On Demand
Join us as we take a page from the Facts of Life and look at the impact law enforcement is having on ransomware attacks and the groups that are still a threat.
Duration: 1 hour
From the latest threats to the best recovery methods should the worst happen, this half-day summit will make sure you’re armed and ready if (when) your enterprise falls under attack. Learn more.
Duration: 3 hours
Join two of the industry’s top experts on Cyber Security and Ransomware as they discuss how to take a proactive approach against Ransomware today. Learn more.
Duration: 1 hour
Join us as we discuss the dynamics of a new-age disaster recovery program that addresses a mobile workforce, the threat of ransomware, the sudden absence of key people, and how to define viable alternatives in the New Year. Learn more.
Duration: 1 hour
Join the editors of Redmondmag.com and Virtualization & Cloud Review, plus their hand-picked independent experts, as they walk you through the real-world advice that your organization is going to need to make sure you're truly protected in the year ahead with a disaster recovery and backup plan that is truly recoverable and that is also manageable and secure. Learn more.
Duration: 3 hours
Join us to learn the latest updates to Microsoft Teams that you need to know about in order to get the most from your Teams deployment. Learn more.
Duration: 1 hour
Join us to learn the top Microsoft Teams deployment considerations and an explanation on how these choices can have a lasting impact on your Teams deployment. Learn more.
Duration: 1 hour
Join Redmondmag.com and independent Microsoft Teams experts for this completely free half-day summit to bring you real-world guidance you can use today to make your Microsoft Teams installation more secure, better performing and much easier to manage. Learn more.
Duration: 3 hours
There is a common misconception that Microsoft fully backs up your data on your behalf, but the reality is that this is YOUR responsibility. Join NewCloud, an Otava Company and Veeam as we discuss Backup for Microsoft Office 365 and how it can help your business.
Join us for a look at what practices you and your organization should be implementing in your cloud and hybrid data solutions including Confidential Computing & Zero Trust, Data Security Features, Anti-tamper Features, and more! Learn more.
Duration: 1 hour
Don't miss this important look ahead at cloud data protection strategies that you need to know brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com. Learn more.
Duration: 3 hours
Join Ian Thornton-Trump CD, CISO for Cyjax Ltd as he outlines how we arrived into a post-pandemic digitally transformed landscape and the top threats to SaaS and hosting services. Learn more.
Duration: 1 hour
Don’t miss this half-day summit brought to you by the editors of Redmondmag.com, Virtualization & Cloud review and AWSinsider.net will bring together independent cloud security experts that will give you real-world information you can use to make sure your cloud data is truly secure. Learn more.
Duration: 3 hours
Join us to learn the best emerging practices for ensuring the optimal security posture for both the public and private cloud as part of an enterprise hybrid cloud platform. Learn more.
Duration: 1 hour
Join our experts to gain deep insight on the top 10 things you should never do with a Multi-Cloud Architecture. Learn more.
Duration: 1 hour
Join us to learn how the key to the remote workforce of tomorrow is to produce productivity and performance through people, platforms, applications, programs, processes, and policies. Learn more.
Duration: 1 hour
Join the editors of Redmondmag.com and Virtualization & Cloud Review along with independent experts who will share their insights on what you need to do NOW to make sure your remote workforce and digital workplace is protected for the future. Learn more.
Duration: 3 hours
Because remote work was put into place so quickly, the solutions that were rapidly adopted probably aren’t as secure as they might be if the organization had been able to take its time. Join us in taking a step back to consider how things could be improved – especially with regard to security. Learn more.
Duration: 1 hour
Join us as we discuss the security challenges involved in catering to a hybrid workforce, how Zero Trust and Secure Access Service Edge should be at the forefront of your IAM strategy and how to keep up with the key trends to build a strong IAM framework for your organization. Learn more.
Join Roger Grimes for this thought-provoking webinar where he’ll share the most common reasons for data breaches and a data-driven approach to determining your organization’s specific weaknesses. Learn more.