It’s time to upgrade your desktop experience. But how? In this session, explore the options and recommendations for deploying the latest Windows and Office desktop experience, and hear suggestions on how you can help minimize user issues. If you are wondering about reimaging, in-place upgrades, MSI, Click-to-Run, Current Branch, Current Branch for Business, and Long-Term Servicing Branches, this session is for you!Read more >
In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.Read more >
Migrating to Office 365? It’s a smart move for most enterprise level organisations.
But migrating to a public cloud platform with incomplete DLP leaves you vulnerable to data leakage, compliance issues and other security challenges you may not even see.
Discussion topics include:
- Web and email DLP hosted in the Azure Cloud
- Securing Office 365 applications such as OneDrive, Outlook and SharePoint
- Securing SharePoint Online and other Web applications such as Box
Whether you’ve just purchased Office 365 or have been using it for a while, deploying and managing safe access to Office 365 is not simple, fast, or pleasant. It’s your job to get the most value from your application investments, and while Microsoft has tools to assist like ADFS and DirSync, they are not only cumbersome and costly to maintain, but do not meet industry standards that can be scaled across your organization. And let’s face it, you’re not just implementing Microsoft products. Can you extend ADFS beyond Office 365 in a timely matter?
Join OneLogin and customer SOTI, a proven product innovator and EMM Industry leader in mobile consulting, for an informative webinar about deployment best practices for Office 365 integrated with Active Directory.
Find the Email Threats Lurking in Your Office 365 Environment
As you look to migrate your email infrastructure to Office 365, you might be wondering what the right approach and technology is to stop exploding threats such as business email compromise and ransomware.
Join Catherine Hwang, Proofpoint Product Marketing, in a live Redmond webinar to hear about key requirements for catching email spoofs, emerging and zero day threats, and even commodity threats. Considerations for threat visibility and response requirements will also be explored.
See attacks for what they really are.
Whether broad or targeted, Proofpoint safeguards your Office 365 users with superior efficacy against BEC, ransomware and other email attacks.
Office 365 usage has tripled in the last 9 months as more and more companies enable anytime, anywhere access to Microsoft’s suite of cloud services. But security and compliance require a new level of granularity when users access cloud-based systems of record from a variety of networks, locations, and devices.
In today’s cloud-first, mobile-first world, IT Security teams are creating variable trust models based on user, device, activity, and data sensitivity. In this session, we’ll share the proven 4-layer trust model for security and compliance in O365.
The Ask an Architect Virtual Office Hours hours are designed to answer Cloud Computing questions from the comfort of your own home. You can pre-submit your questions during the registration process or you can dial-in in one of the pre-scheduled sessions, where you will be able to submit your question via chat. From technical advice to just getting started, this series gives you the opportunity to get in touch directly with local AWS experts.
Register to attend the AWS Summit here: https://awssummit.london/
Public cloud apps like Office 365 are being widely adopted in every major industry, with security & compliance at the top of the list of concerns. In this webinar, Greg Schaffer, CISO at FirstBank and Rich Campagna, VP of Products at Bitglass, will provide practical cloud security advice that you can apply immediately in your organization. Focusing on O365 but offering a broad view, Greg and Rich will cover top concerns, mitigating controls and will give examples of how your peers have responded to the cloud security challenge.Read more >
You probably know that 2016 represents a major release for Office, across PCs, Macs, mobile phones, and tablets, with new end-user experiences for simple users and power users alike. Learn more, in this session, and find out how the Office 2016 release also includes more manageability, security, and deployment options for IT. Plus, learn about Office 365 ProPlus deployments, which even let you choose how fast you decide to enable these new capabilities in your organization.Read more >
Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.
Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.
• Shield Email From Phishing, Sophisticated Malware and Spam
• Neutralize Advanced Threats and Targeted Attacks
• Safeguard Your Sensitive Data
•Control Access with Strong Authentication
Get approvals and boost productivity with DocuSign and O365
You’ll see the product in action and learn how to:
Boost productivity: Easily go from document editing to eSignature with DocuSign for Microsoft Word
Save time: Sign and return an email attachment without ever leaving your Outlook inbox
Track seamlessly: Send documents for signature from your SharePoint Online library and gain visibility into your document statuses
Whether you’re working from email, preparing a document to send for signature, or storing documents on a team site – our integrations will help you boost productivity directly from your favorite Office 365 apps.
Are you wondering how Office 365 makes it easier for your business to achieve compliance? In this session, focus on current customer challenges and needs around compliance and how we are tackling those head on. Explore current solutions, including Equivio Analytics, EDiscovery, Archiving, Retention, Auditing, and hear details on our future vision and roadmap. Join us, as we look at compliance for your business!Read more >
In this session we'll discuss the data protection gaps in Microsoft Office 365 and how to use Spanning Backup to protect and recover data quickly.Read more >
The Ask an Architect (SA) Virtual Office Hours hours are designed to answer Cloud Computing questions from the comfort of your own home. You can pre-submit your questions during the registration process or you can dial-in in one of the pre-scheduled sessions, where you will be able to submit your question via chat. From technical advice to just getting started, this series gives you the opportunity to get in touch directly with local AWS experts.
A few things to keep in mind...
- Please note that this is a time when you can get general technical guidance; if you require extensive or urgent support, please contact AWS Technical Support >> https://aws.amazon.com/contact-us/
- If your question is not answered during the live session, we will get back to you afterwards via e-mail
- Did you know that we already have a repository of answers written by AWS architects? Check if the answer to your question is not already on the AWS Answers webpage >> http://aws.amazon.com/answers/
Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.
While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.
Key takeaways include:
• Why the shift to Office 365 increases criticality of email security
• Common pitfalls to avoid in the planning stages
• Key security capabilities to protect from advanced threats
Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.
Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.
The Ask an Architect Virtual Office Hours hours are designed to answer Cloud Computing questions from the comfort of your own home. You can pre-submit your questions during the registration process or you can dial-in in one of the pre-scheduled sessions, where you will be able to submit your question via chat. From technical advice to just getting started, this series gives you the opportunity to get in touch directly with local AWS experts.Read more >