On Demand
In this special session, IT security expert Ian Thornton-Trump will take you on a tour of the near-term threats in the cloud for organizations. Learn more.
In this engaging session, IT consultant and architect John O'Neill Sr. will have a one-on-one conversation with Converge360 Editorial Director Scott Bekker about hardening hybrid cloud infrastructure in the enterprise. You'll learn about best practices, tricks to use, pitfalls to avoid and lots of other insights. Read on.
Brought to you by the editors of Redmondmag.com and Virtualization & Cloud Review, join us for this half-day summit where independent experts will make sure you're up-to-day on everything you need to know (and do) to prepare your cloud infrastructure to be secure against attacks in 2021. Learn more.
Duration: 3 hours
Join us for this webcast featuring collaboration expert Christian Buckley as he walks you through the state of Microsoft's collaboration platforms, their respective challenges and the trajectories of their product roadmaps. Learn more.
Join us to learn how to simplify deploying NVMe in your environment to realize the performance benefits of the latest drive technology. Learn more.
Everyone knows Active Directory! Unfortunately, the attackers often know it better! Learn which settings the attackers are leveraging to move laterally and gain privileges within your network. Learn more!
Join Roger Grimes as he dives into the best ways to stop malware dead in its tracks using real-life methods no one else is talking about. Learn more.
Join us to learn how to correctly configure site-to-site or point-to-site VPN tunnels. Learn more.
Join this webcast for an unconventional workshop where we'll chat about new and emerging cyberattacks without actually talking about "cyber" at all. Learn more.
Join this webinar to see how easy it is to make the move to HCI, build out your private cloud, and when you are ready, turn it all into a hybrid cloud. Learn more.
In this webinar you will learn about common pitfalls organizations encounter when doing cloud data projects. Learn more.
Duration: 1 hours
During this session, we’ll examine five of the top cloud data security threats organizations must brace for these days, and cover some of the best practices and technologies that can help organizations ensure their cloud-based data is indeed secure. Learn more.
Duration: 1 hours
In this session we examine the considerations, the criteria, and the concerns you must focus on when moving data into the cloud. Learn more.
Duration: 1 hour
Join us for this free half-day summit brought to you by the editors of Virtualization & Cloud Review where our experts will address today’s most difficult challenges when securing and managing your enterprise cloud data. Learn more!
Duration: 3 hours
This webinar will cover the cybersecurity challenges unique to the healthcare industry and how COVID-19 has raised the stakes. Learn more.
Join the editors of Virtualization & Cloud Review plus independent experts to gain in-depth knowledge about best practices for modern backup and recovery Learn more.
Duration: 1 hour
Don't miss this session brought to you by Virtualization & Cloud Review's editors and independent experts. They'll give you real-world insights and advice you can use right away to tackle and conquer your most critical cost challenges. Learn more.
Duration: 1 hour
Make sure you have your infrastructure not just under control but moving ahead! Join this free, half-day virtual summit where the editors of Virtualization & Cloud Review work with independent experts to give you real-world insights and advice you can use right away to tackle and conquer your biggest infrastructure challenges. Learn more.
Duration: 1 hour
Make sure you have your infrastructure not just under control but moving ahead! Join this free, half-day virtual summit where the editors of Virtualization & Cloud Review work with independent experts to give you real-world insights and advice you can use right away to tackle and conquer your biggest infrastructure challenges. Learn more.
Duration: 3 hours
The first step to building an efficient security strategy is to perform risk assessment. Learn more.