Main Navigation Section
External Id
1186
PD Domain
Data Protection and Unified Endpoint Management
PD SolutionArea
Unified Endpoint Management

Enabling a Secure Environment Across Campuses

Event Details

On Demand
  • Recorded Date:Jun. 05, 2019

In the age of bring-your-own-device (BYOD) policies and internet-of-things (IoT) technologies, keeping track of every endpoint connected to your network can be a challenge — especially for IT departments working at educational institutions with limited budgets.

In this session, Harjit Dhaliwal, senior systems administrator and Microsoft MVP, and Richy Anderson, senior systems consultant at Quest, highlight how a unified endpoint management (UEM) solution can help educational institutions automate asset management, patch management, software distribution, and image deployment and more.

You’ll learn how to:

  • Build a five-step security strategy to protect student endpoints
  • Manage endpoint security across multi-campus sites
  • Automate and streamline summer image projects
  • Simplify systems management using a single software solution

Plus, hear about how Florida State University was able to automate their patch management to gain peace of mind that their endpoints were protected.

Speakers

Richy Anderson, Senior Systems Consultant, Quest Software

Harjit Dhaliwal, Senior Systems Administrator

Event Details

On Demand
  • Recorded Date:Jun. 05, 2019

Watch Your Free Webcast

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Battling Cybercrime with Unified Endpoint Management

Event Details

On Demand
  • Recorded Date:Jun. 06, 2019

Cyberattacks are increasing across all industries, and cybercriminals are savvier than ever. While the total number of IT vulnerabilities are decreasing, the number considered critical is on the rise - and so are the number of actual security exploits.

Most cyberattacks start where your company is most vulnerable – at your end user devices. With the proliferation of smartphones, tablets, bring-your-own-device (BYOD) programs, and internet-of-things (IoT) devices, protecting your endpoints has become increasingly more complex.

In this session, we’ll show you:

• Best practices to address endpoint complexity and growth

• Five crucial steps to battle endpoint cybercrime

• The key components of an endpoint security strategy

• How unified endpoint management (UEM) can help

Plus, get a live demonstration the KACE portfolio of products help eliminate complexity and simplify your move to UEM.

Speakers

Bruce Johnson, Outside Sales Consultant, Quest KACE

David Davis, Partner & VExpert, ActualTech Media

Event Details

On Demand
  • Recorded Date:Jun. 06, 2019

Watch Your Free Webcast

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

How Nick the IT Ninja Battles Cybercrime

Event Details

On Demand
  • Recorded Date:May. 30, 2019

Stressed at his demanding IT admin job, Nick became an IT ninja using Quest KACE to streamline his work day and battle increasing cybercrime.

Thanks to KACE, Nick now has heightened senses to see the future and stay ahead of cybercriminals and their malicious attacks. He secures every endpoint with timely, consistent, automated patching, and every device is updated with the latest anti-virus software. He ensures that each person has appropriate network rights, eliminating the chance of accidental or intentional malware infection and data theft. 

Watch our webcast to learn how Nick found IT enlightenment and reduced his anxiety around the risks of a data breach. Become an IT ninja like Nick and find your own peace of mind.

Event Details

On Demand
  • Recorded Date:May. 30, 2019

Watch Your Free Webcast

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

More Technology, More Problems: How IT Administrators Can Manage Complex Environments with Fewer Res

Event Details

On Demand
  • Recorded Date:Apr. 04, 2019

In the private sector, they call it “doing more with less.” In education, it is an “unfunded mandate.” Whatever you call it in your industry, it seems we are expected to accomplish all the tasks at hand without adding more employees to help — i.e., without increasing the bottom line.

In this on-demand webcast, IT Pro Today contributor Eric B. Rux and Quest’s Senior Systems Consultant Richy Anderson look at the challenges of the ever-growing IT infrastructure and how to manage it. Here’s what they’ll cover:

  • Why management matters in this current IT landscape
  • Real-world case studies
  • Endpoint security challenges
  • How to accurately monitor and patch endpoints to avoid security vulnerability
  • Solutions to help you manage more with less
  • How to automate your summer re-imaging project

Speakers

  • Richy Anderson - Sr. Systems Consultant
  • Eric B. Rux - IT Director

Event Details

On Demand
  • Recorded Date:Apr. 04, 2019

Watch Your Free Webcast

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Getting the Most from KACE SMA Service Desk

Event Details

On Demand
  • Recorded Date:Mar. 12, 2019

Your service desk is the face of your organization’s IT department, and it just so happens to be one of the most popular features of our KACE Systems Management Appliance (SMA) that has generated a lot of “outside of the box” thinking with our customers.

Unlike other service desk solutions, the KACE SMA service desk is integrated with IT asset management (ITAM), providing you with additional functionality such as configuration management, robust reporting, and alert capabilities. It also includes advanced features that make it possible to automate repetitive tasks and implement comprehensive incident management or ticketing – so you’re able to keep users happy while enduring IT SLAs are met and productivity is high.

Watch this webcast to hear from our experts and other members of the KACE Virtual User Group as they show you best practices and tips and tricks that’ll help you fully realize the potential of the KACE SMA service desk, including how to:

  • Utilize the powerful ticketing system across your IT environment
  • Encourage user self-sufficiency using the SMA end-user portal
  • Customize the KACE SMA service desk to fit organizational needs, such as employee onboarding processes

Event Details

On Demand
  • Recorded Date:Mar. 12, 2019

Watch Your Free Webcast

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Tech2Tech Talks: How KACE & SCCM Work Together

Event Details

On Demand
  • Recorded Date:Feb. 11, 2019

Learn how KACE SMA and Microsoft SCCM can work together:

  • Detailed Hardware Inventory
  • Software Inventory – detailed rollup, metering, and reporting
  • Complete Asset Management
  • Securing and patching your third party applications

Speakers

Richy Anderson

Event Details

On Demand
  • Recorded Date:Feb. 11, 2019

Watch Your Free Webcast

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Preventing Cyberattacks Before They Happen

Event Details

On Demand
  • Recorded Date:Jan. 22, 2019

Statistics show that the average data breach goes undiscovered for 196 days, costing the organization that experienced the breach upwards of $7.6 million, and that doesn’t include the cost of loss of reputation and public confidence. It’s no wonder that security and breach-prevention is top-of-mind for the C-suite!

The unfortunate reality is that the devices your staff rely on every day to perform their job are one of the most common entry points for cyber-attackers, which is why they must be protected with strong and layered security. However, if your IT team is protecting endpoint devices manually, it becomes infinitely more complex, expensive and time consuming.

In this on-demand webcast, we’ll show you how unified endpoint management (UEM) solutions make it possible:

  • Automate and enforce policy-based management
  • Meet software license compliance mandates
  • Keep systems updates and patched
  • Reimage endpoints and lock-down USB ports to prevent data-loss

Plus, hear from a cybersecurity and endpoint device management expert, as well as get a walk-through of a powerful endpoint protection device. 

Speakers

  • David Davis - Partner, ActualTech Media
  • Bruce Johnson - Outside Sales Consultant

Event Details

On Demand
  • Recorded Date:Jan. 22, 2019

Watch Your Free Webcast

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Help Your Customers Become IT Ninjas With KACE

Event Details

On Demand
  • Recorded Date:Jan. 16, 2019

Your customers’ endpoints are growing dramatically thanks to bring-your-own-device (BYOD) programs and internet of things (IoT) technologies. Keeping track of all of their traditional and mobile endpoints can be a challenge if they rely on manual processes or disparate, point solutions. 

Join this webcast to learn how KACE can help your customers eliminate endpoint management complexity and become IT ninjas. Plus, discover how you can boost your margin and access new revenue streams – while guiding your customers down the path to endpoint enlightenment. 

Intrigued? Register now for our 30-minute webcast and we will walk you through how to:

  • Secure your customers network and data from cyberthreats
  • Help customers meet software license compliance mandates
  • Register as a partner and close your first KACE deal within 3 months
  • Easily uncover opportunities with KACE and earn up to 49% margin

Speakers

Brian McGushin, DP & UEM Global Channel Sales Director

Aoife O’Driscoll, UEM Product Marketing Manager

Event Details

On Demand
  • Recorded Date:Jan. 16, 2019

Watch Your Free Webcast

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

What is Next for Government. A New Approach to Endpoint Management

Event Details

On Demand
  • Recorded Date:Oct. 24, 2018

In the next few years, there will be 25 million network connected devices, all subject to malware attack, and public sector networks are by far the biggest target. The Federal Information Technology Acquisition Reform Act is driving agencies to improve the management of their information assets and, through license compliance and up-to-date security patch adherence, to close the door to cyber-attacks.

This webinar explores best practices in disciplined practices such as patch management and strong network controls that agencies are using for endpoint management.

What will u learn

  • Review GAOs recommendations for implementing sustainable processes for securing network devices, patching vulnerable systems and replacing unsupported software.
  • Delineate methods being used by agencies to keep software continuously updated through an automated process that precludes time-consuming manual software maintenance.
  • Identify methods to employ mobile device management to control and build government bring your own device (BYOD) programs.
  • Explain the benefits of third-party patching, USB port security, and developing a least privileged environment as part of the overall strategy.

Speakers

Vincent Sritapan, Program Manager, Cyber Security Division, Homeland Security Advanced Research Projects Agency, DHS S&T

Dan Conrad, Federal CTO, Quest Public Sector

Jamie Cerra, Federal Solutions Consultant, Quest Public Sector 

Event Details

On Demand
  • Recorded Date:Oct. 24, 2018

Watch Your Free Webcast

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Components of Strong Cybersecurity Program - A Closer Look at Endpoint Security Best Practices

Event Details

On Demand
  • Recorded Date:Dec. 18, 2018

Endpoint security remains a core challenge for many healthcare organizations. While the total number of IT vulnerabilities is decreasing, the number considered critical is on the rise — and so are the number of actual security exploits.

In this on-demand webcast, you’ll learn why you should develop a stringent endpoint security strategy, along with endpoint management best practices that ensure confidential patient data is secure and protected.

We’ll show you how to:

  • Develop and implement an endpoint protection strategy
  • Identify shifts in usage patterns, security architectures and threat profiles
  • Properly manage endpoints in order to gain clinical, business and IT agility
  • Evolve your endpoint security strategy over time

Speakers

  • Gabriel Gracia - Security & Infrastructure Manager, University of California, Irvine
  • Michael Archuleta - MBA/CIO/HIPAA/Information Security Officer, Mt. San Rafael Hospital
  • Jonathan McCracken - Quest KACE expert

Event Details

On Demand
  • Recorded Date:Dec. 18, 2018

Watch Your Free Webcast

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share