On Demand
Join the editors of Redmondmag.com as well as leading IT security veterans as we look at Entra ID's role as a security risk and the top industry best practices for mitigating that risk.
Duration: 2 hours
Join us to discover why Business Email Compromise (BEC) attacks soared to $2.9 billion in losses in 2023, ranking as the second-costliest cyber-crime category of the year. Dive into our webinar as we delve into why BEC attacks blend employee awareness with technical security controls, and explore if they constitute the ultimate supply chain threat. Don't miss out on practical insights to safeguard your organization
Duration: 1 Hour
Learn how to avoid all of these problems in this free, three-hour summit. Get real-world guidance for your cloud migration straight from the experts, from how to streamline your data transfers, to how to salvage your legacy apps, and more. We’ve got all your cloud migration bases covered – sign up today!
Duration: 3 hours
The ability to defend and recover your hybrid AD environment is key to operational resilience. Join Alexandra Weaver, Senior Solutions Architect, Semperis to learn more!
Duration: 1 hour
Don’t get caught in the trap of long-game social engineering! Learn how to spot these attacks before they happen. Join us!
Duration: 1 hour
Join our webcast to uncover the key elements of a successful Enterprise AI platform, control costs, and deploy AI apps in a cloud-native format. Our experts will help you understand AI integration, agile app deployment, and data security enhancement. Sign up now to transform your AI strategy
Duration: 1 Hour
Join our upcoming webinar to address the critical need for a robust Active Directory (AD) Forest recovery solution. Experts will cover the latest threats, common pitfalls, and effective recovery strategies. Don’t miss this chance to fortify your organization’s AD resilience—register now!
Duration: 1 Hour
Join experts from ESG, Microsoft, and Commvault for a discussion and deep-dive demo into data resilience and recoverability for hybrid workloads.
Join our free virtual event to learn the latest strategies that attackers are using today, and the most useful tools and best practices you can implement to stop them. Get expert insights from some of the top experts in cybersecurity on how to identify and fix the most exploitable weaknesses in your organization. Don't let down your guard -- register today!
Duration: 2 hours
Join us to as we reveal the highly anticipated findings of the 2024 Cloud Protection Trends Report, which surveyed 1,600 IT leaders on their data protection strategy. We’ll explore the latest insights into Microsoft 365 cloud-powered protection mechanisms for production data located both on and off-site — including BaaS and DRaaS.
Duration: 1 Hour
Learn how to make AI/ML work for your datacenter network operations in our free 30-minute Coffee Talk. Get expert insights into latest trends and best practices for building AI-ready networks today to maximize the value of AI applications tomorrow.
Duration: 1 hour
Join our webcast to unlock the full potential of telemetry pipelines! Learn how to optimize data for log reduction, enhance compliance, and leverage real-time data actions. Don't miss this chance to transform your enterprise's observability and compliance strategies.
Duration: 1 Hour
Don't miss this chance to gain actionable insights and strategic guidance from industry leaders. Join us for an enlightening Fireside Chat to empower your cyber security strategy!
Duration: 1 hour
Join Greg Schulz, Author, founder, and Sr. Analyst of Server StorageIO and Microsoft MVP (CDM), as he discusses top threat monitoring implementation strategies. Greg will discuss industry trends, technologies and techniques, best practices, and implementation strategies.
Duration: 1 hour
Get the answers straight from the experts in this free, three-hour summit, where you'll learn the ins and outs of threat monitoring, how to do it right, and the biggest traps to avoid. Register today!
Duration: 3 hours
In an era when cyber threats evolve at an unprecedented rate, proactive threat monitoring has never been more critical. This webinar will equip IT professionals, IT managers, and business professionals with knowledge and strategies to enhance their organizations' cybersecurity posture. Join us!
Duration: 1 hour
Join our webcast to learn how to protect your organization against the rising threat of cyberattacks with an airtight data protection strategy. Discover best practices for securing hybrid- and multi-cloud environments. Don't miss this opportunity to enhance your cybersecurity and ensure reliable data recovery.
Duration: 1 Hour
Join us to learn about Microsoft 365 E5 and the differences between 3 and 5. We’ll show you how to stay on top with Microsoft E5.
Duration: 1 Hour
Learn how to make sure that every piece of data that crosses your Microsoft 365 environment is as loss-proof and recoverable as possible.
Duration: 3 hours
In this exciting webinar, you will have the opportunity to learn about tools and techniques to preserve your M365 environment and best practices for configuration and security, enhancing your skills and knowledge in data protection. Learn more!
Duration: 1 hour