On Demand
Microsoft Office 365 enables your enterprise to efficiently work from home. With a massive influx of remote workers, businesses more than ever before are storing, sharing and accessing data within Microsoft Teams, OneDrive for Business, Exchange and SharePoint Online, and that data needs to be protected. See why in this webinar, brought to you by NewCloud Networks and Veeam. Learn more.
the need to move PST data to Office 365 and upgrade the user experience has never been greater. During this webinar you will learn how to locate all PST files on your network, what network and throughput considerations to plan for, and how to ensure happy end-user experience, both during and post-PST migration. Learn more!
This session will focus on how to provide a platform for data re-use, at the pace your need – taking what was once trapped data and unleash it to deliver new customer experiences, faster time to market, and more productive employees. Learn more.
Join this webinar on how to navigate Direct Routing and unleash the full potential of enterprise-grade communications to your Microsoft Teams users. Learn more.
Join BlueVoyant’s Director of Microsoft Security Solutions, Micah Heaton, as he discusses the potential application of Azure Sentinel in your Microsoft cloud environments. He will explore how to accelerate internal adoption timelines for protecting user identity, devices, and data, and demonstrate a strategy for integration Azure Sentinel into your security posture. Read on.
Join this webcast for a conversation about migrating content to Modern SharePoint from many different sources and the challenges they’ve helped organizations like yours overcome.
Join this webcast for a deep dive into five scenarios around protecting various parts of the Microsoft ecosystem.
Many administrators think Office 365 is totally self-securing, but that's not even close. Find out how to protect against even the biggest, most complex threats to an Office 365 environment. Learn more.
Duration: 3 hours
Join the editors of Redmondmag.com and independent security experts to guide you through exactly what you need to know to keep your enterprise installation of Office365 secure and compliant into 2021. Read on.
Duration: 3 hours
In this webcast, we will discuss common attack methods used to attain elevated privileges via Active Directory and ways to thwart malicious efforts using a live simulation of a Pass the Hash attack as an example. Learn more.
Join us for this live webcast to learn how HR/HCM systems play a key role in Identity and Access Management (IAM). Learn more.
Join this webcast and learn how to prepare for the next phase of “normalcy” by evaluating your return-to-office preparedness, enabling your conference rooms with Microsoft Teams and discovering the benefits of Microsoft Certified Cloud Video Interop. Learn more.
Proper protection and off-site solutions are essential for data availability. Learn more.
Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Join us for this half-day virtual summit to learn what you need to know now about efficiently scaling your multi-cloud environment. Find out more!
Duration: 3 hours
Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Join us for this half-day virtual summit to learn what you need to know now about efficiently scaling your multi-cloud environment. Find out more!
Duration: 3 hours
Join us as we discuss the recent stresses placed on Azure Active Directory with its many dependencies on 20-year-old Active Directory technology. You'll get a sense of what Azure AD is doing well, and how Microsoft's technologies can be supplemented for maximum security and IT agility! Learn more.
Join this Webinar featuring industry experts who will show you how to become your company's security hero. You'll learn not only how to simplify and manage true endpoint security (even in this age of remote work!), but also how you'll be able to improve the company's bottom line. Read on.
Join us as we discuss the M365 security journey and explore how to accelerate adoption timelines for protecting user identity, devices, and data. Learn more.
Join this session for a deeper look at just what IT managers need to know to truly assure optimum data and network security in the cloud. Learn more.
In this special session, IT security expert Ian Thornton-Trump will take you on a tour of the near-term threats in the cloud for organizations. Learn more.