On Demand
Join from the editors of Virtualization & Cloud Review as well as independent experts who will take a deep-dive into the current status of end user computing technology, review best practices for securing your remote workforce and share real-world knowledge for configuring, maintaining and improving your VDI and other end user computing technology.
Duration: 3 hours
Find out the best way to get your defense plan in place from independent experts who've done it before with this free half-day summit brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com. Don't miss it!
Duration: 3 hours
Join the editors of Redmondmag.com and Virtualization & Cloud review along with independent experts who work with implementing zero trust day-in and day-out and can walk you through what they've seen work, what hasn't, and what steps you can take to make sure your zero trust implementation gives your organization the level of security you're looking for.
Duration: 3 hours
With this heavy weight on your shoulders, you need expert advice. That's why the editors of Virtualization & Cloud Review, AWSInsight and Redmondmag.com have brought together independent experts to give you the real-word advice, best practices and insights you need to make sure that if/when the worst happens you can come back quickly, hopefully with the click of a button or two. Don't miss it!
Duration: 3 hours
The editors of Virtualization & Cloud Review, Remdondmag.com and AWSinsider.net are bringing together independent experts for this free, half-day summit offering top tips, expert insight and best practices that will help you develop an enterprise data and cloud data strategy to take you into 2023 and beyond.
Duration: 3 hours
In this webinar, we'll discuss what you should look for in an IGA solution to secure your organization from identity-based cyberattacks and meet regulatory requirements. Learn more!
Find out the best way to protect your organization against Ransomware and get your defense and recovery plans in place with this free half-day summit. Don't miss it!
Duration: 3 hours
For those who want to assure the best of service even during the worst of times, this session is a tour de force of how to best construct a completely connected collaborative customer contact center. Don't miss it!
Duration: 1 hour
Ransomware has evolved into an advanced attack that achieves lateral movement, exfiltrates data, and disables backups long before the victims know what hit them. Watch this webcast to learn the state of ransomware today, and why you can't let your guard down, how cyber deception techniques work, and why they're essential to a proactive data protection strategy, and more!
Find out how other IT teams are utilizing Microsoft Teams, top concerns and plans for the future in this Webinar brought to you by the editors of Redmondmag.com!
Join this webinar to learn how Windows IoT for Enterprise harnesses the power of Windows and the cloud to help organizations do more at the edge, provides specialized features that enable the development of dedicated devices locked down to a specific set of applications and peripherals, and more! Don't miss it.
Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSInsider.net as they bring together independent experts to walk you through the top cloud security threats and what you can do to secure your multicloud and hybrid cloud environment in the face of today's top threats (plus quickly and fully recover it should the worst happen).
Duration: 3 hours
Join the editors of Redmondmag.com for this free half-day summit where they'll bring you together with independent experts who work with Microsoft 365 security day-in and day-out. They'll share their inside tips, best practices and everyday advice you can use that same day to improve your Microsoft 365 security and recoverability. Be sure to join us!
Duration: 3 hours
In this session, Nathan O’Bryan (MCSM: Messaging, MVPr Office 365) will explore Best Practices for Securing, Administering & Recovering M365 to ensure security, and compliance while maintaining the appropriate levels of access for end-users. Learn more!
Duration: 1 hour
In this session, we'll give our recommendations on things you absolutely should do when it comes to security Microsoft 365. On the flip side, maybe there are some features or settings that may not be best for security. We'll also contrast what you should do with what you shouldn't do when it comes to Microsoft 365. Don't miss it!
Duration: 1 hour
In this free half-day seminar, brought to you by the editors of Redmondmag.com and Virtualization & Cloud Review, find out the top 10 threats you're facing, get real-world architecture advice and find out the pros and cons of public, private and hybrid cloud platforms.
Duration: 3 hours
Enhanced visibility and auditing of active directory (AD) environments empowers security teams to detect, escalate, and mitigate an impending attack before moving laterally into the network. Join this webinar to learn why AD security needs to be prioritized, why native tools can be insufficient to monitor AD, and more!
Join the editors of Redmondmag.com as well as independent security and Microsoft Teams experts for this can't-miss, free half-day summit that will give you real-world advice you can use today to secure your Teams installation and harden it for the future. Don't miss it!
Duration: 3 hours
In this session, we'll cover aspects of Teams that may leave you vulnerable and what you should do to secure Teams. Learn more!
Duration: 1 hour
Full integration into “All the Microsoft Things” presents unique challenges and opportunities in Azure AD and hybrid environments – security is a huge consideration. Join this session to get Ian Thornton-Trump CD's conclusions but suffice it to say – not all collaboration apps are created equal and there are risks you need to know about when considering Teams as your solution of choice. Don't miss it!
Duration: 1 hour