On Demand
Join Greg Schulz, Sr. Analyst & Microsoft MVP at Server StorageIO, and Jerry Carlson, Microsoft Alliance Manager at Critical Start, for an interactive discussion. Jerry and Greg will discuss trends, customer pain points, techniques, and best practices for Operationalizing and maximizing your Microsoft Security investment with MDR. Learn more!
Although some Active Directory deployments are simplistic, even a basic Active Directory deployment can eventually become unwieldy and difficult to manage. This session will discuss things that organizations large and small can do to tame their Active Directory environments, making them more efficient and easier to manage.
Duration: 1 hour
Maintaining good security is one of the most important tasks for any Active Directory environment. In this session, you will learn why a previously secure Active Directory might no longer be secure, things that you should be doing today to harden your Active Directory environment, and Microsoft’s current best practices for Active Directory security.
Duration: 1 hour
Azure Active Directory (Azure AD)/ Active Directory are extremely powerful tools for your enterprise, but are you using Active Directory to its top potential. Do you know the current best practices? Are there new features you might have missed out on? With everything IT managers need to fully grasp when it comes to Azure AD/Active Directory, the editors of Redmondmag.com have pulled together this half-day summit to walk you through the new best practices for wielding Azure AD/Active Directory to your best advantage. Don't miss out!
Duration: 3 hours
Join us for a Coffee Talk and find out why many organizations are re-defining and re-distributing their contact centers, and what you need to get started/support it. Learn more!
Duration: 1 hour
Join us as we examine the components Gartner originally identified when they first defined Zero Trust, and some that have evolved. We'll also examine how to approach it from a broad encompassing level down to as many areas of detail as we can fit into one session.
Duration: 1 hour
Join the editors of Redmodmag.com with independent security experts for this free half-day summit that will walk you through real-world best practices, practical advice and new tools you might have missed.
Duration: 3 hours
Multicloud is no longer a matter of “if”, it is a matter of “when” and “how”. But how will organizations operationalize and manage Multicloud? In this session, we share best practices and lessons learned from the trenches to help you successfully adopt Multicloud.
Duration: 1 hour
Come join us to learn how to implement best practices for enterprise hybrid multicloud management, such as creating a consistent view across the cloud environments with a unified layer of abstraction and governance and securing managed cloud infrastructure resources across multiple functional areas.
Duration: 1 hour
We'll give you the first thing NOT to do right here from the outset: Don't think multi-cloud is too complex to manage, and don't think it's simple. Join this session to learn what's the differences, why choose one cloud over another, and apply DevOps to Multi-Cloud Management to achieve continuous improvement through continuous deployment.
Duration: 1 hour
Attend this half-day virtual summit to learn what you need to know now about performance and best practices for getting Azure, AWS and GCP to work better together. As always, our summit session content is from the editors of Redmondmag, plus independent experts who offer real-world insight and advice that attendees can use right away!
Duration: 3 hours
Join the editors of Virtualization & Cloud Review and Redmondmag.com along with independent data and infosec experts who do this work day-in and day out who will walk you through all the modern tips, tricks and best practices you need to know to truly keep your data secure, no matter your cloud setup.
Duration: 2 hours
In this session you will learn about patterns and practices for network security, protecting those pesky storage accounts, and how to plan for effective and secure access for your company and even for third parties who may need to access your data. Learn more!
Duration: 1 hour
In this session, you will learn about the basics of protecting your data while gaining the flexibility and speed that the cloud delivers. Learn more!
Duration: 1 hour
Time to stop thinking WFH. When people work remotely, they may not be home. Your remote work policies and procedures must include public places too. Join Senior Resultant Howard M. Cohen for a hot cup of info and insight about keeping everyone and everything secure and productive from afar!
Duration: 1 hour
It may not be clear exactly what the “next normal” looks like for your organization, but with renewed focus on transformation for nearly every business there is opportunity to rebuild and gain a competitive advantage. Join Harsha Kotikela of Nutanix as he discusses how to implement EUC in the modern era and avoid the mis-steps of the past and how a Citrix on Nutanix solution can help you.
Duration: 1 hour
Over the past few years, we have seen an unprecedented adoption of remote work. With this in mind, now is a great time to reflect on what we have learned during this time about rapid, large-scale deployments of VDI environments and the best practices around it. People who are new to, or are investigating, VDI will gain insights into how to make their transition from physical to virtual desktops smoother while those who already have a VDI environment in place will pick up tips to help optimize it and provide a better experience for their users.
Duration: 1 hour
The editors of Virtualization & Cloud Review and Redmondmag.com as well as independent experts who will take a deep-dive into the current status of end user computing technology, review best practices for securing your remote workforce and share real-world knowledge for configuring, maintaining and improving your VDI and other end user computing technology. You won't want to miss it!
Duration: 3 hours
In this webinar, we'll discuss how a UEBA solution fits into a Zero Trust architecture and how you can implement the same. Learn more!
Ransomware and other cyberthreats are changing business’s needs for data protection across their on-premise, private cloud, SaaS and public cloud environments. Discover the benefits of multi-layered data protection for your Hybrid IT environments.