On Demand
Join us for this half-day summit brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com to learn what you need to know to get your enterprise safely cloud-enabled. Learn more.
Duration: 3 hours
Join this session as we look into topics including having a plan, being prepared, and understanding your application and data infrastructure environment. Learn more.
Duration: 1 hour
In this web seminar, we will discuss AD access points used in recent cyberattacks, how to look for warning signs that AD has been compromised, and steps to take in the event of an attack. Learn more.
During this session, we will examine several best practices for architecting your hybrid and private cloud environment so it will be as secure and resilient as possible. Learn more.
Duration: 1 hour
Cloud computing technology is evolving fast! Join this session as we answer your top questions and learn what the best solution for your business needs are. Learn more.
Duration: 1 hour
The enterprise most likely has a mix of hybrid/private cloud infrastructure —or is striving to achieve it. Join this summit and learn more.
Duration: 3 hours
Join Redmondmag.com Editor-in-Chief Scott Bekker, 14-time Microsoft Office Apps and Services MVP Matthew McDermott, and Spanning Director of Product Marketing Dave Wallen for a lively discussion around Microsoft 365 Data Protection. Learn more.
Join this half-day virtual event to learn from topics like: Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Learn more.
Duration: 3 hours
Join IT industry veteran Howard M. Cohen in exploring some of these best practices, why they’re each critical to your success, and how they enable you to recognize the full value of your multi-cloud strategy. Learn more.
Duration: 1 hour
Join us to learn how the cyberattack chain model can help IT security teams put in place strategies to “kill” or contain the attack at various stages, and how to better protect their IT ecosystem.
In this webcast you will learn about key predications regarding the future of the workplace, the next of Microsoft Teams for collaboration and how to get the office ready for a productive hybrid workforce. Find out more.
Join Roger as he discusses the good, the bad, and the ugly lessons he learned from his research. He’ll share with you what works, what doesn’t, and what you should absolutely avoid. Learn more.
Mergers, acquisitions, and divestitures are common business activities that can have a huge impact on your Microsoft 365 tenant. Learn more.
Join us to learn how the cyberattack chain model can help IT security teams put in place strategies to “kill” or contain the attack at various stages, and how to better protect their IT ecosystem.
Join Microsoft identity experts as they walk through the most common weak spots in Active Directory configurations—and how to fix them. Learn more.
In the era of distance learning, education institutions have been forced to quickly adapt how their students learn as well as how their educators teach into a completely digital experience. Learn more.
Join this webcast for a discussion on how AD engineers and architects can expand their roles and add value to the company by focusing on developing and implementing a strategy to ensure that AD is secure from malicious intruders. Learn more.
Join us for a discussion about why we think PSTs are an obsolete and potentially dangerous storage location for email. Learn more.
There can be many reasons why your organization might need to do an Active Directory migration. No matter the reason, you are going to have to make a decision about what tools to use. Learn more.
Join this webinar as our cybersecurity expert explains how you can implement the FBI's recommendations to mitigate BEC scams. Learn more.