It’s time to upgrade your desktop experience. But how? In this session, explore the options and recommendations for deploying the latest Windows and Office desktop experience, and hear suggestions on how you can help minimize user issues. If you are wondering about reimaging, in-place upgrades, MSI, Click-to-Run, Current Branch, Current Branch for Business, and Long-Term Servicing Branches, this session is for you!Read more >
In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.Read more >
Migrating to Office 365? It’s a smart move for most enterprise level organisations.
But migrating to a public cloud platform with incomplete DLP leaves you vulnerable to data leakage, compliance issues and other security challenges you may not even see.
Discussion topics include:
- Web and email DLP hosted in the Azure Cloud
- Securing Office 365 applications such as OneDrive, Outlook and SharePoint
- Securing SharePoint Online and other Web applications such as Box
Whether you’ve just purchased Office 365 or have been using it for a while, deploying and managing safe access to Office 365 is not simple, fast, or pleasant. It’s your job to get the most value from your application investments, and while Microsoft has tools to assist like ADFS and DirSync, they are not only cumbersome and costly to maintain, but do not meet industry standards that can be scaled across your organization. And let’s face it, you’re not just implementing Microsoft products. Can you extend ADFS beyond Office 365 in a timely matter?
Join OneLogin and customer SOTI, a proven product innovator and EMM Industry leader in mobile consulting, for an informative webinar about deployment best practices for Office 365 integrated with Active Directory.
Organizations are experiencing unprecedented data growth - while data is geographically distributed, organizations are under pressure to provide global visibility and cost effective management for all unstructured data, regardless of the location. Enterprises with branch and regional offices are further challenged with dispersed islands of storage that are costly and inefficient, while being difficult to reliably maintain and protect.
Learn how you can expand your data lake by consolidating data from remote office locations to your core data center, through simple Software Defined Storage – enhancing protection, and introducing business Analytics.
Public cloud apps like Office 365 are being widely adopted in every major industry, with security & compliance at the top of the list of concerns. In this webinar, Greg Schaffer, CISO at FirstBank and Rich Campagna, VP of Products at Bitglass, will provide practical cloud security advice that you can apply immediately in your organization. Focusing on O365 but offering a broad view, Greg and Rich will cover top concerns, mitigating controls and will give examples of how your peers have responded to the cloud security challenge.Read more >
Find the Email Threats Lurking in Your Office 365 Environment
As you look to migrate your email infrastructure to Office 365, you might be wondering what the right approach and technology is to stop exploding threats such as business email compromise and ransomware.
Join Catherine Hwang, Proofpoint Product Marketing, in a live Redmond webinar to hear about key requirements for catching email spoofs, emerging and zero day threats, and even commodity threats. Considerations for threat visibility and response requirements will also be explored.
See attacks for what they really are.
Whether broad or targeted, Proofpoint safeguards your Office 365 users with superior efficacy against BEC, ransomware and other email attacks.
Office 365 usage has tripled in the last 9 months as more and more companies enable anytime, anywhere access to Microsoft’s suite of cloud services. But security and compliance require a new level of granularity when users access cloud-based systems of record from a variety of networks, locations, and devices.
In today’s cloud-first, mobile-first world, IT Security teams are creating variable trust models based on user, device, activity, and data sensitivity. In this session, we’ll share the proven 4-layer trust model for security and compliance in O365.
Microsoft Office 365 has taken the market by storm and has been Microsoft’s fastest selling product for a while now. However, amidst all this excitement, there are significant impacts to network and security architecture. Enterprises need to be prepared to manage 6 key issues:
1. Increased network bandwidth usage
2. Slow traffic & poor user experience
3. Increased security headaches
4. Mobile security
5. Visibility & compliance
6. Limitations of traditional on-premise security appliances
Join Dr. Manoj Apte, Senior Vice President of Product Management, Zscaler Inc., for a thought provoking webcast discussing:
Key considerations to be aware of before you deploy Office 365
Why security appliances cannot address these challenges effectively
Best practices for addressing these issues using a cloud based security solution
The Ask an Architect Virtual Office Hours hours are designed to answer Cloud Computing questions from the comfort of your own home. You can pre-submit your questions during the registration process or you can dial-in in one of the pre-scheduled sessions, where you will be able to submit your question via chat. From technical advice to just getting started, this series gives you the opportunity to get in touch directly with local AWS experts.
Register to attend the AWS Summit here: https://awssummit.london/
Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.
Consider these statistics from IDC:
• Over 50% enterprises have users that access their Office 365 applications using unmanaged mobile devices
• Over 90% of threats to enterprises emanate from email
• 65% of threats go undetected for weeks/months
IT administrators lose traditional visibility and control when enterprises move email, content creation, file sharing, and collaboration to the cloud; making it harder to detect inappropriate behavior. This makes it critical for organizations to extend the basic security capabilities of Office 365 and ensure consistency in the level of security across all their cloud services.
Securing cloud applications like Office 365 is a shared responsibility between the cloud service provider and the tenant. Analysts like Gartner and IDC recommend assessing third party security products as a best practice in a comprehensive Office 365 security framework.
Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.
Learn how to enhance your Office 365 security to:
• Shield Email From Phishing, Sophisticated Malware and Spam
• Neutralize Advanced Threats and Targeted Attacks
• Safeguard Your Sensitive Data
•Control Access with Strong Authentication
Symantec can help your organization enhance your security for Office 365 while enabling employee collaboration and productivity. Let us show you how!
You probably know that 2016 represents a major release for Office, across PCs, Macs, mobile phones, and tablets, with new end-user experiences for simple users and power users alike. Learn more, in this session, and find out how the Office 2016 release also includes more manageability, security, and deployment options for IT. Plus, learn about Office 365 ProPlus deployments, which even let you choose how fast you decide to enable these new capabilities in your organization.Read more >
In this session we'll discuss the data protection gaps in Microsoft Office 365 and how to use Spanning Backup to protect and recover data quickly.Read more >
Are you wondering how Office 365 makes it easier for your business to achieve compliance? In this session, focus on current customer challenges and needs around compliance and how we are tackling those head on. Explore current solutions, including Equivio Analytics, EDiscovery, Archiving, Retention, Auditing, and hear details on our future vision and roadmap. Join us, as we look at compliance for your business!Read more >
The Ask an Architect Virtual Office Hours hours are designed to answer Cloud Computing questions from the comfort of your own home. You can pre-submit your questions during the registration process or you can dial-in in one of the pre-scheduled sessions, where you will be able to submit your question via chat. From technical advice to just getting started, this series gives you the opportunity to get in touch directly with local AWS experts.Read more >
Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.
While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.
Key takeaways include:
• Why the shift to Office 365 increases criticality of email security
• Common pitfalls to avoid in the planning stages
• Key security capabilities to protect from advanced threats
Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.
Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.