On Demand
Make sure you're ready for the biggest threat to your cloud and enterprise. Don't miss out!
Duration: 3 hours
How are ransomware groups carrying out attacks in 2022 and how are their tactics evolving? This session will answer those questions and offer practical advice for those trying to defend their networks from these accelerated attacks.
Duration: 1 hour
Join our webinar, in collaboration with Veeam, so you’re not a part of the 60% of Microsoft 365 users that DO NOT have a data protection solution in place. Learn more.
In this session, Nathan O’Bryan will explore different scenarios for hybrid and work-from-home workers. We’ll cover the best practice strategies your organization should be considering to ensure security, and compliance while maintaining the appropriate levels of access for workers using a mix of company owned and BYOD devices.
Duration: 1 hour
Remote work and hybrid work have quickly become standard over the last few years. However, what remains the same is the need to manage both the users and the tools they use to perform the work. How you manage in a remote world is far from normal. This session will cover some best practices you can implement, specifically around Teams, to help with remote workforce management.
Duration: 1 hour
Microsoft Teams has become the backbone for many enterprises; remote workplace strategies. But in the rush to implement it (and Microsoft's rush to add new features and make other changes), knowing the best ways to use (and NOT to use) Microsoft Teams to manage your remote workforce can be hard to pin down.
Duration: 3 hours
Join the editors of Redmondmag.com plus independent experts in this free half-day summit that will walk you through what you need to know about best practices for managing and securing Microsoft 365. If you have anything to do with Microsoft Office 365, you don't want to miss this summit!
Duration: 3 hours
Due to the critical role Microsoft 365 has taken in most businesses' day-to-day operations, it is more important than ever to ensure that you are managing it properly and effectively. Join this session to learn the best practices for managing Microsoft 365.
Duration: 1 hour
This session examines security best practices that enterprises can use today to better protect their Microsoft 365 data. Learn more.
Duration: 1 hour
UCaaS goes far beyond being just another way to communicate, and this session will highlight all the advantages enjoyed by those who have made the switch.
Duration: 1 hour
During this second session, we will examine some of the critical steps and preparations you’ll need to take to properly implement Zero Trust.
Duration: 1 hour
Join Ian Thornton-Trump for thoughts, feelings, emotions and raw survival instincts of looking at the latest and greatest “Zero Trust” approaches and finding that they may not hold up to “the real” world of IT unless - a lot of work, a lot of effort and money is readily available.
Duration: 1 hour
Join the editors of Virtualization & Cloud Review and Redmond magazines for this free half-day virtual summit bringing together independent experts detailing what you need to know now about zero trust.
Duration: 2 hours
Over the next decade, 40% of the S&P 500 companies will cease to exist due to competition. Almost every business is aggressively adopting cloud, increasing their use of SaaS apps and allowing private apps to no longer run solely in the datacenter, but also the public cloud. Join us in helping your people and teams thrive, protect sensitive data, and propel the business forward and take a dive deep into the integrations between Microsoft and Zscaler.
Duration: 1 hour
As businesses prepare to open up in the post-pandemic world, they've realized that conventional ideas of corporate perimeters have been altered permanently. Watch this webinar to learn about Cybersecurity challenges in the post-pandemic world, SASE: The long-term solution, and more.
Join Ian Thornton-Trump as he looks at the evolution of Windows AD from its earliest days to the security solution, configuration and management tool it has become.
Duration: 1 hour
Join the editorial staff of Redmondmag.com and independent experts who will make sure IT managers have what they need to know to protect their enterprise. Learn more.
Duration: 3 hours
In this session, you will learn about things that you can be doing today to improve the security of Active Directory and Azure AD. Learn more.
Duration: 1 hour
In this session, Karen Lopez covers best practices for modern data recovery and shares stories of worst practices just to keep it real. Learn more.
Duration: 1 hour
In this session, you will learn about some of the tools available across public cloud providers and third-party software vendors that can help you identify risks, limit exposure, and help you survive internal and external threat actors. Learn more.
Duration: 1 hour