On Demand
Get the details you need to know now to protect your organization from phishing and social engineering attacks. Learn more.
Join us as Howard M. Cohen examines how to approach data management and protection in today’s hybrid environments. Learn more.
Duration: 1 hour
Join this session of summit to learn about networking, authentication, security, and monitoring concerns, and techniques for resolving them. Learn more!
Duration: 1 hour
To help guide you the editors of Virtualization & Cloud Review, AWSinsider.net and Redmondmag.com have teamed up with independent cloud experts to show you how architecture, best practices, security protocols, new tools and much more can make your job managing these systems so much easier. Learn more!
Duration: 3 hours
This session will provide expert advice and insight on optimizing and securing your organization’s Office 365 infrastructure today and preparing and upgrading it for tomorrow. Learn more.
Duration: 1 hour
This informative presentation provides practical tips that administrators can use to make sure that they deploy Microsoft 365 in a way that truly meets the organization’s needs. Learn more.
Duration: 1 hour
This half-day summit brings together the editors of Redmondmag.com plus independent experts to show IT pros how they can maximize Microsoft Office 365 in their enterprise environment. Learn more.
Duration: 3 hours
Join us as we take a deep dive into the process of these Proxylogon attacks and use this information to establish steps you can take to keep your organization secure from similar zero-day attacks using a strong SIEM framework. Learn more.
Join us for this session of summit to learn how others are evaluating and planning how and where work will be happening going forward. Learn more.
Duration: 1 hour
The editors of Redmondmag.com and Virtualization & Cloud Review, along with independent experts, will provide expert advice and insight on optimizing and securing your prospect's infrastructure today and preparing and upgrading it for tomorrow. Learn more.
Duration: 3 hours
Over the past 18 months, it’s likely you’ve forgotten about potential risks that existed when expanding to the cloud. Learn more.
Join us for this webcast from IAM Security analyst experts to hear the top considerations and pitfalls to avoid when determining your IAM Active Directory (AD) security and management strategy. Learn more.
Join us for this session as we discuss how the pandemic began to grip the world in early 2020 and kicked off a forced march to remote work. Learn more.
Duration: 1 hour
For this session Tom Fenton reached out to his friends in the industry to get their insights and he will go over what they and he has learned over the last year: the good, the bad and, of course, the ugly of enabling remote workers. Get the useful details.
Duration: 1 hour
In this 30 minute discussion, we'll cover the advantages of a hybrid and multi-cloud EUC solution. Learn more.
Duration: 1 hour
Join the editorial staff of Virtualization & Cloud Review and Redmondmag.com as well as independent experts for this half-day informational summit packed with real-world advice and insights you can't afford to miss! Learn more.
Duration: 3 hours
With the accelerating pace and increasing sophistication of cyberattacks, having a common framework for your security strategy helps you cope with the changing threat landscape. Learn more.
IT decision-maker attendees of this Redmondmag.com Microsoft Azure Stack HCI Summit will find out about key advantages of the Microsoft hybrid cloud approach for HCI, and best practices and use cases involving Azure Stack HCI.
Duration: 2 hours
Join BlueVoyant’s Owen Allen and Mike Scutt for a deep dive into some of the tools and techniques used by BlueVoyant Threat Hunters to identify breaches and threats more quickly. Learn more.
Duration: 1 hour
During this session, they’ll discuss how Microsoft Dynamics 365 is transforming business operations in the cloud and how the newest Metallic SaaS offering extends native capabilities for purpose-built protection, rapid recovery from attack, and long-term data retention to meet SLA compliance. Learn more.