Hi [[ session.user.profile.firstName ]]

Avaleris Inc

  • Date
  • Rating
  • Views
  • Cybersecurity Threats and Breaches in Higher Education: How to Mitigate the Risk
    Cybersecurity Threats and Breaches in Higher Education: How to Mitigate the Risk Travis Hunter and Nathan Letourneau Recorded: May 31 2017 44 mins
    Cybersecurity is top of mind for most organizations today, and the education sector is no different. In today’s digital transforming economy, cybersecurity threats and data breaches have evolved, and the way organizations approach protection, detection and response must evolve as well.
    In this joint webinar, Microsoft and Avaleris will discuss cybersecurity and how organizations can safely increase security on identities in their environments and how they can benefit from securing their identity perimeters. We will draw from real examples in today’s landscape to demonstrate this.
    Based on the exclusive set of cybersecurity briefings hosted by Avaleris in conjunction with Microsoft, learn how your organization can compete in a digital world while mitigating the risk associated with a changing cybersecurity landscape.
  • Microsoft Technologies for Higher Education
    Microsoft Technologies for Higher Education Kris Corkum Recorded: Apr 13 2017 55 mins
    Identity is the new security perimeter in all of today’s business sectors, and Higher Education is no exception. With Higher Ed., we understand there is a unique combination of business challenges routed in identity and security that could threaten operational efficiencies. For example:
    • Diverse groups of users,
    • High account turnover by year and semester,
    • Integration with industry specific applications.
    Understanding and implementing an effective hybrid identity and access management solution, combined with advanced cyber security infrastructures, are the key to preventing security breaches and data leaks within your organization.
    Join us for an important session where our experienced consultant will present the benefits of the Microsoft suite of products specific to your sector, and how they can provide a hybrid identity platform on which you can continue to grow your business.
  • Protect your data on lost or stolen devices with BitLocker
    Protect your data on lost or stolen devices with BitLocker Frank Shen Recorded: Mar 28 2017 42 mins
    As the need grows for organizations to empower users to work anywhere, anytime and from any device, IT departments are looking for ways to protect content and data on lost or stolen devices. Microsoft’s BitLocker program can encrypt your drive as well as help protect against unauthorized changes to your system. It is designed to prevent a user’s data from being viewed, extracted or retrieved in case a drive is lost or stolen, which is increasingly important now that users are becoming more mobile.

    In our next webinar, we will discuss some of these sobering statistics, as well as the approach Microsoft is taking to information protection and encryption. Discover deployment and planning considerations and understand the value BitLocker can bring to your organization.
  • Secure Digital Transformation: What’s New for Winter 2017
    Secure Digital Transformation: What’s New for Winter 2017 Sherif Messiha Recorded: Feb 28 2017 49 mins
    In this webinar, we ask one of our senior consultants to weigh-in on the newest changes and updates to the Enterprise Mobility + Security suite of Microsoft products, and how those changes can affect your business.
  • Intune and Mobile Application Management: Build your own custom apps with Intune
    Intune and Mobile Application Management: Build your own custom apps with Intune Paul Ungoed Recorded: Jan 19 2017 58 mins
    Our overview of Intune will include a review of different deployment options while we present sample architectures from business cases drawn from our consultants’ real world experience. Discover how you can use Intune to make your own in-house developed apps available to your employees on mobile, as opposed to using the pre-connected apps from Microsoft. We will explore Mobile Application Management through enterprise application deployment and other deployment considerations.
  • Cloud & On-Premises: Getting the Best of Both Worldsfor Identity Mgmt
    Cloud & On-Premises: Getting the Best of Both Worldsfor Identity Mgmt David Upward Recorded: Nov 30 2016 52 mins
    Gain an understanding of Azure AD and MIM capabilities in a number of common identity management scenarios. Learn from real world experiences and apply this knowledge to your own identity management approach. We will engage in detailed discussions where we will compare and contrast several aspects of Microsoft's identity management functionality available on premises and in the cloud.
  • A wrap-up webinar on Identity-Driven Security
    A wrap-up webinar on Identity-Driven Security Sherif Messiha Recorded: Nov 24 2016 45 mins
    Learn about identity-driven security from a seasoned identity and mobility expert and Microsoft partner. If you were unable to attend our seminar live, this is a webinar you won’t want to miss! This webinar will help organizations understand the Microsoft on-premises and cloud based security architecture and develop a roadmap towards stronger security that they can use to guide their decisions in protecting corporate identities and data.
  • Your Most Pressing Questions in Identity-Driven Security: Microsoft Panel
    Your Most Pressing Questions in Identity-Driven Security: Microsoft Panel Patrick Arnold, Patrick Huff, Alex Weinert Recorded: Oct 4 2016 56 mins
    There are a number of security-related questions that come up often in our conversations with clients and industry professionals. We have invited the Avaleris VP, IT Security & Emerging Technologies and three leading security experts from Microsoft to answer these questions and discuss the most pressing identity-driven security issues faced in the industry today. In this panel webinar, hear from Patrick Arnold, Senior Global Director - Enterprise Cybersecurity Group at Microsoft, Patrick Huff, Senior Director, Advanced Service Delivery at Microsoft, and Alex Weinert, Group Program Manager at Microsoft, on issues such as: “If Microsoft gets attacked, what happens to my cloud security products?” and “What is the best way to protect against cyber espionage?”. All attendees are invited to submit their own security questions in advance of the panel and during the live session.
  • Ransomware: Prevention and Detection Using Microsoft Security Technology
    Ransomware: Prevention and Detection Using Microsoft Security Technology Artom Harchenko Recorded: Sep 29 2016 34 mins
    Ransomware protection has been top of mind of many of our clients. Join our senior consultant and security expert, Artom Harchenko, for a walkthrough of how to use Microsoft security technologies to prevent a successful ransomware attack. In the case of a breach, learn about telltale signs of ransomware presence in order to protect your corporate data. Artom will be presenting a sample architecture as well as an overview of the technologies involved in ransomware protection.
  • Microsoft Cloud App Security
    Microsoft Cloud App Security Artom Harchenko Recorded: Jul 28 2016 40 mins
    Attend this session to discover Microsoft's Cloud App Security (CAS) as we take you through an in depth demo of this cloud technology . We will explore how Microsoft's CAS allows you to benefit from using cloud applications within your organization, without compromising the security of your organization's data.

Embed in website or blog