On Demand
Join us for session two of this summit as we look at best practices for Enterprise Hybrid Cloud Configuration and associated topics. Learn more.
Duration: 1 hour
Do you know the best practices for setup and configuration? What about the tools that can help? Join the editors of Virtualization & Cloud Review along with independent experts for this information-packed half-day seminar. Learn more.
Duration: 3 hours
In this special editorial webcast, experts from Redmondmag.com will walk you through basic steps for considering a major Digital Transformation project. We'll look at everything from identifying stakeholders, rallying organizational support, to determining and securing budget and executing the project. Learn more.
Active Directory Exploitation Is the Common Thread in Recent High-Profile Attacks. Colonial Pipeline, SolarWinds, Hafnium - every day we hear about a new attack, a new vulnerability, and devastating consequences. Learn more.
Join us for this informative webinar to understand the critical nature and impact of selecting the right telephony partner for your Microsoft Teams direct routing deployment. Learn more.
Based on methodologies developed though BlueVoyant's continuous research into attacker TTPs and real-world experience in countering espionage and financial crimes, our Threat Hunters will expose expert perspectives on human-driven defense. Learn more.
Join the second session of our Enterprise Cloud Wars 2021 Summit and get insights on what you need to do in your enterprise to make them work well together. Learn more.
Duration: 1 hour
In this tongue-in-cheek but informative roundtable session, public cloud experts will review what makes different public cloud systems great but also the weaknesses of each and what you might want to watch out for. Learn more.
Duration: 1 hour
Join for this fun and fast-paced half-day summit where the editors of Redmondmag.com and Virtualization & Cloud Review bring together independent experts to discuss the pros and cons of many of today's top cloud solutions as well as what's working for organizations like yours. Learn more.
Duration: 3 hours
In this webinar, we'll discuss top five identity and access management challenges IT admins will likely face in 2021 and how to overcome these challenges. Learn more.
Duration: 1 hour
Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist where he’ll share a comprehensive strategy for phishing mitigation and how securing your users can become your best, last line of defense. Learn more.
In this session, we'll look at 5 of the top security and compliance issues with Microsoft 365 and what you can do to make sure your company doesn't fall victim to data compromises using Microsoft 365 services. Learn more.
Duration: 1 hour
In this session, you will learn about the security features that you should be using and about some new features that you might not yet be familiar with. Learn more.
Duration: 1 hour
Stay up to date on the latest features and security issues with Office 365/Microsoft 365 in this information-packed half-day seminar. Learn more.
Duration: 3 hours
Microsoft Teams is now the center of our productivity universe — but should you back it up? Learn more.
In this webcast we'll cover the obstacles you will likely encounter on your way to a full Teams deployment and tips for how to overcome those obstacles. Learn more.
Join cloud solution architect and technical trainer Tim Warner for a content-rich, “no fluff” breakdown of proven “do this, not that” cloud migration approaches. Learn more.
Duration: 1 hour
Join us for this half-day summit brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com to learn what you need to know to get your enterprise safely cloud-enabled. Learn more.
Duration: 3 hours
Join this session as we look into topics including having a plan, being prepared, and understanding your application and data infrastructure environment. Learn more.
Duration: 1 hour
In this web seminar, we will discuss AD access points used in recent cyberattacks, how to look for warning signs that AD has been compromised, and steps to take in the event of an attack. Learn more.