On-demand Webinar

Ignite 2018 – What you might have missed

After the dust settles on the latest Microsoft Ignite conference, it can feel a bit overwhelming as you’re reflecting on everything you saw and learned. As with previous years, it will be full of detailed technical goodness and future direction settings and previews. With so many parallel tracks (and the site being so vast!) you may have missed some important content. Our team of experts attended sessions, networked with other professionals, and immersed themselves with high-level content throughout the week. If you didn’t get to Orlando, perhaps you want a tight summary of key updates.

With MVP Émile Cabot and technical gurus Simon Binder and Jim Bezdan, you’ll get a first-hand look of what the experts experienced and learned, as well as the opportunity to ask them questions about the trends, tools, and key findings from the conference. With a focus on the hot topics for IT and Security Operations, our esteemed panel will pick out key highlights that everyone should investigate further as well as the potential benefits they may see.

Topics covered in this webinar:

  • Key findings from expert-lead sessions
  • Trends for 2018 and 2019
  • Opinions on emerging tech
  • In-depth summaries of panel discussions

Speakers

  •  Émile Cabot
    Émile Cabot
    Microsoft MVP, Enterprise Mobility
  •  Simon Binder
    Simon Binder
    Principal Solutions Architect, Atea
  • Jim Bezdan
    Jim Bezdan
    Principal Consultant, 1E

Fill in the form to watch the webinar

Share this post

Share this post on your favourite social media platform.

Find this resource useful?

If so please click here

Related Content

On-demand Webinar

SecOps 101: Get Operations and Security Working Hand in Hand

Maintaining an effective security posture is a challenge. There is an incessantly increasing landscape of cyberthreats, the volume and complexity of attacks seems to increase on a daily basis, and despite their best intentions, many organizations’ security protocols are mostly…

Report

Tachyon Review by David Strom

“Think about Tachyon as what Google was trying to do back in the late 1990s. That is where we are today with Tachyon: think of it as the search tool for finding out the health of your network.”

Case Study

How 1E helped the US Department of Veteran Affairs (VA) take their FITARA Software Asset Management score from F to A

The US Department of Veteran Affairs (VA) was in a compromising position: they had received an F rating, equivalent to failing, two years in a row, in the Federal Information Technology Acquisition Reform Act (FITARA).

On-demand Webinar

Modern Workplace Management

End-user workstations are at the heart of the modern business. The end-user relies on their computer being available, safe, and ready with the apps they need to get their work done. The last thing they want is for IT to…

About 1E

Cyber security is critical. One breach could destroy your organization’s reputation and cost millions of dollars. We take that threat seriously. 1E gives you unprecedented control and visibility over your full digital estate, delivered at speed and at scale. We’re working towards a world of proactive cyber security, a world where CIOs and CISOs work together to ensure that no threat can bring down their systems.