Ensuring Rock Solid Unified Endpoint Management

Date: Wednesday, July 26, 2017 at 11:00 AM PDT / 2:00 PM EDT

Rock-solid unified endpoint management (UEM) is possible when you have the right tools and right techniques. Join us at this Redmond webinar where we’ll reveal best practices that can help you manage all the devices connecting to your infrastructure.

Join Microsoft MVP Nathan O’Bryan and Quest engineer Bruce Johnson in an open discussion about:

  • Unified endpoint management and what it means
  • Considerations for consistent management of all your devices
  • Potential pitfalls and challenges of combining management of diverse devices

Read More

Extending the Power BI Adoption Pack capabilities for Office 365

Join Karl Sand, Product Manager, NA & Nathan O’Bryan, Microsoft MVP on June 21st to learn about the new Power BI Office 365 Adoption Dashboard and feature enhancements made to the Office 365 Admin Center. In this webinar, we will show you how accessing more detailed information about user activity can help identify groups that need more training and incentives to utilize certain workloads. Find out how you can improve your operational performance and help increase user productivity through the adoption of Office 365 capabilities.

Read More

Learn How To Protect Against Ransomware

Date: Tuesday, June 27th at 11am PDT / 2pm EDT

Speaker: Nathan O'Bryan, Microsoft MVP

One of the largest threats to IT departments today is ransomware. Join us for this Redmond webcast to learn how to protect your organization against these attacks. Microsoft MVP Nathan O'Bryan will discuss actionable tips you can use to ensure your data is protected from ransomware attacks.

Read More

4 Ways Identity Can Improve Your Security Posture

Date: Wednesday, June 21 at 11am PDT / 2pm EDT
Speakers: Nathan O’Bryan, Microsoft MVP and Krystal Wang, Sr. Manager, Security Solutions, Okta 

Most organizations understand strong authentication is a necessary part of a good security practice. But because organizations have much less control over the devices, services, and people in their environment today, identity not only becomes the critical control point, but the information stemmed from it can be leveraged to strengthen existing processes as well as integrate with other security investments.

Join this webinar to learn why identity must not simply be a "first step" but the foundation for the future of security as well as 4 ways to leverage identity to enhance your security posture.

Read More

How Phishing and Social Engineering Became the #1 Attack Vector

Date: March 23rd at 11am PDT / 2pm PDT

The number of ransomware attacks quadrupled in 2016 and are expected to double again in 2017. 

Hackers are more resourceful than ever - using social engineering to aid them in creating more believable phishing emails, CEO fraud attacks, even dropping USB sticks in and around businesses. As computer security becomes more sophisticated, the most common way for cybercriminals to access your systems has become simply to ask.

Join Nathan O'Bryan as he explores how Phishing and Social Engineering have become the #1 attack vector all IT departments need to worry about, and what you can do to ensure your data remains in your control like mobilizing your end-users as your last line of defense.

Read More