Main Navigation Section
External Id
1186
PD Domain
Data Protection and Unified Endpoint Management
PD SolutionArea
Unified Endpoint Management

KACE KKE: What’s new in SMA 14.0

Event Details

On Demand

Watch the first installment of our webcast series as we highlight the exciting new changes in SMA 14.0. Our panel of experts discusses the enhancements and improvements to the SMA and their impact on you as a customer.

Speakers:

  • Jillian Salamon, Solutions Consultant
  • Mark Gonzales, Services Manager
  • Juan Santamaria, Enterprise Technical Support

Event Details

On Demand

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

10 Dos and Donts of BYOD and Endpoint Management

Event Details

On Demand

Any device used to access your network is an endpoint, and every endpoint is a potential attack vector. These highly susceptible entryways give cybercriminals direct access to your highest value data assets.

Endpoints remain vulnerable behind your corporate firewall but are especially exposed when used remotely. As your IT environment grows, it becomes increasingly difficult to manage and secure every device connecting to your network.

In this session, endpoint management expert Preston Norman discusses:

  • The main do's and don'ts to keep endpoints secure
  • How to address endpoint management challenges
  • Building a tight BYOD and endpoint management strategy

Event Details

On Demand

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Protecting Your Endpoints from Ransomware: Top Do's, Don'ts and Gotcha

Event Details

On Demand

Last year, a Ponemon Institute survey found that enterprises have an average of 135,000 endpoint devices they have to secure. Even if you’re a midsized business or SMB, your number of endpoint devices is likely in the many hundreds or even thousands. That’s a staggering amount of entry points for attackers to target with ransomware. On top of that, we’ve all been told that ransomware is a matter of “when,” not “if.” How can you make sure that all of those endpoints -- each with different user, security and compliance requirements – don’t put the rest of your organization and its data at risk when one of them gets compromised? What makes a good ransomware security strategy, and how can you scale it as the number of endpoints in your organization grows? What are the top best practices for protecting against ransomware today – and what should you absolutely never do?

Event Details

On Demand

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Why Unified Endpoint Management & Why Now

Event Details

On Demand

One of the largest complexities of provisioning access in the enterprise is controlling, authorizing, and configuring devices to access enterprise resources. Unified Endpoint Management (UEM) allows IT to manage, secure and deploy corporate resources and applications to any device from a single console.

In practice, this breaks down into use cases for corporate owned devices, employee personal devices and a myriad of third-party contractors or service providers. In terms of operating systems, this can be extended to Mac OS, iOS, Windows in different flavors, and different Linux and Android distributions.

Watch Cyjax’s CISO Ian Thornton-Trump CD in a rapid-fire coffee talk session where he discusses why there is a new sense of urgency to revisit your endpoint protection policies due to:

  • A change in corporate attack surfaces
  • Weaponization of exploitations by threat actors to take hold of devices and leverage them as initial access vectors and/or platforms for credential compromise

Ensuring your 3rd parties follow end-point protection polices has never been so important. Watch this on-demand session today!

Event Details

On Demand

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Exploring Modern Management

Event Details

On Demand

At too many companies, either there’s no endpoint management system in place, or it’s been thrown together over the years, comprised by a mixture of aging solutions. So how do you tame the chaos of your company’s ever-expanding desktop PCs, laptops, mobile devices, and BYOD users? In order to implement a truly modern endpoint management system, you’ll first need to understand what modern endpoint management really is and how it can help you to manage your endpoints more efficiently and securely.

In this webinar you will:

  • Gain clarity around the definition of modern management
  • Understand investigation points regarding your business environment
  • Receive strategy insights for managing personal and corporate devices

Event Details

On Demand

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Quest Partner Update Webcast April Q1FY23

Event Details

On Demand

Quest presented its partner update webcast for Q1FY23 on April 20,2022.

In this exclusive partner webinar, Todd Werner, VP Channels and his team covered: 

  • Engagement opportunities for your customers
  • State of the business
  • Partner enablement & rebates
  • New features coming to the Quest Partner Portal

As always, for ongoing information on the Quest partner program, visit our partner portal.

SpeakersTodd Werner, VP ChannelsAndrew Clarke, Global Head of Channel &amp; Strategic AlliancesLaureen Smith, Senior Global Program Manager, Customer EngagementMalan Maw, Sr. Manager, Global Channel Marketing &amp; Programs

Event Details

On Demand

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Quest Partner Update Webcast February Q1FY23

Event Details

On Demand

Quest presented its partner update webcast for Q1FY23 on February 23, 2022.

In this exclusive partner webinar, Todd Werner, VP Channels and his team covered:

  • State of the business
  • 2021 Partner Awards
  • New MSP Rebates & Win Story 
  • OneLogin Training

As always, for ongoing information on the Quest partner program, visit our partner portal.

SpeakersTodd Werner, VP ChannelsJohn O&rsquo;Boyle, EMEA Sales DirectorAndrew Clarke, Global Head of Channel &amp; Strategic Alliances

Event Details

On Demand

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Quest Partner Update Webcast December Q4FY22

Event Details

On Demand

Discover the most recent partner program updates for the quarter. Watch the webinar on demand for the latest partner news such as: 

  • OneLogin acquisition update
  • How to continue growing business with Quest
  • State of the business
  • Partner Survey
  • Partner Program updates

As always, for ongoing information on the Quest partner program, visit our partner portal.

SpeakersTodd Werner, VP ChannelsMyl&egrave;ne Legresley, Director, Global Channel Marketing &amp; ProgramsAndrew Clarke, Global Head of Channel &amp; Strategic AlliancesDoug Erickson, VP Global Channels and Strategic Alliances, OneLoginVP Global Channels and Strategic Alliances

Event Details

On Demand

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Webcast: What’s New in KACE SMA 12.0

Event Details

On Demand

KACE by Quest has released the latest version of our Systems Management Appliance (SMA): 12.0.

To help you get the most out of SMA, we put together a webcast to provide a high-level overview of the appliance’s enhancements and new features, such as:

  • Support for hosting Nutanix
  • Support for using cloud-based offboard backup such as the Microsoft Azure Blob and Amazon S3 storage
  • The ability to manage up to 30% more endpoints using default configurations
  • The ability to suggest related knowledge base articles as Service Desk tickets are entered

Event Details

On Demand

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share

Optimize Remote Endpoint Management with KACE

Event Details

On Demand

View our On-Demand now to discover best practices that’ll help you efficiently manage and secure your endpoint systems while getting your global users up and running quickly. Plus, learn how you can start the new year off with new fitness attire from Lululemon, compliments of Quest Software.***

Join our Quest experts, Dave Hunter, to discuss how the KACE portfolio uniquely positions you to better manage your remote endpoints anytime, anywhere, so your systems are consistently updated and maintained.

You will learn how to:

  • Remotely image and deploy new laptops and mobile devices.
  • Patch vulnerable systems like endpoints and servers remotely.
  • Manage user privileges for new remote employees.
  • Set firewall settings, customize configurations and remote into devices.
  • Deliver a remote help desk experience that aligns user expectations with IT SLAs.

Event Details

On Demand

<h4>Watch Your Free Webcast</h4>

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share