Webcasts


On Demand

Top Tips for Protecting Active Directory Against Hackers

In this webcast, we will discuss common attack methods used to attain elevated privileges via Active Directory and ways to thwart malicious efforts using a live simulation of a Pass the Hash attack as an example. Learn more.


How HR/HCM Systems Play a Critical Role in IT Security

Join us for this live webcast to learn how HR/HCM systems play a key role in Identity and Access Management (IAM). Learn more.


Using Microsoft Teams To Transition Your Remote Workforce

Join this webcast and learn how to prepare for the next phase of “normalcy” by evaluating your return-to-office preparedness, enabling your conference rooms with Microsoft Teams and discovering the benefits of Microsoft Certified Cloud Video Interop. Learn more.


10 Best Practices for VM Backup

Proper protection and off-site solutions are essential for data availability. Learn more.


Scaling Efficiently in Multi-Cloud: A Half-day Virtual Summit

Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Join us for this half-day virtual summit to learn what you need to know now about efficiently scaling your multi-cloud environment. Find out more!

Duration: 3 hours


Scaling Efficiently in Multi-Cloud: A Half-day Virtual Summit

Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Join us for this half-day virtual summit to learn what you need to know now about efficiently scaling your multi-cloud environment. Find out more!

Duration: 3 hours


How the New Normal Puts New Strains on Azure Active Directory

Join us as we discuss the recent stresses placed on Azure Active Directory with its many dependencies on 20-year-old Active Directory technology. You'll get a sense of what Azure AD is doing well, and how Microsoft's technologies can be supplemented for maximum security and IT agility! Learn more.


Become Your Company's Security Hero!

Join this Webinar featuring industry experts who will show you how to become your company's security hero. You'll learn not only how to simplify and manage true endpoint security (even in this age of remote work!), but also how you'll be able to improve the company's bottom line. Read on.


The Microsoft 365 E5 Security Licensing Journey

Join us as we discuss the M365 security journey and explore how to accelerate adoption timelines for protecting user identity, devices, and data. Learn more.


10 Things Every IT Manager MUST Know About Cloud Security

Join this session for a deeper look at just what IT managers need to know to truly assure optimum data and network security in the cloud. Learn more.


Top 7 Cloud Security Attack Vectors Heading into 2021

In this special session, IT security expert Ian Thornton-Trump will take you on a tour of the near-term threats in the cloud for organizations. Learn more.


Expert Best Practices for Hardening Your Enterprise Hybrid Cloud Infrastructure

In this engaging session, IT consultant and architect John O'Neill Sr. will have a one-on-one conversation with Converge360 Editorial Director Scott Bekker about hardening hybrid cloud infrastructure in the enterprise. You'll learn about best practices, tricks to use, pitfalls to avoid and lots of other insights. Read on.


Security in the Cloud 2021

Brought to you by the editors of Redmondmag.com and Virtualization & Cloud Review, join us for this half-day summit where independent experts will make sure you're up-to-day on everything you need to know (and do) to prepare your cloud infrastructure to be secure against attacks in 2021. Learn more.

Duration: 3 hours


Minimizing Complexity and Sprawl with SharePoint and Microsoft 365, While Maximizing Potential in the Enterprise

Join us for this webcast featuring collaboration expert Christian Buckley as he walks you through the state of Microsoft's collaboration platforms, their respective challenges and the trajectories of their product roadmaps. Learn more.


HCI Makes Accelerating Your Apps a Breeze

Join us to learn how to simplify deploying NVMe in your environment to realize the performance benefits of the latest drive technology. Learn more.


5 AD Security Settings Most Admins Have Not Heard Of, But Attackers Leverage!

Everyone knows Active Directory! Unfortunately, the attackers often know it better! Learn which settings the attackers are leveraging to move laterally and gain privileges within your network. Learn more!


The Best Ways to Stop Malware and Ransomware That No One Else Will Tell You

Join Roger Grimes as he dives into the best ways to stop malware dead in its tracks using real-life methods no one else is talking about. Learn more.


How to Ensure Business Continuity for Remote Workers

Join us to learn how to correctly configure site-to-site or point-to-site VPN tunnels. Learn more.


Seizing the Castle: A Medieval Battle Technique Workshop

Join this webcast for an unconventional workshop where we'll chat about new and emerging cyberattacks without actually talking about "cyber" at all. Learn more.


Turn Over a New Leaf With a Future Proof Private and Hybrid Cloud Platform

Join this webinar to see how easy it is to make the move to HCI, build out your private cloud, and when you are ready, turn it all into a hybrid cloud. Learn more.