Webcasts


On Demand

Detect Early and Detect Often: The Case for Threat Monitoring

In an era when cyber threats evolve at an unprecedented rate, proactive threat monitoring has never been more critical. This webinar will equip IT professionals, IT managers, and business professionals with knowledge and strategies to enhance their organizations' cybersecurity posture. Join us!

Duration: 1 hour


How to Design Secure Protection for Hybrid- and Multi-Cloud Environments

Join our webcast to learn how to protect your organization against the rising threat of cyberattacks with an airtight data protection strategy. Discover best practices for securing hybrid- and multi-cloud environments. Don't miss this opportunity to enhance your cybersecurity and ensure reliable data recovery.

Duration: 1 Hour


Empowering Security and Productivity With Microsoft 365 E5: Real-World Solutions for Modern Challenges

Join us to learn about Microsoft 365 E5 and the differences between 3 and 5. We’ll show you how to stay on top with Microsoft E5.

Duration: 1 Hour


Microsoft 365 Resilience Summit

Learn how to make sure that every piece of data that crosses your Microsoft 365 environment is as loss-proof and recoverable as possible.

Duration: 3 hours


Expert Guide to Loss-Proof Microsoft 365 Data

In this exciting webinar, you will have the opportunity to learn about tools and techniques to preserve your M365 environment and best practices for configuration and security, enhancing your skills and knowledge in data protection. Learn more!

Duration: 1 hour


Masterclass: Managing Email Signatures on a Microsoft Environment

Want to know where to start or what solutions others have tried? Join us in this expert-led webcast.

Duration: 1 hour


Coffee Talk: The Case (and Caveats) for Cloud-Based Patch Management

Kick back on this Coffee Talk and listen to Ian radically transform your approach to endpoint and cloud vulnerability management - you can’t even imagine what you may discover in your own organization, which requires management and security.

Duration: 1 hour


All The Ways the Internet is Surveilling You

Join us for this webinar with Roger A. Grimes, Data-Driven Security Evangelist at KnowBe4, as he discusses the extensive surveillance enabled by the internet, the risks of your personal data falling into the hands of malicious entities, and methods to protect yourself.

Duration: 1 hour


Copilot for Security: Overview of the Newest Copilot Offering

Join us to get a detailed walk-through with plenty of visuals for Copilot for Security in this on-demand webcast featuring Insight’s Senior Architect.

Duration: 1 hour


Coffee Talk | Connecting Beyond Chat: How To Expand Microsoft Teams with Integrations

Join us while we will explore integrations with Microsoft Teams and how they can enhance and streamline your collaboration. From project management to customer relationship management to other Microsoft 365 services, there are countless integrations that can expand the functionality of Teams and help you connect with your colleagues and clients in new and innovative ways.

Duration: 1 hour


Coffee Talk: The Ins and Outs of Cloud-Based Endpoint Patching

Sign up for this free virtual Coffee Talk to learn straight from the experts how cloud-based endpoint patching can strengthen your security posture, and what pitfalls to look out for. Register today!

Duration: 1 hour


Tech Talk | Navigating Cloud Migration Post-VMware Acquisition: Challenges and Strategies for IT Managers

In this live Tech Talk, cloud migration experts Harsha Kotikela and Kanchan Mirani talk with veteran technology journalist John K. Waters about the complexities of cloud migration and how cloud infrastructure solutions provider Nutanix can help IT teams move and manage workloads seamlessly across on-premises and cloud environments.

Duration: 1 hour


To Hell and Back: Recovering Active Directory During an Attack

Join Semperis’ Principal Technologist and MVP alumnus Guido Grillenmeier for lessons from this real-live incident response and attack intervention.

Duration: 1 Hour


The Dual Nature of the Dark Web: Navigating Risks and Harnessing Potential for Cybersecurity

As compromised credentials reign as the primary catalyst for data breaches, organizations are in pursuit of actionable intelligence to secure their environment. Join in to Learn more!

Duration: 1 hour


Enhancing Security, Cyber Resilience, and Performance of Your Veeam Backup Recovery Solution

Join us for an interactive discussion on making backups and restores better, faster, more secure, and cost-effective from on-prem to Cloud. Adrian and Greg will discuss industry trends, customer pain points, techniques, best practices, AI anomaly, dedupe data footprint reduction, and cloud object storage.

Duration: 1 hour


Leaving Microsoft Unified for Third-Party Support : How Two Large Enterprises Made the Switch

Join our experts and IT professionals who made the switch from Microsoft Unified and never looked back.

Duration: 1 Hour


Data Resilience 101 Summit: How To Keep Data Safe and Recoverable

Join this free, three-hour summit to learn straight from the experts the biggest mistakes you can make with your data, the top ways to make that data resilient, and how to make sure your organization stays ahead of the threats.

Duration: 3 hours


Coffee Talk: Rebounding from Ransomware: An Expert Guide

Make sure your ransomware strategies cover the full breadth of an attack, from start to finish – and beyond! Learn how in this free expert-led Coffee Talk.

Duration: 1 hour


AI vs. Security Summit

Join this free three-hour summit to learn straight from the experts how to modernize your security posture with AI to meet up-and-coming threats to your data.

Duration: 3 hours


Coffee Talk: Datacenter Fabrics 101: What They Are, Why You Need Them & How To Implement Them

In this coffee talk you’ll learn about how fabric architecture can help you drive efficiencies in bandwidth, costs, and energy efficiency in you datacenter.

Duration: 1 hour