On Demand
In this webinar, we're going to provide some of our favorite tips and guidance to help you best manage Microsoft Teams. Learn more.
Application delivery infrastructure and security have become more complex. Learn more.
Join this session as we look at ways you can maximize some of the other benefits Microsoft Teams has to offer. Hopefully, you'll come away from this session with at least one new piece of functionality within Teams that you can take back to your organization to help you get even more from platform! Learn more.
Duration: 1 hour
Join the editors of Redmondmag.com and independent Microsoft Teams experts for this free, half-day summit filled with real-world tips, advice and best practices to help you get the most out of your Microsoft teams installation, no matter the size of your organization. Learn more.
Duration: 3 hours
Join Senior Resultant, Howard M. Cohen, as he shows you how to produce your best results by leveraging Teams best practices. Learn more.
Duration: 1 hour
In this webcast, we will share the latest tips and tricks for implementing this new capability for those critical workloads that require near-zero Recovery Point Objectives (RPOs). Learn more.
Sign up for this webcast and you’ll come away with a clear understanding around system and licensing requirements, and talking points to convince your internal stakeholders of the shift. Learn more.
After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Learn more.
Join us for the second session of summit as you will learn about the options you have, their cost impact and structure, and finally best practices for securing your environment. Learn more.
Duration: 1 hour
Join us for the first session of summit to learn how ransomware groups are going after the cloud with the same ferocity they have been attacking local networks and learn what you need to do to protect yourself and your cloud providers. Learn more.
Duration: 1 hour
Join us for this half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practice advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Learn more.
Duration: 3 hours
After identifying and analyzing the cybersecurity issues faced by SMEs post-pandemic, the EU has developed recommendations that could help SMEs improve their cybersecurity posture. Learn more.
This webinar is for you if you’ve been comfortable with the old portal but want to know more about the new environment. Learn more.
Please join us for this session as we discuss tips on how to make your cloud usage more efficient! Learn more.
Duration: 1 hour
Remember when managing your network or data center meant constantly updating, upgrading, and shopping for new hardware and new software to constantly keep making your infrastructure better and better? Learn more.
Duration: 1 hour
Attendees of this Redmond and Virtualization & Cloud Review virtual summit will find out the latest on the key emerging differences of each major approach and for ideas from experts to get more business value out of their architecture. Learn more.
Duration: 3 hours
Join IT industry veteran Howard M. Cohen for an in-depth examination of best practices around managing both your people and your tech to achieve maximum security, and maximum regulatory compliance, too! Learn more.
Duration: 1 hour
Join Ian Thornton-Trump CD for a blunt assessment of the ten threats to your cloud data, how Digital Transformation projects can derail organizational security and how to introduce new attack surfaces for malicious actors to pray upon. Learn more.
Duration: 1 hour
Join the editors of Virtualization & Cloud Review and Redmondmag.com as they bring together experts in the cloud and Infosec world to make sure their data stays secure in their modern cloud infrastructure. Learn more.
Duration: 3 hours
Join this webcast and you’ll walk away understanding how to balance the needs around organizational security with your user’s quality of work life. Learn more.