpoint

Attend this 30-minute webinar and learn how the just-released CyberArk Endpoint Privilege Manager solution can: strengthen your existing endpoint protection to contain threats early in the attack life cycle; enforce least privilege on the endpoint without negative usability impact; mitigate the risks of ransomware; get a "privileged" view of this critical layer of protection and learn how you can block and contain attacks at the endpoint before they stop your business.

An Attack Pathway Into Your Organization? There's an App For That

Topics to be discussed and demonstrated in this webcast: ASCP configuration and operation; and which product is right for which scenario.

Optimize Exchange Performance

Attend this webcast for an introduction to troubleshooting Exchange on-premises, hybrid, and Exchange Online.

Dear Office 365, I Need Backup

When considering a move to Office 365, chances are you’re also building a backup strategy to support your new environment. Is a backup solution enough to answer your organization’s growing Office 365 needs? Join Office 365 expert Dr. Steve Marsh to learn how to appropriately plan your backup strategy and proactively prepare for the next phase of your organization’s Office 365 journey. Sign up now!

Modernizing Active Directory for Azure and Office 365

Moving to the cloud can drastically reduce maintenance costs of IT infrastructures. But how easy is it to get there? In this webcast, you’ll learn why modernizing your AD is key to a successful migration.

Hybrid Directory Governance: Understanding How Security Works in a Hybrid Active Directory Environment of On-Premises AD/Azure AD and Office 365

Microsoft’s security for Office 365 and Azure AD can be ineffective if your on-premise AD protection isn’t tight. Join Randy Franklin Smith for tips on how to integrate on-premises and Azure ADs for better security.

The Cloud, Office 365, Azure – It’s Time. Are you and your Active Directory Ready?

Discover the differences between an on-prem and Azure AD, learn about common challenges when incorporating a new, cloud-based identity service and see why it’s essential to modernize your on-prem AD before the move.

Active Directory Disasters — Plan Ahead! Five Dreaded Days that Can Ruin Your Whole Vacation

Watch this on-demand webcast to hear experts explain and rank common AD disasters using a scale of vacation nightmares. Then discover how you can easily prevent them with AD disaster recovery solutions.

The Real Cost of Managing Active Directory Groups

In this interactive webcast, join industry experts as they discuss what’s really involved in managing AD Groups, how to calculate the cost of Group Management, is there tangible savings in automating AD Group Management and much more.

SharePoint 2016 Migration Success Takes Three Actions

Your successful migration to SharePoint 2016 takes three actions: analysis, optimization and planning. It also takes a lot of questions that require answers. What do you have? What do you move? What do you archive? What problems might occur? What do users expect? In this webcast, you’ll learn what to ask and how to find answers. Read on.

Why you should care about Identity-as-a-Service (IDaaS): An Expert’s perspective

Join featured speakers, Rackspace and 10th Magnitude on a round table discussion on the concepts of cloud form factors leading to hybrid cloud, the advantages of using hybrid cloud technologies, and a look at how the Microsoft Azure platform enables efficient and effective hybrid cloud computing. See how organizations are reducing complexity and management costs by leveraging managed hosting in hybrid cloud environments through real-world use cases.

Hybrid Clouds: Azure Real-World Use Cases

Join featured speakers, Rackspace and 10th Magnitude on a round table discussion on the concepts of cloud form factors leading to hybrid cloud, the advantages of using hybrid cloud technologies, and a look at how the Microsoft Azure platform enables efficient and effective hybrid cloud computing. See how organizations are reducing complexity and management costs by leveraging managed hosting in hybrid cloud environments through real-world use cases.

IAM as a Service (IAMaaS) is a reality today. Find out if it’s right for your organization.

Explore if identity and access management as a service (IAMaaS) is right for you? Discover how IAMaaS measures up against traditional on-premise solutions, and determine which scenario is the right fit for your organization.

Understanding Identity and Access Management Compliance Requirements for PCI, HIPAA, SOX and ISO 27001

Discover the role that IAM plays in compliance and security. In this webcast, you’ll hear how about the latest PCI, HIPAA, SOX and ISO 27001 requirements.

Understanding the NIST Cybersecurity Framework: Different, Scalable and Practical

In this on-demand webcast, learn about the National Institute of Standards and Technology’s (NIST’s) cybersecurity framework, A NIST expert walks you through the Framework for Improving Critical Infrastructure Cybersecurity.

Protecting AD from Malicious and Accidental Destruction

Find out how to deal with the four types of AD disasters, prepare for and execute a successful forest recovery and automatically protect your AD. Watch this on-demand webcast.

Anatomy of an Insider Threat—Protecting Active Directory is Key

Learn about the five key insider threat trends facing organizations, the importance of protecting your AD and the best ways to achieve that goal.

Top 10 Indicators of Tampering with Privileged Accounts

Watch this on-demand webcast to see how to tell when your privileged accounts are being tampered with, and how administrative authority can be obtained or stolen at each level.

Lync Quality of Experience: Easing Everyday Pain Points

Learn how to detect and resolve problems in your messaging sytem quickly and painlessly, including how to: get alerts about bottlenecks and deviations; meet service level agreements for performance and availability; reduce troubleshooting costs.

IT Security: Why One Layer of Defense Is Not Enough

Join security expert, Ian Trump, as he explores cybercrime and its impact on small and mid-sized businesses, how businesses need to protect themselves from all angles and why using layered security is crucial to ensure it doesn’t happen to you.

OData External Data Integration Strategies for SaaS

Watch this demo to see how OData hybrid data connectivity enables self-service integration with Oracle Service Cloud Accelerators and Salesforce Connect, both powered by OData.

Supporting Macs and Mobile Devices in the Enterprise: Balancing IT Control Vs. User Productivity

Guest speaker, Forrester Research Principal Analyst David K. Johnson will explore challenges and discuss techniques to allow enterprises to easily and seamlessly add Macs, tablets and smartphones to the corporate infrastructure leveraging tools, policies and processes that are already in place.

Webinar featuring Forrester Research: The Human Firewall – Strengthening Email Security

Listen to guest speaker Nick Hayes from Forrester Research and Steve Malone from Mimecast for insight into how technology and awareness together can strengthen defenses.

Office 365 Email Migration Surprises – Rhetoric vs. Reality

During this 37 minute webinar, Microsoft Office365 MVP J. Peter Bruzzese, will reveal the post migration surprises he’s heard most frequently from companies that have already made the move. He’ll provide his realistic assessment of what to expect and what to plan for when moving to the cloud.

Planning and Executing Your Migration to Exchange Online

Join Nathan O’Bryan (MCSM: Messaging and MVP: Office 365) and Vadim Gringolts (CTO, Binary Tree) for an unscripted discussion about planning your migration to Exchange Online in Office 365.

Leverage System Center Operations Manager to monitor your VMware environment efficiently and effectively

Want to monitor your VMware environment efficiently and cost-effectively? You can. Leverage your in-house System Center Operations Manager to apply the same great SCOM benefits to your virtualized environment with our VMware Management Pack.

Cloud First, Mobile First SharePoint

In this webinar, Office 365 MVP Christian Buckley will discuss the future of mobility, the expanded vision of team and document collaboration, and the value of a productivity focus.

Making Security a Business Enabler

Empower your business by transforming security into an enabler that provides users with access to the data and applications they need to be productive at work.

Windows Server 2003 End of Life

In this webinar, we will take a deeper look at your options and break down the steps involved in each, with specific emphasis on available print server migration paths.

Best Practices: Global Data Backup in Distributed Enterprises

In this best practices webinar, we show you how practical steps and solutions can help you achieve a higher level of business continuity and storage replication. This includes the implementation of a real-time, synchronized and secure back-up system that automates processes and gives you peace of mind to focus on the day-to-day tasks at hand. Read on.


This is a test.


This is a test.

Myths and Truths about I/O Acceleration in Virtual Environments

Learn about the root cause of I/O performance problems in a virtual environment and how organizations can avoid overbuying server and storage hardware to improve application performance.

Exchange ActiveSync Best Practices and Pitfalls

Join us to get prepared for avoiding the pitfalls of wide-scale EAS deployments. It includes both practical tips and tricks for managing EAS and a guide for how to best find and address common issues. Register now!

Leveraging Office 365 in Your Digital Transformation

Successfully migrating and modernizing content to SharePoint, OneDrive for Business, and Teams can establish the first milestones in the digital transformation process. Learn more.


Summary of this wonderful webcast goes right here. ROCK ON!!!