Main Navigation Section
External Id
1186
PD Domain
Data Protection and Unified Endpoint Management
PD SolutionArea
Unified Endpoint Management

Work from Home Do's and Don'ts

Event Details

On Demand
  • Recorded Date:Apr. 02, 2020

How and where your organization conducts business pretty much changed overnight. And since then, your IT team has been working overtime to meet the systems management needs of your newly mobile or remote workforce.

At Quest KACE, many us of us have been part of a remote workforce for years, and we’ve learned a thing or two about work-from-home. In this webcast, we’ll share some tips and tricks as well as sound advice to that’ll help you and your colleagues survive and thrive while working anytime and anywhere.

We’ll touch on:

  • Work/life balance for the newly remote – it’s not all Netflix and Hulu
  • How to set boundaries and still get work done - even with kids or pets
  • Why you need a designated workspace and a routine – away from the kitchen
  • Remote workplace etiquette and how to tackle conference calls – dressing from the waist up

Event Details

On Demand
  • Recorded Date:Apr. 02, 2020

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Webcast: Achieve Endpoint Compliance in 2 Easy Steps

Event Details

On Demand
  • Recorded Date:Mar. 25, 2020

As an IT professional, GDPR, HIPAA, CCPA, PCI and FITARA compliance continues to be a challenge, especially when endpoint proliferation, BYOD and IoT figure heavily into your IT landscape. 

In this webcast, Quest KACE specialist, Jillian Salamon, discusses how to effectively track all endpoints touching your network while making sure you adhere to software and regulatory compliance rules. You’ll learn how to:

  • Maintain hardware and software license compliance
  • Address endpoint compliance regulations for data protection and security
  • Easily implement tools that simplify and streamline the process

Event Details

On Demand
  • Recorded Date:Mar. 25, 2020

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Securing Your Endpoints | Healthcare Cybersecurity Webcast

Event Details

On Demand
  • Recorded Date:Dec. 10, 2019

Healthcare cybersecurity is rapidly evolving, and while securing your endpoints represents just one aspect of your broader security strategy, it continues to one of the most challenging. You must be able to keep your healthcare system and sensitive patient data secure while managing your growing network and protecting your organization from cyberthreats.

In this on-demand webcast,  you’ll hear from one of the nation’s leading chief information security officers (CISO), Sriram Bharadwaj, of University of California, Irvine, Healthcare, who will share best practices that’ll help you:

  • Address risk management as an enterprise
  • Discover, manage and secure your endpoints
  • View endpoint security as it relates to your broader enterprise cybersecurity strategy
  • Learn how innovative CISOs engage end users and the endpoint

Speakers

Sriram Bharadwaj - University of California, Irvine, Healthcare

Rajiv Leventhal - Healthcare Innovation (formerly Healthcare Informatics)

Jillian Salamon - Quest KACE

Event Details

On Demand
  • Recorded Date:Dec. 10, 2019

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Upgrading to Windows 10: Strategies to Simplify Your Migration

Event Details

On Demand
  • Recorded Date:Nov. 19, 2019

If like most IT admins, you’re probably not itching to get started on your Windows 10 upgrade. But before you do, it’s crucial that you have a process and strategy in place to address any obstacles that could impede your path.

In this on-demand webcast, we’ll show you how to simplify your migration and avoid common issues like business disruptions, insecure configurations, underestimated timeframes and excess costs that can burden your IT team and organization.

Presented by Microsoft Cloud and Datacenter MVP, Nick Cavalancia, and KACE experts, Ken Galvin and Corey Serrins, you’ll learn:

  • Common Windows 10 migration hazards
  • How to build an efficient and effective upgrade strategy
  • Tools that can help you streamline and achieve migration success

Speakers

  • Nick Cavalancia
  • Ken Galvin
  • Corey Serrins

Event Details

On Demand
  • Recorded Date:Nov. 19, 2019

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Avoiding the Ransomware Rampage: 5 Key Steps to Staying Secure

Event Details

On Demand
  • Recorded Date:Oct. 16, 2019

Healthcare organizations are particularly vulnerable when it comes to viruses and ransomware attacks. From laptops and smartphones to tablets and internet-of-things (IoT) devices, the endpoint environment within hospitals and care provider offices has gotten more and more complex. And each endpoint presents a potential gateway into organizational networks. Because doctors, nurses and technicians need 24/7 availability of these technologies to do their jobs of taking care of patients, endpoint security is a top concern for IT managers at healthcare organizations.

In this on-demand webcast, Timo Weberskirch of Quest Software shares five steps for improving endpoint security within the healthcare environment. You’ll explore KACE tools and how they can help you:

  • Streamline inventory management
  • Automate patch deployment
  • Track, lock and wipe sensitive data from mobile devices

Speakers

  • Timo Weberskirch

Event Details

On Demand
  • Recorded Date:Oct. 16, 2019

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

A Three Step Approach to Keeping Your Network Safe from Ransomware

Event Details

On Demand
  • Recorded Date:Sep. 25, 2019

Don’t get snared in ransomware attacks by basing your defenses around a security product rather than a strategy. While security products do play an undeniably important role in the fight against ransomware, the only way to ensure that an organization is truly protected is to base protective efforts around a well-thought-out defensive strategy.

In this webcast, you’ll learn the three crucial steps and components of cybersecurity strategy that can help you to gain the upper hand and strengthen your ransomware defenses.

You’ll learn:

  • How to detect previously overlooked vulnerabilities that could be exploited
  • Key features around patching and software deployment through a live demo
  • Strategies for keeping your endpoints up to date

Speakers

  • Brien Posey
  • Jillian Salamon

Event Details

On Demand
  • Recorded Date:Sep. 25, 2019

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Get Ready for KACE SMA 10.0!

Event Details

On Demand
  • Recorded Date:Aug. 27, 2019

KACE SMA 10.0 is a major update, improving upon many of the solution’s traditional and popular features, while adding new support and functionality. Highlights include:

  • Service Desk
  • Endpoint Communications
  • Platform / Infrastructure
  • KACE GO
What this video to learn more about this important product release!

Speakers

Ken Galvin, Senior Product Manager

Event Details

On Demand
  • Recorded Date:Aug. 27, 2019

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Preventing Cyberattacks before they happen - the state of security.

Event Details

On Demand
  • Recorded Date:Sep. 02, 2019

Organizations face tremendous challenges when trying to keep pace with the proliferation of network-connected devices and an ever-evolving IT industry.
Protecting the network used to be enough and remains essential, but it's no longer enough to secure applications and data. With the volume of cyber incidents increasing exponentially, it is vital that your organization know what's
not only connected to your network but their health.

What will u learn

In this webinar, we will discuss how organizations like you can successfully implement KACE and identify what devices are on your network, what their current state is, and how to address security risk before it’s too late.
After all, knowledge is power.

Speakers

Kent Feid, Head of Technical Business Development

Ken Galvin, Senior Product manager for KACE SMA

Event Details

On Demand
  • Recorded Date:Sep. 02, 2019

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Endpoint Security in the Wake of EternalBlue

Event Details

On Demand
  • Recorded Date:Jul. 30, 2019

With cyberthreats such as EternalBlue on the loose, your endpoints are more vulnerable than ever. EternalBlue exploits older Windows systems and unpatched software to allow hackers to spread malware faster. The 2017 WannaCry ransomware and NotPetya cyberattack were both facilitated by the EternalBlue exploit. Estimates say the WannaCry attack alone affected more than 200,000 computers across 150 countries, causing hundreds of millions of dollars in damage.

Don’t be the next victim. If you can’t see what devices are connected to your network, you can’t possibly manage and secure them. Join KACE experts Jamie Cerra and Ken Galvin to learn the first critical steps you can take to prepare for the next cyberattack:

  • Discover exactly what is on your network.
  • Automate your inventory management.
  • Distribute anti-virus software to all endpoints.
  • Automate patch management and vulnerability scanning.

Event Details

On Demand
  • Recorded Date:Jul. 30, 2019

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Automate Endpoint Security Patching with Quest KACE

Event Details

On Demand
  • Recorded Date:Jun. 18, 2019

Today’s business users require more devices than ever before to get their jobs done — laptops, smartphones, tablets, internet-of-things (IoT) technologies and more. That means, as an IT professional, your job of protecting your system perimeter is getting more and more complex. How many different tools are you juggling to manage endpoint security?

Streamline management and automate patching with one unified solution to ensure that your network is protected from potential cyberattacks. In this on-demand webcast, experts from the Spiceworks Community and Quest review how you can tackle your security challenges with KACE.

Here’s what you’ll learn:

• How to save time and close your security gaps with automated patch management

• How to stay ahead of cybercrime with vulnerability scanning

• How to keep your anti-virus software updated across your endpoint landscape

• How you’ll benefit from using just one tool to automate your endpoint security over multiple point solutions

Speakers

Bruce Johnson, Outside Sales Consultant, Quest KACE

Sam Pless, Systems Administrator

Event Details

On Demand
  • Recorded Date:Jun. 18, 2019

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share