Webcasts


On Demand

Coffee Talk: End User Experience Monitoring 101

Are you struggling to understand user complaints about application performance? Register Now to learn how monitoring end user experience can help you better optimize your applications and more! thank you

Duration: 1 hour


Azure Virtual Desktop Summit: Build a Better Virtual Desktop & Identity Migration Strategy to the Cloud

Our panel of experts and industry insiders will help you determine the best ways to plan, configure, migrate and manage your most critical infrastructure solutions for the cloud era. Whether you’re looking to learn more about cloud-based identity management with Entra or cloud-based VDI with Azure Virtual Desktop (or both!), we’ll guide you through the intricacies of building a more secure, scalable and cost-effective environment. Register today!

Duration: 3 hours


Zero Trust-Focused End User Training Tips, Tricks and Pitfalls

Join Greg Schulz, Author and senior analyst at Server StorageIO and Microsoft MVP Cloud Data Center Management, as he discusses moving beyond the what and why to zero trust-focused end-user training, tips, best practices, and what to watch out for.

Duration: 1 hour


Trust No One Summit: Why You Should Modernize Your Security Posture with Zero Trust (and How To Do It)

Join this free, three-hour summit to get the expert guidance and insight you need to start modernizing your organization’s security infrastructure. Learn more!

Duration: 3 hours


Hybrid Cloud Backup All Demo Session: From Deployment to Day 2 Operations

In this All Demo webinar, two technologists from the Product Strategy team will point and click you through the critical setup steps, showing users of Veeam Backup & Replication™ and Veeam ONE™ just how easy it is to pivot your installation to natively protecting cloud hosted workloads in AWS, Microsoft Azure and Google Cloud.


Standardizing Backups Across Hybrid Cloud

In this webinar Veeam cloud subject matter experts share hybrid cloud data protection best practices, reference architectures and demos as a how-to for lowering costs, bettering security and standardizing backups across your hybrid cloud.


Journey to Scale: Overcoming the Challenges of Managing AKS Infrastructure as You Scale

In this podcast, veteran technology journalist John K. Waters talks with two subject matter experts, Shon Harris of Spot by NetApp and Ayo Ayodeji, Senior Program Manager in Microsoft's Azure Technology Strategy group, to clarify the common challenges faced by app dev teams working with AKS—challenges that can lead to overwork and real burnout, even among the members of the most sophisticated teams. And they'll outline the best practices for scaling AKS infrastructure and keeping costs in check.


The Three Pillars of Successful Azure Cloud Operations

Learn how to get started adopting the CloudOps practices, processes, and tooling that will enhance engineering agility in your organization, reduce team burnout. and maximize your ROI from Azure cloud. Join to learn more!

Duration: 1 hour


2024 Ransomware Outlook Summit

Is your team ready for the new wave of ransomware attacks? Register for this free, expert-led summit to learn everything you need to know about emerging attack methods, the biggest targets, the most likely culprits, and the tried-and-true ways to reduce your risk and bounce back from an attack if (or when) one happens. Don’t delay – sign up now!

Duration: 2 hours


Mastering Security Orchestration: Automating Response and Remediation with Microsoft Sentinel Combined with Azure OpenAI

Join us for the second part of our two-part series for a deep dive into the world of automated and orchestrated response remediation with Microsoft Sentinel and AzureOpenAI.


Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods

Your digital identity is the gateway to your organization's most valuable assets. Watch this webinar now to learn how to keep your fortress secure!

Duration: 1 hour


Maximize Your Cloud Security

Join Insight for a webinar and hear experts share information about Managed Security Services (MSS) available to help you fight the battle to keep data secure. You’ll learn about how to manage security without sacrificing productivity, governance or compliance.


Optimize your IT Environment with Red Hat and AWS

This webinar describes how setting a foundation on Red Hat Enterprise Linux for both on-site datacenter and AWS environments can help you improve productivity, security, and operations as you move to the cloud and adapt to an increasingly digital world. Join in to learn more!


How to Guard Your Microsoft 365 Investment: Email Security Strategies

Join our cybersecurity experts Mark Harris and Brette Petersen for practical guidance on enhancing native Microsoft 365 email security to learn how to assess existing gaps in your current email security posture, when your organization should consider implementing additional security controls, and more.

Duration: 1 hour


Safeguarding Microsoft 365 Summit: Modern Security Best Practices for 2024 and Beyond

Join this three-hour, expert-led summit where you’ll learn the most common Microsoft 365 weak spots, the newest emerging attack vectors and methods, the best ways to mitigate these threats, and much more. Don’t wait – register today!

Duration: 3 hours


Getting the Most Out of AI with Open Source and Kubernetes

In this webinar, we’ll take you through how to get the most out of open source AI, introduce you to OpenShift Data Science, and provide a roadmap for planned future investments by Red Hat for AI on Red Hat OpenShift. Join to learn more!


Coffee Talk: Attack Roundup: Top Remote Device Threats in Q4 and Beyond (and How To Stop Them)

Join Greg Schulz, Author and senior analyst at Server StorageIO and Microsoft MVP Cloud Data Center Management, as he discusses trends, issues, and challenges around remote device threats in Q4 and beyond and how to protect them.

Duration: 1 hour


Coffee Talk: Intro to Endpoint Security

Join security expert Ian Thornton-Trump CD as walks you through the realities of endpoint security, from protecting legacy systems, business services and even ephemeral workloads such as Elastic Beanstalk, so you can know how to thwart cyberattacks and keep your business afloat.

Duration: 1 hour


Coffee Talk: SaaS & Your Digital Transformation: What IT Managers Need to Know

As more companies engage partners to help them achieve real digital transformation, SaaS will be a more and more frequent component of the IT solutions that help them realize their goals. In this session, Senior Resultant Howard M. Cohen will discuss several SaaS-based strategies that accelerate and enable powerful digital transformation for your clients. Learn more!

Duration: 1 hour


Precision in Protection: Operationalizing Threat Detection and Response with Microsoft Sentinel

During part one of our two-part webinar series, we’ll explore how to operationalize Microsoft Sentinel’s SIEM (Security Information and Event Management) and SOAR (Security Orchestration Automation and Response) capabilities combined with Security Operation Center analysis and response to rapidly detect, triage, and respond to actionable threats to your organization.