On Demand
In this session, we'll look at what's possible (and what's not) in Microsoft 365 regarding protecting your data. We'll look at the hot new features for securing data, backing up data, and what options you have to restore your data.
Duration: 1 hour
You won't want to miss this free half-day summit from the editors of Redmondmag.com that will keep you ahead of those changes and give you real-world insights you can use the same day to improve your Microsoft 365 installation and make sure it's secure and recoverable in the year ahead. Don't miss it!
Duration: 3 hours
In this session, Nathan O’Bryan (MCSM: Messaging, MVPr Office 365) will explore Best Practices for Securing, Administering & Recovering M365 to ensure security, and compliance while maintaining the appropriate levels of access for end-users. Learn more!
Duration: 1 hour
This webinar will tell you what you should look for in an IAM solution to obtain higher cyber insurance coverage at a lower premium cost. Don't miss it!
In this session you will learn about how to protect your data in these complex environments, and secure your environment, and overcome common configuration mistakes that many organizations make. Learn more!
Duration: 1 hour
Join this free, half-day summit brought to you by the editors of Virtualization & Cloud Review as they bring together data and infosec experts and cloud architects who will walk you through the topic of modern cloud data techniques and best practices that every IT manager needs to maximize their hybrid/multi-cloud environment and keep it secure. Don't miss it!
Duration: 3 hours
In this session we will talk about what’s the same, what’s different, and what’s “it depends”. This session will also address the costs and risks of bringing on-Prem design patterns to the cloud. Don't miss it!
Duration: 1 hour
Join us for a Coffee Talk on in-depth Azure AD/Active Directory security real-world tips, tricks and advice and get a $5 Starbucks gift card on us! Don't miss out!
Duration: 1 hour
Ransomware is today’s number one threat affecting businesses of all sizes. During this session you’ll learn and understand about The current state of ransomware and how it’s evolved, including the new threat landscape, Industry best practices around planning and preparing for a ransomware incident, and more!
Duration: 1 hour
A hybrid cloud infrastructure just makes sense for many organizations. Most enterprises use a variety of cloud types and services -- and rightly so -- but unfortunately, that’s going to complicate your security strategy. Learn the tips, tricks, do's, don'ts and modern best practices of experts who secure (and recover) these systems on a daily basis. If you're responsible for your organization's cloud infrastructure in any way, this is the summit you don't want to miss!
Duration: 3 hours
Microsoft's Azure cloud technology has so much to offer enterprises, but most IT leaders can't keep up with all the relevant changes. And Azure can be the key to your digital transformation strategy, but only if you understand how it can lead your efforts toward application modernization, reducing technical debt, and more. That's why the editors of Redmondmag.com have joined with independent experts and MVPs, plus leaders from Microsoft and SoftwareONE, to walk you through what's new in Azure and how it can truly be the linchpin for your organization's digital transformation strategy. You don't want to miss this free, half-day summit -- register now!
Duration: 3 hours
The editors of Redmondmag.com have joined with independent experts to create this this free half-day summit that will walk you through current best practices for managing, securing and recovering Microsoft Teams, offering real-word advice, top tips and solutions.You don't want to miss it!
Duration: 3 hours
Since the onset of the pandemic over two years ago, Microsoft Teams has become one of the world’s most indispensable applications. This session discusses various Microsoft best practices as they relate to Teams security, data protection, and recovery.
Duration: 1 hour
In this session, Nathan O’Bryan (MCSM: Messaging, MVPr Office 365) will explore Best Practices for Securing, Managing and Recovering Microsoft Teams to ensure security, and compliance while maintaining the appropriate levels of access for end-users.
Duration: 1 hour
Join the editors of Virtualization & Cloud Review and Redmondmag.com for this free, half-day virtual summit bringing together independent experts who will walk you through what zero trust is and the best ways to implement it in your enterprise.
Duration: 3 hours
With all the threats attacking your hybrid cloud infrastructure, you know how important reliable data backup and disaster recovery is -- and with the shared responsibility model, it's really up to you to make sure you can get things right (and quickly!) Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSInsider.net for this free half-day summit along with independent experts who will help get you up to speed with real-world best practices for hybrid cloud enterprise backup and disaster recovery in 2022 and beyond.
Duration: 3 hours
In this session, you will learn about the types of disaster recovery options that are available, how they protect your data, and some strategies for providing good data protection at several different price points.
Duration: 1 hour
Disasters take many forms when they strike IT systems. Are you ready to spring into action with a concise plan, restoring your company's systems quickly and safely? Join this session to learn DR best practices proven in the field by seasoned IT veterans. Understanding what works and what doesn’t could make all the difference when disaster strikes, and time is of the essence.
Duration: 1 hour
The editors of Redmondmag.com, Virtualization & Cloud Review, and AWSInsider.net have brought together independent security experts for this free, half-day summit that will walk you through the security threats you can expect to face in the new year plus the real-world best practice advice you can implement right way. Don't miss out!
Duration: 3 hours
Authentication, despite forming the basis of every security strategy, cannot be overlooked as a minor cog in the wheel. With hybrid model of working being the norm, it is imperative for authentication to be context-aware, and sensitive to all unique userrelated cases. Learn more!