Webcasts


On Demand

Why PSTs are Such a Bad Idea in the Cloud

Join us for a discussion about why we think PSTs are an obsolete and potentially dangerous storage location for email. Learn more.


Migrating Active Directory in a Work-From-Anywhere World

There can be many reasons why your organization might need to do an Active Directory migration. No matter the reason, you are going to have to make a decision about what tools to use. Learn more.


The FBI's Recommendations to Prevent BEC Attacks on Office 365 Users

Join this webinar as our cybersecurity expert explains how you can implement the FBI's recommendations to mitigate BEC scams. Learn more.


The War on Ransomware Continues: Tips and Best Practices with Veeam v11

In this webinar, we'll share the latest tips for beating ransomware by assessing the threatscape and steps you can take to protect your data. Learn more.


The Modern SOC and the optimization of Microsoft Security

Company exposure today can appear in many sizes and forms. As a business ecosystem expands so do the risks, whatever the size of the company. By using the latest thinking from Microsoft, BlueVoyant is helping customers optimize their Microsoft 365 E5 license. By working with an expert to unite the security tools from one manufacturer, you can not only save money, time and resources but concentrate on managing those risks that actually have the potential to disrupt your business. Learn more.


The Latest on the Microsoft 365 E5 Security Licensing Journey

Join BlueVoyant’s Director of Microsoft Security Solutions, Micah Heaton, as he recaps their M365 E5 license bundle conversation from last October and shares insights on announcements made at Microsoft Ignite around Endpoint Management, Information Protection, and Identity and Access Management. Learn more.


Security, Security and Security: The Top 3 Concerns of a Remote Workforce & Digital Workplaces

Hear from independent infosec experts and the editors of Redmondmag.com on the top security concerns you need to be concerned about now and the best practices you can implement to mitigate them. Learn more.

Duration: 1 hour


Transforming the Enterprise: The Remote Workforce and Digital Workplaces Summit

Join the editors of Redmondmag.com along with independent experts who will share their insights on what you need to do NOW to make sure your remote workforce and digital workplace is protected for the future. Learn more.

Duration: 3 hours


Remote Workforce & Digital Workplaces: Why Infrastructure Matters Even More

Join the editors of Redmondmag.com plus independent technology experts as they share their insights to guide you through the top tips you need to know when considering your infrastructure of a remote future. Learn more.

Duration: 1 hour


Solving the Insecurity of Education in the Remote Workforce Era

Join us for this webcast to learn how can educational institutions better manage the security of their remote workforce. Learn more.


Protect, Detect, and Respond to Supply Chain Cyber Attacks (e.g. Solarwinds) Using Splunk Enterprise Managed Security Services

Join this webcast for an in-depth discussion about the SolarWinds attack, and learn best practices and strategies to strengthen your defenses. Learn more.


Modern Best Practices for Cloud Data Protection, Collaboration & Compliance

Attend this session of our Modern Cloud Data Protection Summit and walk away with top tips and best practices around cloud data protection. Learn more.

Duration: 1 hour


What the SolarWinds Attacks Mean for Cloud Data Protection

In this timely session, Editorial Director Scott Bekker and security expert Ian Thornton-Trump will have a conversation about what cloud data protection requires in light of the revelations. Learn more.

Duration: 1 hour


Modern Cloud Data Protection Summit

Join the editors of Virtualization & Cloud Review and Redmondmag.com as they bring together experts in the cloud and Infosec world to make sure your data stays secure in your modern cloud infrastructure. Learn more.

Duration: 3 hours


Zscaler and Microsoft 365: Best-of-Breed Platforms Supercharge Digital Transformation

The definition of the workplace has fundamentally changed. Modern enterprises are transforming their applications and network stack to support the cloud-and-mobile-first reality of today. Learn more.


Expert Q&A: State of Office 365 Protection

Join Redmondmag.com Editorial Director Scott Bekker for this wide-ranging discussion with Microsoft MVP Matt McDermott and Dave Wallen about the state of Office 365 security. Learn more.


Ransomware Recovery: What to do if You're Hit and You Didn't Have a Plan

In this session, Cyber-Security Trainer and Pluralsight Author Dale Meredith will review the critical steps every organization should take after a data breach. Join us!

Duration: 1 hour


Ransomware 2021: What to Expect in the Year Ahead, from Malware Families to Payout Trends

In this session we will look at trends so far in 2021 and what to expect the rest of the year.  Join us!

Duration: 1 hour


Responding to Ransomware Virtual Summit

In this special editorial summit, experts gathered by Virtualization & Cloud Review look at what organizations can do once they're hit with ransomware. Join us!

Duration: 3 hours


Office 365, SharePoint & Data Protection: Top Tips for Protecting Your Enterprise

Join us for this editorial webcast to understand the unique data protection challenges in Office 365 and SharePoint, and come away with ideas for addressing them. Learn more.