Webcasts


On Demand

Best Practices in Office 365 Data Protection

Attend this webinar and learn about the gaps left by Microsoft’s Office 365 protection, the risks posed and how to overcome them all with a comprehensive 3rd-party data protection solution. Learn how to get the Office 365 backup and recovery strategy you need and want.


Making Veeam Backup & Replication Better

Join Greg Schulz, IT expert and founder of StorageIO, and Adrian Moir, Senior Consultant at Quest Data Protection, for an insightful and dynamic conversation about your evolving storage and backup requirements.


Fill the Gaps in Your Office 365 Data Protection

Microsoft Office 365 versioning, archiving and replication fall short from being able to deliver the data protection and recovery needs you require to meet both business SLAs and compliance requirements. Learn more.


Active Directory: Best Practices for Administration and Backup

Microsoft Active Directory is the basis for every Microsoft‑oriented networking environment. However, it’s not always a solid basis. With thousands of network environments under their belts, Sander Berkouwer (Microsoft MVP) and Veeam’s® Andrey Zhelezko know their Active Directory. Watch this webinar to benefit from their best practices.


3 Ultimate Strategies for Ransomware Prevention

Ransomware is here to stay. As much as no one likes to hear that, we have to admit that it’s no longer a question of ‘if’ but rather ‘when’ and ‘to what’ extent your business might be affected. Rather than hope it won’t get you, let’s explore all the options that exist to prevent, locate, disarm and mitigate ransomware risks. We’ll go over some essential strategies you can implement today and also review what a comprehensive backup software can offer you.


Managing Multi-Cloud: Pros and Cons of Using One, Two or Three Public Clouds in Your Hybrid Environment

Every public cloud giant would have you standardize your public cloud usage on their platform. But that's not always possible or even preferable. Get actionable best practices for managing multiple public clouds in this can't-miss session. Find out what the individual public cloud vendors won't tell you! Read on.


Managing a Hybrid Cloud Environment: Key Technologies and Tactics to Corral Your Complex Cloud Environment

The hybrid cloud is the reality for many organizations as they balance legacy applications, modern applications with high performance requirements, various public cloud services and cloud backup solutions. Attend this session to learn about key technologies and smart tactics to keep all those disparate applications and all that widespread data under control. Register now.


Public vs. Private vs. Hybrid: What Cloud to Use When and Why (or Why Not)

In this detail-rich session, our cloud architecture expert lays out some of the basic considerations and other concerns that organizations must account for in order to make the right decision about putting data and applications in the public cloud, in a private cloud or in a hybrid cloud. Learn more.

Duration: 1 hour


Enterprise Hybrid Cloud Virtual Summit

Join us for this free three-hour virtual event to introduce you to the state of the art and best practices for making the most of a hybrid cloud infrastructure. Key takeaways will include strategies and tactics for addressing top management issues and a framework for understanding the pros and cons of various configuration options. Learn more!

Duration: 3 hours


OnDemand Webcast - IT Decision Maker’s Guide To Office 365 Backup

Whether they have completely migrated to Office 365, or have a hybrid exchange and Office 365 deployment, a business’s objectives remain the same. Organizations must remain in control of their data, and with Veeam Backup for Microsoft Office 365 from NewCloud Networks, businesses can take control of their data instantly.


TLS and the Zero Trust Paradigm

Modern cyberattacks are not limited to just network intrusion from the outside. Learn more.


Why Office 365 Backup is Essential

Microsoft provides excellent uptime and availability for Office 365 applications, allowing organizations to stay productive anywhere and at any time. Learn more.


The MITRE ATT&CK Framework and Its Implications on Security Teams

The MITRE ATT&CK™ framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. Learn more.


Office 365 Adoption: The “Dale Carnegie” Approach

Moving to Office 365 introduces a world of collaborative workloads - such as Teams, SharePoint Online, and OneDrive for Business - but driving user adoption of these new platforms can be a huge challenge, especially for larger organizations. Learn more.


Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim?

There is a reason more than half of today’s ransomware victims end up paying the ransom. Learn more.


CES 2020: Lenovo’s Latest Innovation Milestone

This webinar will focus on the history of the Lenovo PC as well as introduce the next generation of groundbreaking devices launched at CES 2020. Learn more.


Immediate Steps to Take (or Not Take) When Ransomware Strikes

It usually happens in the middle of the night. Not necessarily because “It must be the Russians!” but because cybercriminals have fully reconnoitered your network and will initiate the encryption of your files when someone is least likely to sound the alarm. Learn more.


Always On. Always Protected. HPE + Veeam: Learn About NEW VAS V10 + HPE Integrations!

For over 10 years, HPE and Veeam® have helped you safeguard your data to ensure it’s always on, protected and your enterprise is able to rapidly and easily recover should a situation arise — from human error to a malicious attack. Learn more.


How Do You Manage External Users in Your Tenant?

Office 365 is an amazing productivity platform for your company. Learn more.


Securing a Hybrid On-Premises/Cloud Directory: Guard Against Common Mistakes

Join this detail-rich session for expert advice on common mistakes, pitfalls, misconfigurations and misunderstandings that can lead to credential or system compromise and other serious security and compliance problems. Learn more!