On Demand
Time to stop thinking WFH. When people work remotely, they may not be home. Your remote work policies and procedures must include public places too. Join Senior Resultant Howard M. Cohen for a hot cup of info and insight about keeping everyone and everything secure and productive from afar!
You can’t always predict when you’re about to face a sizable migration. Maybe a merger, acquisition, or divestiture came your way and you got the exciting news that you have a migration in your near future! When you have an Active Directory consolidation looming, how do you know whether Microsoft native tools can do the job, or whether you should consider a tool that’s more tailored for the job? This on demand webcast will help you identify some of the pros and cons you should take into consideration as you make the decision to go native or not.
The pandemic has created opportunity for plenty of M&A/Divestiture activity. This effectively results in lots of new tenant migration/consolidation projects to ensure users can be productive in their new organization. But M&A activity-based migrations often come with tight deadlines that IT must hit. And to make matters worse, the native tools available for tenant migration are extremely limited, making it difficult for IT teams, and impacting M&A plans and timelines. So, how can you simplify tenant migrations to align IT outcomes with business requirements?
Over the past few years, we have seen an unprecedented adoption of remote work. With this in mind, now is a great time to reflect on what we have learned during this time about rapid, large-scale deployments of VDI environments and the best practices around it. People who are new to, or are investigating, VDI will gain insights into how to make their transition from physical to virtual desktops smoother while those who already have a VDI environment in place will pick up tips to help optimize it and provide a better experience for their users.
The editors of Virtualization & Cloud Review and Redmondmag.com as well as independent experts who will take a deep-dive into the current status of end user computing technology, review best practices for securing your remote workforce and share real-world knowledge for configuring, maintaining and improving your VDI and other end user computing technology. You won't want to miss it!
It may not be clear exactly what the “next normal” looks like for your organization, but with renewed focus on transformation for nearly every business there is opportunity to rebuild and gain a competitive advantage. Join Harsha Kotikela of Nutanix as he discusses how to implement EUC in the modern era and avoid the mis-steps of the past and how a Citrix on Nutanix solution can help you.
Attacks are inevitable and breaches are probable, particularly where your Active Directory is concerned. Join breach prevention and incident response experts from Semperis as they provide best practices to ensure you recover quickly, completely, and in a more secure state than before.
The advent of artificial intelligence (AI), primarily in the form of machine learning, has brought opportunities and challenges to the enterprise. In this Tech Talk technology journalist John K. Waters talks about AIOps with Prashant Darisi, General Manager and Vice President of Customer Experience Management in the Global Solutions group at Everbridge, and Rob Jahn, Sr. Technical Partner Manager at Dynatrace.
Active Directory enables businesses to securely grant or restrict access to systems, applications, and environments. It’s also becoming a primary target for ransomware attacks, as bad actors exploit misconfigurations and blind entry points to penetrate, corrupt, and control applications and their data. In this webinar, we’ll explore how dedicated Active Directory Backup mitigates silent cybersecurity threats and simplifies restore operations to get your business back online.
Expect to learn how the Zerto architectures use continuous data protection, our unique journal, and immutable offsite copies to neutralize a ransomware infection.
In this webinar, we'll discuss how a UEBA solution fits into a Zero Trust architecture and how you can implement the same. Learn more!
Ransomware and other cyberthreats are changing business’s needs for data protection across their on-premise, private cloud, SaaS and public cloud environments. Discover the benefits of multi-layered data protection for your Hybrid IT environments.
In this lively discussion-format webcast, join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Senior Product Manager, Malte Schoch from Quest, as they discuss Microsoft 365 tenant migrations.
Make sure you're ready for the biggest threat to your cloud and enterprise. Don't miss out!
How are ransomware groups carrying out attacks in 2022 and how are their tactics evolving? This session will answer those questions and offer practical advice for those trying to defend their networks from these accelerated attacks.
Cybercriminals have added a devious weapon to their attack arsenals - malicious browser notifications. And the worst part is they’re not blocked by any current cyber defense. These innocuous looking pop ups can wreak havoc on your network while remaining completely undetected. Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist to find out what you need to know now about malicious browser attacks and how to stop them.
Join Oracle Ace Director Charles Kim and Oracle experts Kellyn Gorman, Tim Gorman and Clay Jackson for a discussion about how Microsoft and Quest can help you migrate your Oracle workload to Azure Infrastructure with zero risk and near-zero downtime.
Join our webinar, in collaboration with Veeam, so you’re not a part of the 60% of Microsoft 365 users that DO NOT have a data protection solution in place. Learn more.
In this session, Nathan O’Bryan will explore different scenarios for hybrid and work-from-home workers. We’ll cover the best practice strategies your organization should be considering to ensure security, and compliance while maintaining the appropriate levels of access for workers using a mix of company owned and BYOD devices.
Microsoft Teams has become the backbone for many enterprises; remote workplace strategies. But in the rush to implement it (and Microsoft's rush to add new features and make other changes), knowing the best ways to use (and NOT to use) Microsoft Teams to manage your remote workforce can be hard to pin down.
Remote work and hybrid work have quickly become standard over the last few years. However, what remains the same is the need to manage both the users and the tools they use to perform the work. How you manage in a remote world is far from normal. This session will cover some best practices you can implement, specifically around Teams, to help with remote workforce management.
Take a peek under the hood at any given enterprise, and you’ll likely find hundreds to thousands of databases - commercial and open-source, relational and non-relational - running both on-premises and in one or more public clouds. Join Jeff Kelly, Senior Product Marketing Manager at Nutanix, to learn how Database-as-a-Service (DBaaS) can simplify and de-risk database administration, reduce operating costs, and turn databases from a blocker to an accelerator of software-driven innovation.
Based on Veeam’s 2022 Data Protection Trends Report, which surveyed nearly 3,400 IT leaders and implementers of data protection around the world, this session will look at the key scenarios that are driving changes in data protection tools and mechanisms.
Join the editors of Redmondmag.com plus independent experts in this free half-day summit that will walk you through what you need to know about best practices for managing and securing Microsoft 365. If you have anything to do with Microsoft Office 365, you don't want to miss this summit!
Due to the critical role Microsoft 365 has taken in most businesses' day-to-day operations, it is more important than ever to ensure that you are managing it properly and effectively. Join this session to learn the best practices for managing Microsoft 365.
This session examines security best practices that enterprises can use today to better protect their Microsoft 365 data. Learn more.
DevOps and Agile are commonplace practices in the enterprise today, and the advent of CI/CD pipelines has added monitoring and automation to the process, creating conduits for delivering code changes frequently and reliably. This Tech Talk applies some of the lessons learned from DevOps and Agile practices to the process of automating incident response in your organization.
Microsoft 365 is the most commonly used cloud office suite in the world, helping users generate, share, and store billions of files. In order to secure those files, many companies leverage M365’s out-of-the-box security capabilities but those capabilities can vary widely by license type, and many require extensive deployment, planning, and configuration.
UCaaS goes far beyond being just another way to communicate, and this session will highlight all the advantages enjoyed by those who have made the switch.
Ransomware attacks make headlines every week. Formerly proven security tools like next generation antivirus (NGAV) and endpoint detection and response (EDR) solutions don’t stop unknown attacks. Fileless, in-memory malware, and other advanced persistent threats evade NGAV and EDR at an alarmingly high rate. This is in spite of machine learning and behavioral detection.
You're moving to Azure Active Directory (AAD) but must maintain on-premises AD for the foreseeable future. Unfortunately, the only similarities between AAD and AD is the name. In this webinar, hybrid AD security experts from Semperis will talk about the difference, the interdependencies, and connections between these two mission critical identity stores. Join us to improve security and resilience for your legacy and Azure ADs, no matter where you are on the journey.
Cyberattacks and the threat of ransomware reached new heights in 2021. In this webinar, you'll hear strategies to increase your defense capabilities and ways to build greater resiliency for your Microsoft platforms. Watch now on-demand!
Join Ian Thornton-Trump for thoughts, feelings, emotions and raw survival instincts of looking at the latest and greatest “Zero Trust” approaches and finding that they may not hold up to “the real” world of IT unless - a lot of work, a lot of effort and money is readily available.
During this second session, we will examine some of the critical steps and preparations you’ll need to take to properly implement Zero Trust.
Join the editors of Virtualization & Cloud Review and Redmond magazines for this free half-day virtual summit bringing together independent experts detailing what you need to know now about zero trust.
Managing SQL Server estates is a daunting task, especially for DBAs and IT teams. In that case, this webinar will walk you through best practices and methods of automating many of these mundane tasks using Nutanix Database Solutions. Learn how these steps can help you minimize the risk of downtime, reduce costs, and ensure a well-run SQL Server deployment.
See award-winning DMaaS in action! From driving digital transformation to fortifying ransomware response strategies, companies of every size are leaning into Data Management as a Service (DMaaS) to safeguard their critical business data.
Over the next decade, 40% of the S&P 500 companies will cease to exist due to competition. Almost every business is aggressively adopting cloud, increasing their use of SaaS apps and allowing private apps to no longer run solely in the datacenter, but also the public cloud. Join us in helping your people and teams thrive, protect sensitive data, and propel the business forward and take a dive deep into the integrations between Microsoft and Zscaler.
Veeam® Software is secure by design. Having a reliable backup can be the difference between downtime, data loss and paying a costly ransom. Veeam Software includes instant recovery at scale in case of a massive outage. Plus, our software‑defined approach means there is no lock‑in into proprietary hardware and it works with your existing architecture, both on‑premises and in the cloud.
Stop ransomware in its tracks, ensure backup compliance and safeguard your recoverability with immutability for your backup copies.
The ransomware threat continues to put data and business reputations at risk. In this webinar, join Rick Vanover from Veeam® to share the latest tips for beating ransomware by assessing the threatscape, evaluating steps you can take to protect your data and learning what's new in Veeam Backup & Replication™ v11 to keep your data protected.
In this first “Coffee Talk” brought to you by our editors, we’ll discuss the key areas of change and the challenges IT pros can anticipate having to solve as we continue to evolve this new way of work. Join Senior Resultant Howard M. Cohen as we explore this brave new communicative world!
As businesses prepare to open up in the post-pandemic world, they've realized that conventional ideas of corporate perimeters have been altered permanently. Watch this webinar to learn about Cybersecurity challenges in the post-pandemic world, SASE: The long-term solution, and more.
Gain control over your Office 365 data! Within all SaaS platforms including Office 365, it is your organization’s data — you control it — and it is your responsibility to protect it. Veeam® Backup for Microsoft Office 365 eliminates the risk of losing access and control over your Office 365 data at scale, including Exchange Online, SharePoint Online, OneDrive for Business, and Microsoft Teams — so that your data is always protected and accessible.
For most organizations, what hinders data availability is failed backup and recovery. Modern services and cloud acceleration are putting a strain on legacy data protection solutions. We see upwards of a 60% failure rate in data recovery due to failed backup and recovery processes. But even with the most modern data protection, cyberthreats are still one of the biggest security threats for any enterprise organization. In 2020, ransomware attacks grew by 700% alone. However, with modernized protection, 96% of organizations that were affected by ransomware cut their average recovery costs down to $5,000, with 76% of companies not paying anything at all. How? Let’s look at an example of how easy it is to protect your data with Veeam.
In this session, you will learn about things that you can be doing today to improve the security of Active Directory and Azure AD. Learn more.
Join the editorial staff of Redmondmag.com and independent experts who will make sure IT managers have what they need to know to protect their enterprise. Learn more.
Join Ian Thornton-Trump as he looks at the evolution of Windows AD from its earliest days to the security solution, configuration and management tool it has become.
Join us for this technically‑focused presentation, and learn about the infrastructure components, and how simple it is to use Veeam® Backup for Microsoft Office 365 — from the early planning stage all the way to performing restores.
Watch this free technical product demo to get an in depth look into the best practices for using Veeam® Backup for Microsoft 365.
Although Teams data has its own basic retention, Microsoft doesn’t fully protect against accidental deletion or security threats that lead to data loss, nor does it enable long-term retention for compliance or regulatory purposes. Whether it’s Teams or your entire Office 365 environment, it's your data — you control it — and it is your responsibility to protect it.
Watch this interactive session to learn more about how NEW Veeam Backup for AWS delivers AWS-native backup and recovery that is both cost-effective and secure.
As IT continues to evolve as a result of work from home, digital transformation, cloud adoption, and other trends, identities are a critical element of protecting the organization as a whole. At the same time, identity management is becoming increasingly complex and unified identity security is often elusive.
A robust data protection solution is a vital component in your organization's tool set. Whether you need to restore files or application data, or recover entire workloads, your data protection solution must provide these capabilities with minimal effort and allow you to meet your operational objectives.
Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSinsider.net have created this free, half-day virtual event pulling together independent experts who will walk you through real-life techniques, best practices and more for helping you keep your cloud data protected and truly recoverable in 2022 and beyond. Learn more.
In this session, Karen Lopez covers best practices for modern data recovery and shares stories of worst practices just to keep it real. Learn more.
In this session, you will learn about some of the tools available across public cloud providers and third-party software vendors that can help you identify risks, limit exposure, and help you survive internal and external threat actors. Learn more.
Artificial intelligence for IT operations (AIOps) combines big data and machine learning to automate IT operations processes, including event correlation, anomaly detection, and causality determination. In this Tech Talk veteran technology journalist John K. Waters talks with Prashant Darisi, General Manager and Vice President of Customer Experience Management in the Global Solutions group at Everbridge.
You won't want to miss this free, half-day summit brought to you by the editors of Redmondmag.com to catch you up on what you need to know about Microsoft 365 & Teams heading into the New Year. Learn more.
Don't miss this half-day summit brought to you by the editors of Virtualization & Cloud Review, Redmondmag.com, PureAI.com, AWSInsider.net, MCPmag.com and ADTmag.com where you'll learn about how digital transformation has transformed for 2022 and how you can take steps now to take advantage of it in the coming year and beyond. Don't miss out!
In this session, we will discuss strategies that IT professionals can use to properly define digital transformation and develop an action plan to implement it. Learn more.
In this session, Senior Resultant Howard M. Cohen will take you through some smaller digital transformations, finding new ways to make small but meaningful process improvements through more innovative applications of available technologies. Learn more.
In this educational webcast, join industry experts as they discuss the latest research on what is driving data protection strategies in 2022 including tips on how to get started with Microsoft Azure and Veeam®.
Adrian and Greg will discuss trends, techniques and best practices in using optimized cloud object storage for backup, disaster recovery, and long-term data retention.
Managing email signatures across an organization can be complex and cumbersome. Ensuring consistent branding with professional and consistent email signatures for all users and devices is often an ongoing IT task with little return.
Come watch the editors of Redmondmag.com and Virtualization & Cloud Review at this half-day event featuring independent experts to review best practices for securing your remote workforce.
There is a new security threat being exploited. In addition, there are various regulatory requirements that need to be met to ensure successful implementations.
In this session we’ll explore why companies are becoming so much more deliberate in their approach to multi-cloud, including: Enjoying the best of all clouds, The importance of avoiding vendor lock-in and more! Learn more.
Join us for this half-day summit that will walk you through the security threats you can expect to face in the new year plus the real-world best practice advice you can implement right way. Learn more.
As cloud adoption has grown over time, many companies have solutions spread across different cloud vendors and on-premises. Multi-cloud can be very effective, enabling you to leverage the best of all options, however it must be implemented correctly to prevent issues.
In this live Tech Talk, veteran technology journalist John K. Waters talks with Bart Rys, Director of Business Solutions in the Everbridge Global Center of Excellence, about digital resilience.
In this webinar, we’ll discuss the role data protection plays in minimising ransomware risk, with a focus on how public sector organisations are harnessing it to protect their cloud data, and plan to recover if the worst happens.
Attend this presentation to learn how ransomware is evolving to inflict maximum damage and more importantly how to protect yourself and your organization.
Join us as a Cloud Security Architect covers the fundamental practices every enterprise must consider for comprehensive cloud management and security. Learn more.
What are the current best practices for the modern IT enterprise? Find out in this half-day summit from the editors of Virtualization & Cloud Review.
Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSinsider.net for this half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practice advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Learn more.
More organizations are protecting Office 365 than ever before, is yours one of them? Kick-off 2022 with an insightful checklist you can use as you evaluate third-party vendors for your Office 365 backup strategy.
In this webinar, we'll discuss why machine identity management is a crucial component in establishing a robust Zero Trust architecture, and how you can successfully gain better visibility over machine identities and automate the process of managing them.
In this session, we will look at the top 10 things you should consider right away to make your Microsoft 365 environment as secure as possible! Learn more.
During this 60-minute session, Nathan O’Bryan (Microsoft Certified Solutions Master: Messaging/5x Microsoft Most Valuable Professional) will dive into the EM+S E5 suite and the features it brings to help secure your Microsoft 365 deployment. Learn more.
Join the editors of Redmondmag along with Microsoft 365 experts for this informative and free half-day summit on Microsoft 365 Security: Top Installation, Configuration and Management Mistakes and "Gotchas" and the top 10 Microsoft 365 Security Best Practices Every Organization Must Implement. Learn more.
It's a hybrid-cloud/multi-cloud world. Find out the best tips, tools and best practices to support your new infrastructure.
Join us and let Derek Melber, 17X Microsoft MVP show you how to operate on the beast, making it capable of withstanding the constant attacks. Learn more.
Starting March 1, 2022, Microsoft will raise the fees of three products. For an organization with 20,000 employees, this M365 E3 uplift would cost an additional $960,000 per year. And, not actively measuring and managing these licenses often results in two costly challenges.
With security breaches on the rise, it is more important than ever for an organization to minimize its risk by separating administrative responsibilities. Even so, the Microsoft 365 native tools make it difficult to delegate administrative tasks at a granular level. This becomes far more challenging in multi-tenant environments.
Join the editors of Redmondmag.com and Virtualization & Cloud Review have pulled together this free half-day summit promoting what you need to know heading into the new year -- top trends and best practices that will keep your new remote workforce infrastructure not only secure and compliant but functional and cost-efficient into 2022 and beyond. Learn more.
In this session, we’ll take a look ahead at where many of the technologies we already use are heading, and what new tools may soon become available to help companies better roll with the momentum the Covid-caused work-from-home new normal has created. Learn more.
This informative talk will focus on practical steps that IT pros can take right now to take the pain out of working remotely. In this session, you will learn how to identify the biggest challenges that your organization is facing with regard to remote work, what IT’s priorities should be at this moment in time, and more! Learn more.
In this webinar we will discuss the NIST Cybersecurity Framework for Ransomware Risk Management with a focus on what the guidance includes, how this guidance compares to other options, how to detect where your program falls short, and actionable advice on where to start and which actions will yield the most benefit.
Find out the best way to get your defense plan in place with this free half-day summit brought to you by the editors of Virtualization & Cloud Review, AWSInsider.net and Redmondmag.com. Learn more.
Using automation as part of your digital transformation strategy is key for every IT manager in 2022 -- but do you know where to start? Or how to be successful? Do you have the tools to get you where you need to go?
In this live Tech Talk, veteran technology journalist John K. Waters talks with Stephen Walters, solution architect at xMatters, a subsidiary of critical event management company Everbridge, about the CI/CD pipeline.
Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSInsider.net for this free half-day summit along with independent experts who will help get you up to speed with real-world tools and techniques you need to know about Cloud Backup and Recovery in 2022. Learn more.
Learn all about how to optimize your Microsoft licenses for the upcoming renewal increases.
Microsoft Dynamics 365 is the heartbeat of your business, bringing together data and insights to better run day-to-day operations. But as data loss threats continue to trend in the wrong direction, there’s never been a better time to consider third-party data backup.
Join Ian Thornton-Trump CD for a look at all the security goodness built into the Windows Operating system to thwart malicious attacks and dive into the Windows security ecosystem and discuss his top security tips and system hardening ideas.
The editors of Redmondmag.com have created this half-day summit to get you up to speed on exactly what's happening with Microsoft's Security Roadmap plus give you tips, advice and best practices you can use right away to secure your Windows-based ecosystem. Learn more.
With the advent of Active Directory more than 20 years ago, the Kerberos protocol was a game-changer in terms of security, unification, and moving AD into the realm of identity management. Learn more.
Don't miss this expert-packed, two-hour summit created for CTOs, CIOs, IT directors, and IT professionals looking for technology trends that will impact them and their market in the new year. Learn more.
In this virtual summit, we look at top issues surrounding IAM, supplementing Active Directory and Azure AD, including SaaS authentication, changing compliance requirements and emerging approaches such as CARTA, continuous and adaptive risk and trust assessment. Learn more.
During this 60-minute session, Nathan O’Bryan (Microsoft Certified Solutions Master: Messaging/5x Microsoft Most Valuable Professional) will share his top identity management considerations and explain how these choices can have a lasting impact on your Microsoft 365 deployment. Learn more.
Join us to learn the best practices for establishing an IAM architecture that will work with your existing infrastructure and across clouds. Learn more.
Don't miss this free half-day summit brought to you by the editorial staff of Virtualization & Cloud Review and Redmondmag.com who will bring together independent HCI experts for to walk you through tips, advice, best practices and more that will help you master hyperconvergence. Learn more.
In this session, you will hear from two industry experts regarding best practices on managing and maintaining HyperConverged Infrastructure. Learn more.
In this session, you will learn essential information about keeping your HCI infrastructure running and looking at future-proofing your designs. Tune into this session for expert industry advice for two of the worlds leading experts in HyperConverged Infrastructure.
In this live Tech Talk, veteran technology journalist John K. Waters talks with DevSecOps expert Stephen Walters, solution architect at xMatters, a subsidiary of critical event management company Everbridge, about DevSecOps best practices. Learn more.
In this webinar Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, explores many ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Learn more.
This is the secont of a two-part podcast featuring experts from unified communications platform provider RingCentral.
To beat ransomware, preparation is key. In this session, Rick Vanover from Veeam® and Krista Macomber, senior analyst at Evaluator Group, will share advice on ransomware protection, so that you will be better equipped to handle a ransomware attack on your organization.
Join Veeam’s vice president of product strategy, Jason Buffington and vice president of enterprise strategy, Dave Russell as they share key research insights from the NEW 2021 Cloud Protection Trends Report to help organizations of all sizes learn what to consider when adopting cloud based production platforms and how to protect them.
Join our webinar where our SIEM expert talks about how you can align your SIEM framework with NIST guidelines. Learn more.
Don't miss this half-day summit where you will learn best practices and insights you need to make sure, should the worst happen (and it very well could), you can come back up with the click of a button. Learn more.
Join our expert solution architect to discuss a comprehensive approach to management and security of AWS. Learn more.
In this session, we'll go through a few cloud architectures and explain why these design choices were made, and discuss a few best practices around application scalability, security and resilience. Learn more.
Hear from experts who live and breathe AWS security, performance and recoverability and the editors of AWSinsider.net and Virtualization & Cloud Review in this half-day summit packed with tips and real-world advice.
With Office 365, It's your data — you control it — and it is your responsibility to protect it. Join the experts to find out why Office 365 backup is so essential! Learn more.
In this summit, join the editors of Redmondmag.com plus independent experts to learn everything you need to know about changes coming to Microsoft 365 in 2022! Learn more.
Keeping up with all the changes and new features in Microsoft 365 is a constant challenge. Join Nathan O’Bryan in this session as he covers some of the new features and functionality that have been announced for Microsoft 365. Learn more.
In this session we'll help you with the cliff notes brief understanding of "what's coming and what's new for this next calendar year" and catch you up on Microsoft 365 Best Practices. Learn more.
In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the "Cyber Kill Chain" in detail to show you how a single email slip up can lead to the total takeover of your network. Learn more.
Watch this webinar for a full run down of the latest on the Veeam Platform products with a demo of some of the newest capabilities, including native and advanced protection for AWS, Azure and Google Cloud Platform, and more! Learn more.
Whether its decisions about how to manage backups, or how to design high availability solutions in a hybrid cloud scenario, join us to learn about how to ensure you have availability, security and data integrity. Learn more.
Whether you are on platform as a service, or infrastructure as a service, or in a hybrid model, you will face new and different challenges when moving to the cloud. Join this session to learn about how to optimize your databases in modern infrastructure. Learn more.
Attend this free, half-day virtual summit brought to you by the editors of Virtualization & Cloud Review, Redmondmag.com & AWSInsider.net to learn what you need to know now about performance, best practices and more for managing your hybrid cloud infrastructure and data thanks to insights, advice and insights brought to you by leading independent hybrid cloud experts. Learn more.
Simplify data management between on-premises and public cloud environments and lower storage expenses with Azure-native backup and recovery, built for simplicity, scale, savings and security.
What are the top threats after your cloud today and heading into 2022? How can you make sure your cloud infrastructure and data remain as safe as possible, and easily recoverable if the worst happens? Join the editors of Redmondmag.com and Virtualization & Cloud Review for this free half-day summit. Learn more.
In this session Top 10 Cloud and Infrastructure and Data best practices you will gain valuable insight into protecting your cloud from our expert speakers. Learn more.
Join Ian Thornton-Trump CD for a look backward, a look forward and a stark warning about the biggest threats and the biggest opportunities for organization’s digital transformation efforts. Learn more.
This is the first of a two-part podcast featuring experts from unified communications platform provider RingCentral.
In this webcast, we will explore the top 5 tips for Tenant-To-Tenant migrations, including methods to prepare, migrate, coexist, and manage in this changing world. Learn more.
How do you address your organization’s growing (and evolving) email signature needs n without making it a full-time job? Learn more.
In this webinar we'll discuss in-depth a platform that can take care of all your IAM needs. Join to learn how to efficiently evaluate an IAM platform, see how ManageEngine AD360 can help you tackle IAM challenges across AD, Exchange, and Microsoft 365 environments and more! Learn more.
Join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Jason Jacobo from Quadrotech/Quest, for this educational webcast as they discuss why you can't just start migrating your archive, what archive data should and shouldn't be migrated and what your options are when it comes to migration strategies. Learn more.
Join the editors of Redmondmag.com plus independent experts in this half-day summit that will walk you through what you need to know about configuration, optimization, security, backup tips and tricks plus more. Learn more.
Join us to learn the top tips for managing your Teams environment and getting the most out of your deployment beyond just keeping Teams running for your users. Learn more.
Join us to learn the 10 actions you can take that will greatly increase your chances of fighting off attackers and building your resilience. Learn more.
What does it take to simplify the process of migration to achieve a secure and productive Windows 11 environment when you’re done? Learn more.
From the latest threats to the best recovery methods should the worst happen, this half-day summit will make sure you’re armed and ready if (when) your enterprise falls under attack. Learn more.
Join us as we take a page from the Facts of Life and look at the impact law enforcement is having on ransomware attacks and the groups that are still a threat.
Join two of the industry’s top experts on Cyber Security and Ransomware as they discuss how to take a proactive approach against Ransomware today. Learn more.
Join us as we discuss the dynamics of a new-age disaster recovery program that addresses a mobile workforce, the threat of ransomware, the sudden absence of key people, and how to define viable alternatives in the New Year. Learn more.
Join the editors of Redmondmag.com and Virtualization & Cloud Review, plus their hand-picked independent experts, as they walk you through the real-world advice that your organization is going to need to make sure you're truly protected in the year ahead with a disaster recovery and backup plan that is truly recoverable and that is also manageable and secure. Learn more.
Join us to learn the latest updates to Microsoft Teams that you need to know about in order to get the most from your Teams deployment. Learn more.
Join Redmondmag.com and independent Microsoft Teams experts for this completely free half-day summit to bring you real-world guidance you can use today to make your Microsoft Teams installation more secure, better performing and much easier to manage. Learn more.
Join us to learn the top Microsoft Teams deployment considerations and an explanation on how these choices can have a lasting impact on your Teams deployment. Learn more.
There is a common misconception that Microsoft fully backs up your data on your behalf, but the reality is that this is YOUR responsibility. Join NewCloud, an Otava Company and Veeam as we discuss Backup for Microsoft Office 365 and how it can help your business.
Don't miss this important look ahead at cloud data protection strategies that you need to know brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com. Learn more.
Join us for a look at what practices you and your organization should be implementing in your cloud and hybrid data solutions including Confidential Computing & Zero Trust, Data Security Features, Anti-tamper Features, and more! Learn more.
Join Ian Thornton-Trump CD, CISO for Cyjax Ltd as he outlines how we arrived into a post-pandemic digitally transformed landscape and the top threats to SaaS and hosting services. Learn more.
Join our experts to gain deep insight on the top 10 things you should never do with a Multi-Cloud Architecture. Learn more.
Don’t miss this half-day summit brought to you by the editors of Redmondmag.com, Virtualization & Cloud review and AWSinsider.net will bring together independent cloud security experts that will give you real-world information you can use to make sure your cloud data is truly secure. Learn more.
Join us to learn the best emerging practices for ensuring the optimal security posture for both the public and private cloud as part of an enterprise hybrid cloud platform. Learn more.
Join us to learn how the key to the remote workforce of tomorrow is to produce productivity and performance through people, platforms, applications, programs, processes, and policies. Learn more.
Join the editors of Redmondmag.com and Virtualization & Cloud Review along with independent experts who will share their insights on what you need to do NOW to make sure your remote workforce and digital workplace is protected for the future. Learn more.
Because remote work was put into place so quickly, the solutions that were rapidly adopted probably aren’t as secure as they might be if the organization had been able to take its time. Join us in taking a step back to consider how things could be improved – especially with regard to security. Learn more.
Join us as we discuss the security challenges involved in catering to a hybrid workforce, how Zero Trust and Secure Access Service Edge should be at the forefront of your IAM strategy and how to keep up with the key trends to build a strong IAM framework for your organization. Learn more.
Join Roger Grimes for this thought-provoking webinar where he’ll share the most common reasons for data breaches and a data-driven approach to determining your organization’s specific weaknesses. Learn more.
Join this summit to find out what your top infrastructure and cloud security concerns should be for the rest of 2021 and heading into 2022. Learn more.
Join us as an expert reviews the importance of not relying on only one control, and what additional measures can be used to protect you, or at least mitigate, against future problems.
Join the experts as they discuss the top 10 tips for Cloud Infrastructure in 2022 surrounding networking, site connectivity, security, administration and more. Learn more.
When gathering crucial data from employees’ mobile phones, are you having to ship equipment or struggling with lengthy support sessions with custodians to guide them through the process?
With remote mobile collection, you can gather insights from across a variety of data sources and collect only the data you need to protect employee privacy during eDiscovery investigations.
In this Webinar, you will learn a number of data protection strategies particularly with regard to data backups and security. Learn more!
Join the editors of Redmondmag.com and Virtualization & Cloud Review for this free half-day summit where they'll bring you together with independent experts who work with Microsoft 365 security day-in and day-out. Learn more.
Join us as we look into the common mistakes or assumptions related to making sure your data in Microsoft 365 is safe and how to correct them. Learn more.
The steps of a cyber attack against an enterprise are always the same. The exploits attackers leverage are nearly the same as well. Therefore, it is due time that we start protecting our networks with more intelligent approaches. Let 17X Microsoft MVP Derek Melber give you a clear path to a more secure network. Learn more.
In this session, an identity and access management expert will walk you through some attack techniques that bypass traditional monitoring solutions. Learn more.
Are you prepared to manage your entire AWS cloud ecosystem securely? Make sure you're truly secure with this free half-day summit. Learn more.
Join us to learn how to protect yourself against ransomware and the latest security threats as we discuss AWS Architectures designed for data protection, backups, and disaster recovery. Learn more.
Join this panel Q&A commenting on the lessons learned from the angles of Improved Detection, Threat Hunting, and Accelerated Response.
2021 has been a weird one for ransomware. We've seen more ransomware groups than ever either taken down by law enforcement or decide to "retire" but ransomware attacks have not slowed down at all. Learn more.
Don't miss this half-day summit where you will learn best practices and insights you need to make sure, should the worst happen (and it very well could), you can come back up with the click of a button. Learn more.
The shift to a hybrid workforce and digital workspaces has caused many organizations to heavily rely on PDF documents, e-signatures and workflows to replace manual in-office processes that no longer meet current business needs. Learn more.
Enterprises all over the world are seeing more mission-critical cloud-native applications deployed on Kubernetes. Learn more.
SASE is a security framework designed to counter threats that thrive in an environment which is invisible and distributed. Learn more.
How can you implement privileged access management where both flexibility and effectiveness are achieved? Learn more.
Don’t miss this summit that will keep you ahead of those changes and give you real-world insights you can use the same day to improve your Microsoft 365 and SharePoint Online installations. Learn more.
Join us for this session to learn a number of best practices that can enhance SharePoint’s performance. Learn more.
Join us for this session to learn a number of best practices that can enhance SharePoint’s performance. Learn more.
This Webcast explains why it’s time to take a step back and take a critical look at your organization’s unified communications strategy, especially as it relates to Teams. Learn more.
During this webinar, we'll be unpacking some of the deeper integration potential around MCAS and your 3rd party SaaS and PaaS apps. Learn more.
Join us to discover top cloud security threats and what you can do to secure your multi-cloud and hybrid cloud environment in the face of today's top threats. Learn more.
The key takeaways from this presentation will help security and IT teams support your organization’s business objectives while at the same time continuing to maintain a robust security and compliance posture. Learn more.
This session outlines strategies and tactics for keeping our hybrid cloud environments safe from ever-increasing threats. Learn more.
In this webinar, we're going to provide some of our favorite tips and guidance to help you best manage Microsoft Teams. Learn more.
Application delivery infrastructure and security have become more complex. Learn more.
Join Senior Resultant, Howard M. Cohen, as he shows you how to produce your best results by leveraging Teams best practices. Learn more.
Join the editors of Redmondmag.com and independent Microsoft Teams experts for this free, half-day summit filled with real-world tips, advice and best practices to help you get the most out of your Microsoft teams installation, no matter the size of your organization. Learn more.
Join this session as we look at ways you can maximize some of the other benefits Microsoft Teams has to offer. Hopefully, you'll come away from this session with at least one new piece of functionality within Teams that you can take back to your organization to help you get even more from platform! Learn more.
In this webcast, we will share the latest tips and tricks for implementing this new capability for those critical workloads that require near-zero Recovery Point Objectives (RPOs). Learn more.
Sign up for this webcast and you’ll come away with a clear understanding around system and licensing requirements, and talking points to convince your internal stakeholders of the shift. Learn more.
After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Learn more.
Join us for the second session of summit as you will learn about the options you have, their cost impact and structure, and finally best practices for securing your environment. Learn more.
Join us for the first session of summit to learn how ransomware groups are going after the cloud with the same ferocity they have been attacking local networks and learn what you need to do to protect yourself and your cloud providers. Learn more.
Join us for this half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practice advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Learn more.
After identifying and analyzing the cybersecurity issues faced by SMEs post-pandemic, the EU has developed recommendations that could help SMEs improve their cybersecurity posture. Learn more.
This webinar is for you if you’ve been comfortable with the old portal but want to know more about the new environment. Learn more.
Please join us for this session as we discuss tips on how to make your cloud usage more efficient! Learn more.
Remember when managing your network or data center meant constantly updating, upgrading, and shopping for new hardware and new software to constantly keep making your infrastructure better and better? Learn more.
Attendees of this Redmond and Virtualization & Cloud Review virtual summit will find out the latest on the key emerging differences of each major approach and for ideas from experts to get more business value out of their architecture. Learn more.
Join the editors of Virtualization & Cloud Review and Redmondmag.com as they bring together experts in the cloud and Infosec world to make sure their data stays secure in their modern cloud infrastructure. Learn more.
Join IT industry veteran Howard M. Cohen for an in-depth examination of best practices around managing both your people and your tech to achieve maximum security, and maximum regulatory compliance, too! Learn more.
Join Ian Thornton-Trump CD for a blunt assessment of the ten threats to your cloud data, how Digital Transformation projects can derail organizational security and how to introduce new attack surfaces for malicious actors to pray upon. Learn more.
Join this webcast and you’ll walk away understanding how to balance the needs around organizational security with your user’s quality of work life. Learn more.
Join editors and experts of Virtualization & Cloud Review to find out what you need to know to defend, protect and recover when ransomware comes after you. Learn more.
Join us for this webcast as we discuss Attack Surface Reduction, creating valuable Identity Protection Policies, and managing your end user’s experience in the process. Learn more.
Join this webcast and learn about the infrastructure components, and how simple it is to use Veeam Backup for Microsoft Office 365 — from the early planning stage all the way to performing restores. Learn more.
Get the details you need to know now to protect your organization from phishing and social engineering attacks. Learn more.
Join us as Howard M. Cohen examines how to approach data management and protection in today’s hybrid environments. Learn more.
Join this session of summit to learn about networking, authentication, security, and monitoring concerns, and techniques for resolving them. Learn more!
To help guide you the editors of Virtualization & Cloud Review, AWSinsider.net and Redmondmag.com have teamed up with independent cloud experts to show you how architecture, best practices, security protocols, new tools and much more can make your job managing these systems so much easier. Learn more!
Join us as we take a deep dive into the process of these Proxylogon attacks and use this information to establish steps you can take to keep your organization secure from similar zero-day attacks using a strong SIEM framework. Learn more.
Join us for this session of summit to learn how others are evaluating and planning how and where work will be happening going forward. Learn more.
The editors of Redmondmag.com and Virtualization & Cloud Review, along with independent experts, will provide expert advice and insight on optimizing and securing your prospect's infrastructure today and preparing and upgrading it for tomorrow. Learn more.
Over the past 18 months, it’s likely you’ve forgotten about potential risks that existed when expanding to the cloud. Learn more.
Join us for this webcast from IAM Security analyst experts to hear the top considerations and pitfalls to avoid when determining your IAM Active Directory (AD) security and management strategy. Learn more.
For this session Tom Fenton reached out to his friends in the industry to get their insights and he will go over what they and he has learned over the last year: the good, the bad and, of course, the ugly of enabling remote workers. Get the useful details.
Join us for this session as we discuss how the pandemic began to grip the world in early 2020 and kicked off a forced march to remote work. Learn more.
Join us for this crucial webinar that will walk you through the new backup & recovery best practices every DBA needs to know to make sure their data is secure and recoverable in today's cloud landscape. Learn more.
With the accelerating pace and increasing sophistication of cyberattacks, having a common framework for your security strategy helps you cope with the changing threat landscape. Learn more.
Join BlueVoyant’s Owen Allen and Mike Scutt for a deep dive into some of the tools and techniques used by BlueVoyant Threat Hunters to identify breaches and threats more quickly. Learn more.
During this session, they’ll discuss how Microsoft Dynamics 365 is transforming business operations in the cloud and how the newest Metallic SaaS offering extends native capabilities for purpose-built protection, rapid recovery from attack, and long-term data retention to meet SLA compliance. Learn more.
In this session, we will look at best practices, tips, trends and techniques pertaining to cloud backup and recovery so you can be prepared when something happens. Learn more.
Join Roger for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware. Learn more.
In this Webinar, you will learn how Microsoft 365 delegation differs from that of on premises environments, what Microsoft recommends with regard to administrative, and strategies for managing multi-tenant environments. Learn more.
In this presentation, Karen Lopez shares her top 5 ways to protect data and the systems that house it. She’ll even throw in one or two that aren’t typically covered under this topic.
Password attacks are one of the most common reasons for data breaches even in 2021. The best way to get ahead of cybercriminals is to think like them. In this webinar, we'll show you how. Learn more!
This session will provide an overview of detection types, applicability, and rule aggregation to help you better focus on events that matter. If you can't tell your RBA from your UBA, join us on our journey to detection excellence! Learn more.
Join us at this interactive and engaging webinar to learn how Microsoft Windows Embedded IoT and Azure cloud enable digital transformations helping partners to accelerate their delivery goals. Find out more now.
The shifts that have occurred in the last 12 months in the way your organization operates have resulted in a drastically different working environment than what previously existed. Learn how you should go about addressing post-COVID insecurity? Register now.
In this special editorial webcast, experts from Redmondmag.com will walk you through basic steps for considering a major Digital Transformation project. We'll look at everything from identifying stakeholders, rallying organizational support, to determining and securing budget and executing the project. Learn more.
Based on methodologies developed though BlueVoyant's continuous research into attacker TTPs and real-world experience in countering espionage and financial crimes, our Threat Hunters will expose expert perspectives on human-driven defense. Learn more.