Free Webinar: Top 25 Free Tools for VMware vSphere


The free VMware vSphere tools that are available from third-party vendors are an essential part of every good virtualizaion admin’s tool box. Let’s face it, VMware vSphere does a lot but you still need third-party tools to get the job done — and to make your life as an admin easier and more productive.

Register Today: Top 25 Free Tools for VMware vSphere

Date: Wednesday, January 11th 2012

Time: 2 PM – 3 PM CST

Registration: Registration is now closed.

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

View webinar here: Top 25 Free Tools for VMware vSphere Webinar

In this free Webinar, vExpert Kendrick Coleman and I will share our top 25 free tools for VMware that will help you with vSphere management, performance, reporting, scripting and much more. Whether you’re an experienced virtualization pro, or someone just starting out with vSphere administration you’ll benefit from learning about these 25 free tools.

Kendrick and I have done two VMworld presentation on this topic (at VMworld 2010 and 2011) and our updated list of free vSphere tools includes some of the latest and greatest tools. These are tools we’ve used and tested and all of them are completely free, not just 30 day trials. Trust me, you’ll get a lot from these tools.

Join us for this free webinar and see how you can make your life as a VMware admin EASY!

Related Topics:

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: