Hi [[ session.user.profile.firstName ]]

Avaleris Inc

  • Date
  • Rating
  • Views
  • GDPR comes into effect on May 25th, are you compliant?
    GDPR comes into effect on May 25th, are you compliant? Nicolas Buache Recorded: May 17 2018 48 mins
    Let’s Talk GDPR – As of May 2018, a European privacy law, the General Data Protection Regulation (GDPR), will take effect and impose new rules on companies, government agencies, non-profits, and other organizations. GDPR applies to all companies, no matter where you are located.

    Discover how cloud solutions can help your organization achieve GDPR compliance.
    Learn from our experienced senior consultant as he demonstrates the vast functionality the Microsoft EMS Suite offers and how it can help you prepare for the GDPR. See how the latest innovations in productivity and security can help you on your journey to GDPR compliance.
  • SailPoint IdentityIQ & Identity Governance
    SailPoint IdentityIQ & Identity Governance Marc Mac Donell & John Pfeiffer Recorded: Oct 30 2017 59 mins
    Joint Webinar! Avaleris and SailPoint present an overview of Identity IQ including the current release update and an in-depth demo on provisioning and certification using the latest version of the Industry leading on premise Identity Governance Solution - IdentityIQ
  • Identity and Access - Can you afford to get it wrong?
    Identity and Access - Can you afford to get it wrong? Ben Piercey Recorded: Sep 28 2017 34 mins
    Never before have organizations so critically needed confidence in their Identity and Access Management infrastructure.The constant barrage of cyber attacks, the exploding number of identities and integrations, and the ever changing technology landscape have all taken a toll on enterprise IT. With their company's security and productivity on the line, teams often struggle to keep up and keep ahead.

    Staffing remains one of the biggest challenges organizations face when implementing and maintaining Identity Management solutions. Avaleris understands that Identity and Identity Driven Security has become the cornerstone of organizational IT, but hiring and retaining full time employees with the necessary specialized skills and experience is difficult.

    In this webinar, we will discuss the impact of poor Identity and Access Management and present the numerous advantages of having the experts deal with the related security and operational complexities. Learn how a Managed Identity Service provider can maximize your Microsoft Identity Technology Investments and allow you to focus on the growth and streamlining of the business.

    Register today!
  • Protect Your Data in the Wild
    Protect Your Data in the Wild Liam McCart & Artom Harchenko Recorded: Jul 27 2017 19 mins
    There are many ways to approach securing corporate data. Most tactics for securing data are tied to identity, mobility requirements, cybersecurity concerns or any combination of the three. Data leaks can occur in even the most secure systems if the right precautions are not taken to mitigate the risk.
    Considering employees share corporate files and documents every day, the challenge organizations are now looking to address is how to control data that escapes “into the wild”.
    What can we do once the data leaves the secure walls of the organization?
    What is the risk when sharing corporate data?
    What is the effect on the organization if the data gets out?
    In this webinar, Avaleris will show you how to use AIP to classify and label data and how your organization can control access to it.
  • Cybersecurity Threats and Breaches in Higher Education: How to Mitigate the Risk
    Cybersecurity Threats and Breaches in Higher Education: How to Mitigate the Risk Travis Hunter and Nathan Letourneau Recorded: May 31 2017 44 mins
    Cybersecurity is top of mind for most organizations today, and the education sector is no different. In today’s digital transforming economy, cybersecurity threats and data breaches have evolved, and the way organizations approach protection, detection and response must evolve as well.
    In this joint webinar, Microsoft and Avaleris will discuss cybersecurity and how organizations can safely increase security on identities in their environments and how they can benefit from securing their identity perimeters. We will draw from real examples in today’s landscape to demonstrate this.
    Based on the exclusive set of cybersecurity briefings hosted by Avaleris in conjunction with Microsoft, learn how your organization can compete in a digital world while mitigating the risk associated with a changing cybersecurity landscape.
  • Microsoft Technologies for Higher Education
    Microsoft Technologies for Higher Education Kris Corkum Recorded: Apr 13 2017 55 mins
    Identity is the new security perimeter in all of today’s business sectors, and Higher Education is no exception. With Higher Ed., we understand there is a unique combination of business challenges routed in identity and security that could threaten operational efficiencies. For example:
    • Diverse groups of users,
    • High account turnover by year and semester,
    • Integration with industry specific applications.
    Understanding and implementing an effective hybrid identity and access management solution, combined with advanced cyber security infrastructures, are the key to preventing security breaches and data leaks within your organization.
    Join us for an important session where our experienced consultant will present the benefits of the Microsoft suite of products specific to your sector, and how they can provide a hybrid identity platform on which you can continue to grow your business.
  • Protect your data on lost or stolen devices with BitLocker
    Protect your data on lost or stolen devices with BitLocker Frank Shen Recorded: Mar 28 2017 42 mins
    As the need grows for organizations to empower users to work anywhere, anytime and from any device, IT departments are looking for ways to protect content and data on lost or stolen devices. Microsoft’s BitLocker program can encrypt your drive as well as help protect against unauthorized changes to your system. It is designed to prevent a user’s data from being viewed, extracted or retrieved in case a drive is lost or stolen, which is increasingly important now that users are becoming more mobile.

    In our next webinar, we will discuss some of these sobering statistics, as well as the approach Microsoft is taking to information protection and encryption. Discover deployment and planning considerations and understand the value BitLocker can bring to your organization.
  • Secure Digital Transformation: What’s New for Winter 2017
    Secure Digital Transformation: What’s New for Winter 2017 Sherif Messiha Recorded: Feb 28 2017 49 mins
    In this webinar, we ask one of our senior consultants to weigh-in on the newest changes and updates to the Enterprise Mobility + Security suite of Microsoft products, and how those changes can affect your business.
  • Intune and Mobile Application Management: Build your own custom apps with Intune
    Intune and Mobile Application Management: Build your own custom apps with Intune Paul Ungoed Recorded: Jan 19 2017 58 mins
    Our overview of Intune will include a review of different deployment options while we present sample architectures from business cases drawn from our consultants’ real world experience. Discover how you can use Intune to make your own in-house developed apps available to your employees on mobile, as opposed to using the pre-connected apps from Microsoft. We will explore Mobile Application Management through enterprise application deployment and other deployment considerations.
  • Cloud & On-Premises: Getting the Best of Both Worldsfor Identity Mgmt
    Cloud & On-Premises: Getting the Best of Both Worldsfor Identity Mgmt David Upward Recorded: Nov 30 2016 52 mins
    Gain an understanding of Azure AD and MIM capabilities in a number of common identity management scenarios. Learn from real world experiences and apply this knowledge to your own identity management approach. We will engage in detailed discussions where we will compare and contrast several aspects of Microsoft's identity management functionality available on premises and in the cloud.

Embed in website or blog