eSeminars The Online Seminar Standard
eSeminars Live - We bring together an elite list of editors, industry luminaries, analysts and expert panel speakers on an interactive webcasting platform.

Past Events>>

GRC for the Endpoint – Managing the Security Risks of Mobility

Oct 31, 2012

With 28,000 PCs and Macs spread across 200+ locations around the world, Crystal Vision/Das Global was unable to perform key Governance, Risk Management, and Compliance (GRC) tasks to keep their deployment secure and properly managed.

Given the large geographical distribution of assets, a cloud based solution made the most sense. After researching options, Roger Fultz, General Manager of Crystal Vision/DAS Global, selected Absolute Computrace for the entire deployment. Computrace provides IT administrators with detailed and accurate data that they can analyze and act upon to ensure each device is compliant and secure.

Join Roger Fultz and learn how his team relies on Computrace to provide:

  • A consolidated view of the global deployment including detailed information from each device
  • Management of enterprise software agreements to ensure compliance and for use during contract negotiations
  • Data security for devices at risk, including the ability to remotely delete data before it can be accessed

Data Management

Lower RTOs™ with Veeam Explorers for Microsoft SQL Server, Active Directory and Exchange

Organizations are modernizing their data centers in order to provision IT services faster, strengthen security, and reduce costs. However, businesses are facing new demands from end users, including access to data and applications 24/7, no patience for downtime or data loss, and exponential data growth at 30-50% per year. This opens an availability gap between always-on user requirements and IT’s ability to effectively deliver availability.

Sponsored by Veeam


SQL Server 2014 High Availability & Disaster Recovery with Pure Storage

Microsoft SQL Server includes a high availability option called AlwaysOn Availability Groups (AGs). In this session we will see how AGs are implemented using a Windows Server Failover Cluster and SQL Server 2014 with the Pure Storage FlashArray.

Sponsored by Pure Storage


CyberArk Introduces Privileged Account Security for SSH Keys

Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise.

Sponsored by CyberArk