

Managing Complex Print Environments and Optimizing the Workflow
The growing pains every successful small business feels often lead to decisions involving hardware acquisition and management. As SMBs expand, they are faced with many choices around how to evolve their printing to meet the needs of the business. This session will address the challenges SMBs face when they build a strategy around their printing needs. In this recorded webinar, sponsored by HP and AMD, join expert technologist and Techvangelism founder, Nick Cavalancia, as he


Friends With Benefits - and the Problems They Create
Every business has important partners that it engages on an ongoing basis. Today, the overwhelming majority of interactions between important business allies take place electronically. It’s very common, for example, for partners to have the log-in credentials to any number of companies with whom they engage. But there’s a downside to all this electronic coziness: the risk of data, applications and network compromise. Remember the Target attack? It all started when an outsid


Need a Cloud Strategy that Doesn't Cast a Shadow on App Performance?
The promises of the cloud include infinitely scalable environments, expedited deployment of applications and expanded user access. But the shift to the cloud can also be riddled with uncontrollable routing, little handling of QoS, latency, and a lack of visibility and control over end user experience. This results in slower app performance, unproductive users, and a frustrated IT organization – only increasing the cost of doing business.
So, as you plan your cloud strate


Avoiding The Office 365 Icarus Affect
History often repeats itself. Much like the tragic Greek myth of Icarus, who flew too close to the sun and fell from the sky, organizations making a move to the cloud need to be aware of the many pitfalls and risks to avoid a similar fate. In this recorded webcast, sponsored by Mimecast, watch this Redmond Fireside Chat with Office 365 MVP J. Peter Bruzzese and founder of Techvangelism Nick Cavalancia to learn about: The risks of a security monoculture Data assurance needs in

Dealing with the Threat Within, Customer Employees
If you provide security protection for a living, you dread waking up to learn that one of your customers has succumbed to an attack from outside rogue source. As frightening as this scenario is, a systems breach is more likely to occur from within—more often than not by simple human error. It’s true. Studies show most cyber compromises are caused by employees who don’t follow proper procedures, who operate in a careless manner or who lack expertise and click on things they sh


Making The World Safe For Everyone
If you provide security protection for a living, you dread waking up to learn that one of your customers has succumbed to an attack from outside rogue source. As frightening as this scenario is, a systems breach is more likely to occur from within—more often than not by simple human error. It’s true. Studies show most cyber compromises are caused by employees who don’t follow proper procedures, who operate in a careless manner or who lack expertise and click on things they sh


Today's Mobile Security Threats and Tips to Enable Productivity Without Compromising Data Securi
Mobile is a given client in every organization today. It’s one of the most convenient clients,raising employee productivity, giving your users anytime, anywhere, any device access to your network, applications, and data. But with the rise in data breaches, insider threats, and external attacks, it’s only responsible of IT to raise a proverbial eyebrow, take note of the potential threats that exist and begin to develop a strategy that, as the webcast title says, doesn’t comp


Future-Proofing Your Data Protection Strategy
With recent advances in virtualization and data center technology, data protection remains among the top three purchase priorities for mid-market companies. With that, many questions surface:
How should IT professionals evaluate the myriad of vendors claiming lower RTOs and RPOs? What differentiates cloud DR from other cloud storage solutions? And more importantly, how do you ensure your data protection strategy remains valid for many years to come?
In this recorded web

The Six Critical Capabilities Of Password Management
Controlling and monitoring privileged accounts is crucial to preventing data breaches and is often required by compliance. But what are the essential capabilities that IT and security teams should evaluate when selecting a privileged password management solution? In this informative webinar, hear from industry expert and founder of Techvangelism, Nick Cavalancia, as he: Identifies six critical capabilities of password management Demonstrates the impact of having – and not


Protecting A Customer's Customers
Few things are more precious to your clients than their own customers. So protecting their data is of paramount concern. Despite this, studies reveal that barely half of end customers have comprehensive security plans in place. Another third say that while they may have a security plan, they openly concede that it needs work. So, what's the best way of protecting your client's customers' data? In this recorded webcast, join industry expert and founder of Techvangelism, Nick