This resource is no longer available

Implementing Security with Systems Management - Best Practices for companies with fewer than 500 users

As operating systems become more complex auditors and regulators are taking notice of weaknesses within systems, applications, and IT operations. Taking control of the network by avoiding common systems management oversights is essential to maintaining security. Attend this Webcast with security expert Kevin Beaver to learn how security can be integrated with existing processes to keep servers and desktops running and compliant.

As security becomes more critical to the computing environment, businesses must look to streamline systems management. This expert Webcast outlines the critical security issues that need to be addressed in today's computing environment. Learn more about securing systems management in your business, including:

  • Best practices for integrating security into the IT infrastructure
  • Common systems management oversights
  • Common security risks and the business problems they cause
  • Practical tips for gaining control of the IT network


Jim Alves EVP Product Marketing, Kaseya As the EVP of Marketing for Kaseya, Jim manages all corporate and product marketing, which includes the definition and development of channel programs. His understanding of the market and past experience is the foundation for his belief that building a strong channel is the key a successful business. With 24 years in the software, computer and consulting industry, Jim's experience has been vital in developing Kaseya's direct and channel based sales and marketing programs worldwide. His past position at Platinum Software taught him that the channel needs constant care and feeding, otherwise it will move to the next thing. Kevin Beaver Founder and Principal Information Security Consultant, Principle Logic, LLC

Kevin Beaver is a security consultant, expert witness, professional speaker, and author with more than 22 years of experience in IT. Before starting Principle Logic in 2001, he served in various information technology and security roles for several healthcare, e-commerce, financial firms, educational institutions, and consulting organizations.

Aug 21, 2007, 09:00 EDT (13:00 GMT)

This resource is no longer available.