eSeminars The Online Seminar Standard
eSeminars Live - We bring together an elite list of editors, industry luminaries, analysts and expert panel speakers on an interactive webcasting platform.

Past Events>>

Resilience, Risk and Reputation - Making the Connection

Oct 11, 2012

The complexities of IT and its interconnectedness to so many areas of the business leave organizations more vulnerable than ever to inherent risks. Data loss, corruption and inaccessibility as well as security breaches and infrastructure failures quickly become public events that can severely impact an organization's productivity, its reputation and its ability to achieve strategic goals.

Despite the widespread business impact that IT threats can have, most organizations do not consider aligning their IT risk management plan with their strategic business initiatives. A more holistic approach can help the business to operate more cost effectively and enhance its ability to respond to change with more informed, measured decisions. Register now for this webinar to learn:

  • How risk can impact the organization's strategic goals, both positively and negatively.
  • How the new IT Risk Spectrum recently introduced by IBM Business Continuity and Resiliency Services can help to identify IT risk to the business.
  • What our most successful clients are doing to better align the IT and business functions in order to develop a more comprehensive resiliency plan.

Register now to learn how to align IT with your strategic business goals.

Risk Management

XP End of Support - 5 Ways to Mitigate Risk Now

While you likely have very good reasons for remaining on WinXP after end of support -- an estimated 20-30% of worldwide devices still are -- the bottom line is your security risk is now significant. In the absence of security patches, attackers will certainly turn their attention to this new opportunity.

Sponsored by Lumension

IT Infrastructure

Eliminating Admin Rights - Learn From Your Peers via Actual Use Cases

Certain Windows applications and desktop functions require local administrative privileges in order to run and function properly on a desktop or laptop. But granting full admin rights creates a less secure environment and opens the door for malicious hackers and viruses. During this webcast, three use case scenarios will be presented by IT professionals who will share how they approached their projects to eliminate admin rights. They will walk through their research, solution and results.

Sponsored by Viewfinity

Virtualization

Virtualizing Exchange: Protection Made Easy

Have you held off virtualizing Exchange due to concerns about added complexity and other issues? These concerns can be addressed using best practices to ensure a successful virtualization. This will allow you to reap the benefits of running Exchange in a virtualized environment.

Sponsored by Veeam