Webcasts


On Demand

The European Union's Recommendations to Prevent Cyberattacks on SMEs

After identifying and analyzing the cybersecurity issues faced by SMEs post-pandemic, the EU has developed recommendations that could help SMEs improve their cybersecurity posture. Learn more.


How to Create a Unified Threat Hunting Experience Across Security Portals

This webinar is for you if you’ve been comfortable with the old portal but want to know more about the new environment. Learn more.


Pain Points: When to Consider Switching or Evolving Your Cloud Architecture

Please join us for this session as we discuss tips on how to make your cloud usage more efficient! Learn more.

Duration: 1 hour


State of the Cloud Art: The What, When and Why of Public vs. Private vs. Hybrid vs. Multi-Cloud

Remember when managing your network or data center meant constantly updating, upgrading, and shopping for new hardware and new software to constantly keep making your infrastructure better and better? Learn more.

Duration: 1 hour


Choosing Your Cloud Summit

Attendees of this Redmond and Virtualization & Cloud Review virtual summit will find out the latest on the key emerging differences of each major approach and for ideas from experts to get more business value out of their architecture. Learn more.

Duration: 3 hours


Modern Best Practices for Cloud Data Protection, Collaboration & Compliance

Join IT industry veteran Howard M. Cohen for an in-depth examination of best practices around managing both your people and your tech to achieve maximum security, and maximum regulatory compliance, too! Learn more.

Duration: 1 hour


Top 10 Threats to Your Cloud Data in 2021

Join Ian Thornton-Trump CD for a blunt assessment of the ten threats to your cloud data, how Digital Transformation projects can derail organizational security and how to introduce new attack surfaces for malicious actors to pray upon. Learn more.

Duration: 1 hour


Modern Cloud Data Protection Summit

Join the editors of Virtualization & Cloud Review and Redmondmag.com as they bring together experts in the cloud and Infosec world to make sure their data stays secure in their modern cloud infrastructure. Learn more.

Duration: 3 hours


Integration Between Microsoft’s EDR Technology and Incident Response Across the Productivity and Collaboration Layer

Join this webcast and you’ll walk away understanding how to balance the needs around organizational security with your user’s quality of work life. Learn more.


Ransomware Defense & Recovery Summit

Join editors and experts of Virtualization & Cloud Review to find out what you need to know to defend, protect and recover when ransomware comes after you. Learn more.

Duration: 3 hours


How to Reduce Alert Fatigue, Optimize Logs, and Concentrate on High Value Sources of Information

Join us for this webcast as we discuss Attack Surface Reduction, creating valuable Identity Protection Policies, and managing your end user’s experience in the process. Learn more.


#1 Office 365 Backup: Technical Deep Dive

Join this webcast and learn about the infrastructure components, and how simple it is to use Veeam Backup for Microsoft Office 365 — from the early planning stage all the way to performing restores. Learn more.


Implement DMARC the Right Way to Keep Phishing Attacks Out of Your Inbox

​​​​​​​Get the details you need to know now to protect your organization from phishing and social engineering attacks. Learn more.


Expert Hybrid Cloud Data Tips & Infrastructure Best Practices

Join us as Howard M. Cohen examines how to approach data management and protection in today’s hybrid environments. Learn more.

Duration: 1 hour


Top Hybrid Cloud Data Dos and Don'ts

Join this session of summit to learn about networking, authentication, security, and monitoring concerns, and techniques for resolving them. Learn more!

Duration: 1 hour


Hybrid Cloud Data Summit

To help guide you the editors of Virtualization & Cloud Review, AWSinsider.net and Redmondmag.com have teamed up with independent cloud experts to show you how architecture, best practices, security protocols, new tools and much more can make your job managing these systems so much easier. Learn more!

Duration: 3 hours


Top Security Concerns Every Enterprise Must Know for Office 365/Microsoft 365

This session will provide expert advice and insight on optimizing and securing your organization’s Office 365 infrastructure today and preparing and upgrading it for tomorrow. Learn more.

Duration: 1 hour


Best Practices for Implementing, Managing and Optimizing Office 365/Microsoft 365

This informative presentation provides practical tips that administrators can use to make sure that they deploy Microsoft 365 in a way that truly meets the organization’s needs. Learn more.

Duration: 1 hour


Microsoft Office 365 for Enterprises Summit

This half-day summit brings together the editors of Redmondmag.com plus independent experts to show IT pros how they can maximize Microsoft Office 365 in their enterprise environment. Learn more.

Duration: 3 hours


Protecting Your Organization Against Zero-Day Vulnerabilities

Join us as we take a deep dive into the process of these Proxylogon attacks and use this information to establish steps you can take to keep your organization secure from similar zero-day attacks using a strong SIEM framework. Learn more.