On Demand
Many administrators think Office 365 is totally self-securing, but that's not even close. Find out how to protect against even the biggest, most complex threats to an Office 365 environment. Learn more.
Duration: 3 hours
Join the editors of Redmondmag.com and independent security experts to guide you through exactly what you need to know to keep your enterprise installation of Office365 secure and compliant into 2021. Read on.
Duration: 3 hours
In this webcast, we will discuss common attack methods used to attain elevated privileges via Active Directory and ways to thwart malicious efforts using a live simulation of a Pass the Hash attack as an example. Learn more.
Join us for this live webcast to learn how HR/HCM systems play a key role in Identity and Access Management (IAM). Learn more.
Join this webcast and learn how to prepare for the next phase of “normalcy” by evaluating your return-to-office preparedness, enabling your conference rooms with Microsoft Teams and discovering the benefits of Microsoft Certified Cloud Video Interop. Learn more.
Proper protection and off-site solutions are essential for data availability. Learn more.
Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Join us for this half-day virtual summit to learn what you need to know now about efficiently scaling your multi-cloud environment. Find out more!
Duration: 3 hours
Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Join us for this half-day virtual summit to learn what you need to know now about efficiently scaling your multi-cloud environment. Find out more!
Duration: 3 hours
Join us as we discuss the recent stresses placed on Azure Active Directory with its many dependencies on 20-year-old Active Directory technology. You'll get a sense of what Azure AD is doing well, and how Microsoft's technologies can be supplemented for maximum security and IT agility! Learn more.
Join this Webinar featuring industry experts who will show you how to become your company's security hero. You'll learn not only how to simplify and manage true endpoint security (even in this age of remote work!), but also how you'll be able to improve the company's bottom line. Read on.
Join us as we discuss the M365 security journey and explore how to accelerate adoption timelines for protecting user identity, devices, and data. Learn more.
Join this session for a deeper look at just what IT managers need to know to truly assure optimum data and network security in the cloud. Learn more.
In this special session, IT security expert Ian Thornton-Trump will take you on a tour of the near-term threats in the cloud for organizations. Learn more.
In this engaging session, IT consultant and architect John O'Neill Sr. will have a one-on-one conversation with Converge360 Editorial Director Scott Bekker about hardening hybrid cloud infrastructure in the enterprise. You'll learn about best practices, tricks to use, pitfalls to avoid and lots of other insights. Read on.
Brought to you by the editors of Redmondmag.com and Virtualization & Cloud Review, join us for this half-day summit where independent experts will make sure you're up-to-day on everything you need to know (and do) to prepare your cloud infrastructure to be secure against attacks in 2021. Learn more.
Duration: 3 hours
Join us for this webcast featuring collaboration expert Christian Buckley as he walks you through the state of Microsoft's collaboration platforms, their respective challenges and the trajectories of their product roadmaps. Learn more.
Join us to learn how to simplify deploying NVMe in your environment to realize the performance benefits of the latest drive technology. Learn more.
Everyone knows Active Directory! Unfortunately, the attackers often know it better! Learn which settings the attackers are leveraging to move laterally and gain privileges within your network. Learn more!
Join Roger Grimes as he dives into the best ways to stop malware dead in its tracks using real-life methods no one else is talking about. Learn more.
Join us to learn how to correctly configure site-to-site or point-to-site VPN tunnels. Learn more.