Event Details
In 2020, most businesses were forced to figure out how to maintain a productive work environment for their remote employees if they hadn’t already. But it quickly became clear that while most organizations may have a handle on productivity, their security stance is still questionable.
So, if this is an issue in your organization, how can you better manage the security of your remote workforce?
Join Quest KACE experts Jody Evans and James Rico for this on-demand webcast, as they discuss:
SpeakersJody Evans, Quest KACEJames Rico, Quest KACE
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Mitigate risk and optimize the value of your data enterprise assets .
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Today’s IT professionals are challenged in many ways when it comes to ensuring that data is kept available to the business. While there are various elements to any infrastructure that serves data to its users, without the data itself the business is likely to stop.
The cost of downtime further compounds data loss. When contending with anything from ransomware attacks to natural disasters, it is imperative that IT professionals need not just technology, but also a tested plan to execute. Join this session where we explore some of the ideas and technologies you can deploy to ensure that your data is available to your business.
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Using words like WannaCry and Petya around anyone in the technology industry is like saying the word “bomb” in front of the TSA. Why? Because of the impact cyberattacks have on businesses on a global level. The "business" of ransomware was estimated to be $20 billion globally in 2020. This represents roughly a 100% increase over 2019, proving that even though security is at the forefront of everyone's mind – and it is critical - we must remain diligent in ensuring we have a sound data protection strategy. In this session, we will discuss the current data landscape, ongoing industry improvements and trends that are affecting all businesses, whether they realize it or not. We’ll also look at solutions and techniques that will assist with your data empowerment data protection strategy.
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Data is king and, therefore, should be treated as such. Gone are the days where companies can look at their technology landscape one-dimensionally. With security being at the forefront of IT's mind, you must have a data resiliency strategy and go on the data protection offensive. Gaining visibility into company assets, proactively hardening your environment, and addressing your company's largest attack vector (social engineering) are imperative. In this session, we will introduce a different way of thinking about data protection which, if implemented, will allow you to stay one step ahead of the variables that negatively impact your business.
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Are there gaps in your business’s IT foundation? When it comes to securing your data, a faulty foundation will cause major damage to everything you’ve built on it – maybe not today - but soon. Because every device hitting your network is an attack vector. The bad guys are taking advantage of the current lack of control caused by a sudden flood of remote devices accessing your critical business data. But if you are practicing good IT security practices, you are dramatically less exposed. A lot is preventable by just practicing basic IT hygiene. Find out how to secure your foundation to prevent future damage to your business’s reputation and bottom line.
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Traditional endpoint management was challenging enough when your main worries were laptops and desktops attached to the corporate WAN. But now, thanks to the work-from-home explosion, your job has become even more difficult. Add to that the huge growth in iOS and Android devices, cloud computing and internet-of-things (IoT) technologies, and you are surely nursing a migraine. This new, distributed environment requires modern ways to manage your endpoints, wherever they are. You need a unified endpoint strategy that allows you to enroll, discover, manage and secure every type of device in your environment, with confidence and calm.
Watch this on-demand webinar exploring how you can truly protect all of your company's endpoints using both modern and traditional management methods.
SpeakersJoin Quest experts Ken Gavin and James Rico along with Scott Lowe from ActualTech Media for this on-demand webinar exploring how you can truly protect all of your company's endpoints using both modern and traditional management methods.
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
The shift to remote work has dramatically changed IT management for organizations of all types. For IT teams supporting educational institutions, the complications are magnified as students, faculty and administrative staff all need to stay productive and get their work done securely.
IT staff members are challenged to manage a range of personal and school-issued devices used to access organizational applications, resources and data. Teachers can be especially vulnerable to attack because their devices often don’t meet organizational security standards and they frequently have enhanced access permissions.
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Unified endpoint management can dramatically increase end-user productivity. In this session, you’ll learn the secrets that help and how you can easily implement them. With step-by-step guidance, you’ll simplify and streamline unified endpoint management, privileged management and mobile device management.
Hosted by Gary S. Miliefsky, Publisher of Cyber Defense Magazine, and featuring expert advice from Jason Morano of Quest Software, you’ll discover:
• A holistic view of UEM that most IT folks don't know
• How to deal with user challenges, including privileged management
• Why mobile device management doesn't have to be your biggest headache
• And much more
SpeakersJason Morano is a senior Quest® KACE® presales engineer and a subject matter expert for unified endpoint management, privileged management, mobile device management and user security. He has a 20+ year career, starting in IT support, then finishing his commercial IT career working as a security analyst in the banking industry. He has been advising Quest customers for eight years in securing their endpoint and user environment using industry best practices. Currently residing in South Florida, Jason is a former Long Islander with a passion for anything technical.
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.
Event Details
Cyber-security is a "top-down" approach, and with the speed at which technology is advancing, we need to make sure that our security profile is on the cutting edge and everyone is adhering to all the changes and challenges that appear daily.
A recent study shows that over 60% of IT decision-makers agree that the C-Suite is the most likely group within their organization to ask for relaxed mobile security protocols.
SpeakersIn this on-demand webcast, Pluralsight Author, cybersecurity consultant and trainer Dale Meredith, and Senior Product Manager for KACE® by Quest®, Ken Galvin discuss the issues and solutions to help plug these growing attack vectors.
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.