Event Details
How and where your organization conducts business pretty much changed overnight. And since then, your IT team has been working overtime to meet the systems management needs of your newly mobile or remote workforce.
At Quest KACE, many us of us have been part of a remote workforce for years, and we’ve learned a thing or two about work-from-home. In this webcast, we’ll share some tips and tricks as well as sound advice to that’ll help you and your colleagues survive and thrive while working anytime and anywhere.
We’ll touch on:
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
As an IT professional, GDPR, HIPAA, CCPA, PCI and FITARA compliance continues to be a challenge, especially when endpoint proliferation, BYOD and IoT figure heavily into your IT landscape.
In this webcast, Quest KACE specialist, Jillian Salamon, discusses how to effectively track all endpoints touching your network while making sure you adhere to software and regulatory compliance rules. You’ll learn how to:
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Healthcare cybersecurity is rapidly evolving, and while securing your endpoints represents just one aspect of your broader security strategy, it continues to one of the most challenging. You must be able to keep your healthcare system and sensitive patient data secure while managing your growing network and protecting your organization from cyberthreats.
In this on-demand webcast, you’ll hear from one of the nation’s leading chief information security officers (CISO), Sriram Bharadwaj, of University of California, Irvine, Healthcare, who will share best practices that’ll help you:
Speakers
Sriram Bharadwaj - University of California, Irvine, Healthcare
Rajiv Leventhal - Healthcare Innovation (formerly Healthcare Informatics)
Jillian Salamon - Quest KACE
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
If like most IT admins, you’re probably not itching to get started on your Windows 10 upgrade. But before you do, it’s crucial that you have a process and strategy in place to address any obstacles that could impede your path.
In this on-demand webcast, we’ll show you how to simplify your migration and avoid common issues like business disruptions, insecure configurations, underestimated timeframes and excess costs that can burden your IT team and organization.
Presented by Microsoft Cloud and Datacenter MVP, Nick Cavalancia, and KACE experts, Ken Galvin and Corey Serrins, you’ll learn:
Speakers
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Healthcare organizations are particularly vulnerable when it comes to viruses and ransomware attacks. From laptops and smartphones to tablets and internet-of-things (IoT) devices, the endpoint environment within hospitals and care provider offices has gotten more and more complex. And each endpoint presents a potential gateway into organizational networks. Because doctors, nurses and technicians need 24/7 availability of these technologies to do their jobs of taking care of patients, endpoint security is a top concern for IT managers at healthcare organizations.
In this on-demand webcast, Timo Weberskirch of Quest Software shares five steps for improving endpoint security within the healthcare environment. You’ll explore KACE tools and how they can help you:
Speakers
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Don’t get snared in ransomware attacks by basing your defenses around a security product rather than a strategy. While security products do play an undeniably important role in the fight against ransomware, the only way to ensure that an organization is truly protected is to base protective efforts around a well-thought-out defensive strategy.
In this webcast, you’ll learn the three crucial steps and components of cybersecurity strategy that can help you to gain the upper hand and strengthen your ransomware defenses.
You’ll learn:
Speakers
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
KACE SMA 10.0 is a major update, improving upon many of the solution’s traditional and popular features, while adding new support and functionality. Highlights include:
Speakers
Ken Galvin, Senior Product ManagerEvent Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Organizations face tremendous challenges when trying to keep pace with the proliferation of network-connected devices and an ever-evolving IT industry.
Protecting the network used to be enough and remains essential, but it's no longer enough to secure applications and data. With the volume of cyber incidents increasing exponentially, it is vital that your organization know what's
not only connected to your network but their health.
What will u learn
In this webinar, we will discuss how organizations like you can successfully implement KACE and identify what devices are on your network, what their current state is, and how to address security risk before it’s too late.
After all, knowledge is power.
Speakers
Kent Feid, Head of Technical Business Development
Ken Galvin, Senior Product manager for KACE SMA
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
With cyberthreats such as EternalBlue on the loose, your endpoints are more vulnerable than ever. EternalBlue exploits older Windows systems and unpatched software to allow hackers to spread malware faster. The 2017 WannaCry ransomware and NotPetya cyberattack were both facilitated by the EternalBlue exploit. Estimates say the WannaCry attack alone affected more than 200,000 computers across 150 countries, causing hundreds of millions of dollars in damage.
Don’t be the next victim. If you can’t see what devices are connected to your network, you can’t possibly manage and secure them. Join KACE experts Jamie Cerra and Ken Galvin to learn the first critical steps you can take to prepare for the next cyberattack:
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Today’s business users require more devices than ever before to get their jobs done — laptops, smartphones, tablets, internet-of-things (IoT) technologies and more. That means, as an IT professional, your job of protecting your system perimeter is getting more and more complex. How many different tools are you juggling to manage endpoint security?
Streamline management and automate patching with one unified solution to ensure that your network is protected from potential cyberattacks. In this on-demand webcast, experts from the Spiceworks Community and Quest review how you can tackle your security challenges with KACE.
Here’s what you’ll learn:
• How to save time and close your security gaps with automated patch management
• How to stay ahead of cybercrime with vulnerability scanning
• How to keep your anti-virus software updated across your endpoint landscape
• How you’ll benefit from using just one tool to automate your endpoint security over multiple point solutions
Speakers
Bruce Johnson, Outside Sales Consultant, Quest KACE
Sam Pless, Systems Administrator
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.