Logo
 Pre-registered for this webcast? Login here.
 Email:
 Login

Registration is required to attend
First Name*
Last Name*
Title*
Industry*
Company Size*
Company*
Street Address Line 1*
Street Address Line 2
City*
State/Province*
Zip*
Country*
Phone*
Email Address*
NEW!... Early Registration!
 Check here if you would like to automatically be registered for webinars on the same topic
You must have Javascript and Cookies enabled to access this webcast. Click here for Help.
 
Please enable Cookies in your browser before registering for the webcast.
 
*Denotes required.
 

Taking Policy Management to the Next Level

This webinar was originally broadcast on:
Tuesday, July 17, 2012 02:00 PM EDT / 11:00 AM PDT

Consistency is the hallmark of an effective, agile organization. With thousands of moving parts, ensuring that every user and every system is being managed consistently is critical.

The laptop logging in from across town should be managed as robustly, as completely and as securely as desktops in the office next door. However, with thousands of systems logging onto and off various networks in multiple networks, it isn’t feasible for the IT department to manually touch every machine, ensuring it is in compliance with all IT policies.

While some of these policies deal with capacity and performance, others manage access, authentications and security. As the amount of managed systems grows so does the need to properly monitor compliance and mitigate risks through comprehensive policy management and enforcement. And, as the complexity of issues associated with doing so efficiently, effectively and in real-time increase, the priority for having the best tools working for your organization to keep your people, assets and process safe will be paramount.

As an IT asset manager you need to know such things as: What policies get applied to which systems? What if a user inadvertently makes a change to the system? What about new systems?

Join us on July 17th at 2pm Eastern and learn how to:
  • Ensure distributed systems are in compliance with IT policies or recurring services
  • Streamline the process of applying and updating policies to multiple machines
  • Achieve greater confidence that distributed systems are secure and in compliance
  • Manage network policy enforcement of machines groups depending on security risk, business use or service level
  • Allow new machines to automatically inherit policy settings without any intervention

Who Should Attend:
  • CIOs
  • Enterprise IT managers
  • Service Provider IT managers

Presenter

Gerald Beaulieu
Director, Product Marketing
Kaseya


As Director of Product Marketing for Kaseya’s Public & Private Sector solutions, Gerald Beaulieu is responsible for defining market opportunities, positioning and messaging the value of Kaseya’s IT Systems Management platform. He has held various product management and product marketing positions at Platinum Software, Epicor, and Sage over his 18 year career in the technology industry.



Moderator

Peter Bernstein
Senior Editor
TMCnet


Peter Bernstein is a seasoned writer and professional with deep experience in the communications and IT industries. As a top-level industry analyst, Peter has keynoted major technology events and has been cited numerous times by The New York Times, The Wall Street Journal, The Los Angeles Times, USA Today, The Washington Post, Business Week, Fortune Magazine, ComputerWorld, NetworkWorld, Communications Week, among other publications.

Bernstein has authored or co-authored market research studies, CEO speeches, white papers, articles, and other content for major companies in the technology markets. His experience includes work with Alcatel-Lucent, Avaya, Equant, France Telecom, HP, Siemens, Verizon, Nortel, Wave Systems, and many more. He held the position of director of global marketing and communications at Telcordia.


Sponsored by: