Event Details
In the age of bring-your-own-device (BYOD) policies and internet-of-things (IoT) technologies, keeping track of every endpoint connected to your network can be a challenge — especially for IT departments working at educational institutions with limited budgets.
In this session, Harjit Dhaliwal, senior systems administrator and Microsoft MVP, and Richy Anderson, senior systems consultant at Quest, highlight how a unified endpoint management (UEM) solution can help educational institutions automate asset management, patch management, software distribution, and image deployment and more.
You’ll learn how to:
Plus, hear about how Florida State University was able to automate their patch management to gain peace of mind that their endpoints were protected.
Speakers
Richy Anderson, Senior Systems Consultant, Quest Software
Harjit Dhaliwal, Senior Systems Administrator
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Cyberattacks are increasing across all industries, and cybercriminals are savvier than ever. While the total number of IT vulnerabilities are decreasing, the number considered critical is on the rise - and so are the number of actual security exploits.
Most cyberattacks start where your company is most vulnerable – at your end user devices. With the proliferation of smartphones, tablets, bring-your-own-device (BYOD) programs, and internet-of-things (IoT) devices, protecting your endpoints has become increasingly more complex.
In this session, we’ll show you:
• Best practices to address endpoint complexity and growth
• Five crucial steps to battle endpoint cybercrime
• The key components of an endpoint security strategy
• How unified endpoint management (UEM) can help
Plus, get a live demonstration the KACE portfolio of products help eliminate complexity and simplify your move to UEM.
Speakers
Bruce Johnson, Outside Sales Consultant, Quest KACE
David Davis, Partner & VExpert, ActualTech Media
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Stressed at his demanding IT admin job, Nick became an IT ninja using Quest KACE to streamline his work day and battle increasing cybercrime.
Thanks to KACE, Nick now has heightened senses to see the future and stay ahead of cybercriminals and their malicious attacks. He secures every endpoint with timely, consistent, automated patching, and every device is updated with the latest anti-virus software. He ensures that each person has appropriate network rights, eliminating the chance of accidental or intentional malware infection and data theft.Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
In the private sector, they call it “doing more with less.” In education, it is an “unfunded mandate.” Whatever you call it in your industry, it seems we are expected to accomplish all the tasks at hand without adding more employees to help — i.e., without increasing the bottom line.
In this on-demand webcast, IT Pro Today contributor Eric B. Rux and Quest’s Senior Systems Consultant Richy Anderson look at the challenges of the ever-growing IT infrastructure and how to manage it. Here’s what they’ll cover:
Speakers
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Your service desk is the face of your organization’s IT department, and it just so happens to be one of the most popular features of our KACE Systems Management Appliance (SMA) that has generated a lot of “outside of the box” thinking with our customers.
Unlike other service desk solutions, the KACE SMA service desk is integrated with IT asset management (ITAM), providing you with additional functionality such as configuration management, robust reporting, and alert capabilities. It also includes advanced features that make it possible to automate repetitive tasks and implement comprehensive incident management or ticketing – so you’re able to keep users happy while enduring IT SLAs are met and productivity is high.
Watch this webcast to hear from our experts and other members of the KACE Virtual User Group as they show you best practices and tips and tricks that’ll help you fully realize the potential of the KACE SMA service desk, including how to:
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Learn how KACE SMA and Microsoft SCCM can work together:
Speakers
Richy AndersonEvent Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Statistics show that the average data breach goes undiscovered for 196 days, costing the organization that experienced the breach upwards of $7.6 million, and that doesn’t include the cost of loss of reputation and public confidence. It’s no wonder that security and breach-prevention is top-of-mind for the C-suite!
The unfortunate reality is that the devices your staff rely on every day to perform their job are one of the most common entry points for cyber-attackers, which is why they must be protected with strong and layered security. However, if your IT team is protecting endpoint devices manually, it becomes infinitely more complex, expensive and time consuming.
In this on-demand webcast, we’ll show you how unified endpoint management (UEM) solutions make it possible:
Plus, hear from a cybersecurity and endpoint device management expert, as well as get a walk-through of a powerful endpoint protection device.
Speakers
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Your customers’ endpoints are growing dramatically thanks to bring-your-own-device (BYOD) programs and internet of things (IoT) technologies. Keeping track of all of their traditional and mobile endpoints can be a challenge if they rely on manual processes or disparate, point solutions.
Join this webcast to learn how KACE can help your customers eliminate endpoint management complexity and become IT ninjas. Plus, discover how you can boost your margin and access new revenue streams – while guiding your customers down the path to endpoint enlightenment.
Intrigued? Register now for our 30-minute webcast and we will walk you through how to:
Speakers
Brian McGushin, DP & UEM Global Channel Sales Director
Aoife O’Driscoll, UEM Product Marketing Manager
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
In the next few years, there will be 25 million network connected devices, all subject to malware attack, and public sector networks are by far the biggest target. The Federal Information Technology Acquisition Reform Act is driving agencies to improve the management of their information assets and, through license compliance and up-to-date security patch adherence, to close the door to cyber-attacks.
This webinar explores best practices in disciplined practices such as patch management and strong network controls that agencies are using for endpoint management.
What will u learn
Speakers
Vincent Sritapan, Program Manager, Cyber Security Division, Homeland Security Advanced Research Projects Agency, DHS S&T
Dan Conrad, Federal CTO, Quest Public Sector
Jamie Cerra, Federal Solutions Consultant, Quest Public Sector
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Endpoint security remains a core challenge for many healthcare organizations. While the total number of IT vulnerabilities is decreasing, the number considered critical is on the rise — and so are the number of actual security exploits.
In this on-demand webcast, you’ll learn why you should develop a stringent endpoint security strategy, along with endpoint management best practices that ensure confidential patient data is secure and protected.
We’ll show you how to:
Speakers
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.