On Demand
Join this summit as our experts cover security, infrastructure, management and data trends that could affect cloud performance in 2021. Get the best practices you need for the year ahead. Learn more.
Duration: 3 hours
In this webcast you'll learn how an insider threat mitigation strategy can act as a powerful combatant to insider threats and how NIST provides a mapping of risk-based security controls which can help organizations create a blueprint for an insider threat program. Find out more.
This webinar will focus on the need for identity and access management controls for productivity and collaboration tools in the Microsoft cloud. Learn more.
Attend this webcast with Redmondmag.com to hear from the experts on ways to get the maximum value and potential out of your Azure spend. Learn more.
During this session, we will examine several best practices for hardening both and ensuring a hybrid cloud platform that is secure and resilient as possible. Learn more.
Let’s face the grim facts. The failure of digital transformation projects for many businesses has a myriad of reasons. Join Ian Thornton-Trump CD, as he presents his “seven evil samurai of cloud fail.” Learn more.
Join us for this half-day summit where independent experts will make sure you're up-to-date on everything you need to know (and do) to prepare your cloud infrastructure to be secure against attacks in 2021. Learn more.
Zero Trust’s foundational “never trust, always verify” mantra is needed in today’s world filled with daily cyberattacks, successful breaches, increasingly costly ransomware attacks, and mounting compliance pressures. Learn more.
In this session, 16X MVP Derek Melber will give you his view of how we need to address AD security, so that we are secure from point "A" to point "B". His four pillars of security approach will give you more than enough to think about, plus immediate action items that you can do when you get back to the office. Learn more.
Attend this special editorial webcast for an after-action report on what happened with ransomware in 2020, as well as best practices for defending against the most likely methods of attack in 2021. Come away from this session with a solid plan for ransomware remediation this year! Learn more.
Join Vice President of Web Becky Nagel as she walks you through a showcase of hot products and the chance to win a pair of high-end BOSE Noise Cancelling Headphones. Learn more.
Duration: 1 hour
Join the editors of Virtualization & Cloud Review as well as architect, author, speaker and highly sought after cloud data and data expert Joey D'Antoni as he walks you through how to quickly recover your data in the cloud. Learn more.
Duration: 1 hour
Join the editors of Virtualization & Cloud Review as well as world-renowned enterprise data architect, speaker and author Karen Lopez for this highly informative session where you'll get caught up to speed on the real-world best practices you need for your enterprise cloud data headed into 2021 (and beyond). Learn more.
Duration: 1 hour
Join the editors of Virtualization & Cloud review plus independent experts who will walk you through the best practices for you to manage, store, secure and restore your cloud-based data, whatever the service or configuration. Learn more.
Duration: 3 hours
This engaging Webinar explores ways that organizations can incorporate the cloud into their backups, but without implementing radical changes to their data protection infrastructure, policies and operations. Learn more.
Keeping your remote workforce and the company data they’re using secure can be an expensive and complicated undertaking. In this webinar you will learn how Microsoft is addressing the issue. Learn more.
Cyber-security is a "top-down" approach, and with the speed at which technology is advancing, we need to make sure that our security profile is on the cutting edge and everyone is adhering to all the changes and challenges that appear daily. Learn more.
The increased attacks on Pharma and Healthcare has caused significant damage to the Covid research and even caused deaths. Core network security needs to be enhanced to reduce the successful attacks. Learn more.
Join BlueVoyant as we shine a spotlight on the unsung capabilities of Data Leakage Protection, discuss how to apply templatized protection schemes and examine why you no longer need to deploy an expensive classification and protection system for your on-prem and cloud-file repositories. Read on.
Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, to find out what your password policy should be and learn about the common mistakes organizations make when creating password policy. Learn more