Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Work Smarter, Not Harder: Standardizing Device Lifecycle Management Curtis Armstrong, Field Engineer, Jamf Let's be honest. IT admins face unexpected challenges like onboarding new and experienced teachers, introducing new technology, or distributing studen... 1 week ago | 22 mins The Big SaaS Disconnect Christophe Bertrand, ESG and Drew Russell, Rubrik Microsoft 365 has become a Tier 1 application, mission critical to business operations – and targeted by ransomware attackers. While Microsoft provide... 2 days ago | 34 mins The Art of Zero Touch Deployments Jim Grandbois, Partner Marketing, Jamf The bygone days of imaging have made way for zero-touch deployments, empowering IT to successfully deploy Mac, iPad and iPhone to users directly witho... July 12, 2022 9:00am How to maintain security in a hybrid work environment Thomas Wingfield, Product Marketing Manager & Molita Sorisho, Product Marketing Mngr & Sanjay Khanna, Product Manager @ Webex Security is paramount today. With people now working from everywhere, your risk surface has expanded. Even if your databases and networks are protecte... 6 days ago | 30 mins Apple Enterprise Management for Beginners Kaylee Carlson, Product Marketing Manager Apple, Microsoft and Google all have unique workflows, and no one tool meets the needs of each ecosystem. Which means IT and security teams need a uni... 3 weeks ago | 27 mins How can a shared security approach help ensure that your security is watertight? Danna Bethlehem, Director IAM Product Management - Access Management and Authentication You’d be forgiven for thinking that, as the major cloud providers have massive security teams, you can strike ‘security’ off your list of things to wo... 3 weeks ago | 36 mins Security & Compliance for SAP Data in Financial Services with Thales and SAP Dr. Wasif Gilani, Head of SAP Data Custodian, and Alex Hanway, Business Development Director at Thales Financial Services companies keep some of their most valuable data in SAP applications, triggering the need for both additional security and taking st... July 12, 2022 8:30pm Adapt Your Endpoint Security Strategy Dave Gruber, Principal Analyst, ESG Cybersecurity megatrends -- including zero trust, XDR, a pandemic-induced increase in remote workers, and the move to public cloud -- are influencing ... July 18, 2022 3:00pm Deep Dive: How to Migrate Native GPOs to Microsoft Intune Jeremy Moskowitz and Rory Monaghan This is a shell webinarIf your organization is like most, shifting from a traditional in-office model to a modern remote or hybrid workforce — while e... 5 hours ago | 57 mins Who’s In Control: Human or Machine? Lei Chen, Marcus by Goldman Sachs, Gagan Sekhon, MoneyLion, Neha Wattas, JPMorgan Chase, Ashish Jain, Arkose Labs As finance becomes more digital and real-time, protecting their digital platforms is becoming increasingly challenging as attackers adapt their approa... 5 hours ago | 56 mins Load more