Webcasts


On Demand

Coffee Talk: Crash Course: Modern Strategies for Email Security

As with so many things, many of these best practices will strike you as being very common-sensical, but we all know common sense just isn’t so common. You’ll come away from this session building your own master email security checklist.


Mastering Database Replication: A Deep Dive into Best Practices and Solutions

Join us for this deep dive into mastering database replication, where our expert speakers will share insights, practical tips, and real-world experiences to empower you with the knowledge and skills needed to navigate the complexities of database replication successfully. Whether you are a database administrator, developer, or IT professional, this webinar promises to enrich your understanding and proficiency in ensuring the seamless replication of critical data in your organization.

Duration: 1 hour


Data Security & AI Summit: How To Master the Privacy Balancing Act

Join this free, two-hour virtual summit will explore the ins and outs of data security in the AI era, including best practices that are shaping the future of business. Don’t fall behind – register today!

Duration: 2 hours


Manage and Secure Microsoft 365 Like an Expert Summit

You won't want to miss this free half-day summit from the editors of Redmondmag.com that will keep you on top of Microsoft 365 updates and give you real-world insights you can use to improve the security, manageability and recovery of your Microsoft 365 environment.

Duration: 3 hours


Unveiling the Hidden Costs of Microsoft Copilot

In this information-packed Tech Talk, enterprise software support experts Mike Jones and Josh Arras talk with veteran technology journalist John K. Waters about the critical aspects of Microsoft Copilot, offering a comprehensive examination of its pricing structures, versions, and the unseen costs businesses might incur.

Duration: 1 hour


Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them

With more and more programs and information relying on the cloud, maintaining robust security can feel like an uphill battle. Unsure where to start? We've got you covered! Join us for this webinar where Roger A. Grimes, Data-Driven Security Evangelist at KnowBe4, will walk you through the ins and outs of cloud security.

Duration: 1 hour


Coffee Talk: Datacenter Automation Crash Course: How to Get (Almost) Hands-Free Datacenter Management

In this session, Senior Resultant Howard M. Cohen highlights how automation is applied to the design, development, multi-vendor integration, performance protection and improvement, and the ongoing operational optimization of your data center.

Duration: 1 hour


Improve Your Active Directory Security Posture with Identity Risk Assessment

In this webinar, you'll get a comprehensive overview of the Active Directory (AD) threat landscape, highlighting the factors that influence its performance and health. Don't miss it!


Enterprise Backup & Recovery 101: What To Do, What To Avoid and How To Manage It All

Join us for this half-day summit where independent experts will share their tried-and-true methods for designing, implementing and managing a disaster-proof backup and recovery plan. Whether your data is on-premises, in the cloud or a mixture of both, you need to make sure it doesn’t get lost if (or when) disaster strikes. Don’t go it alone – register today!

Duration: 3 hours


Top 7 Backup & Recovery Challenges (and How To Overcome Them)

Join Greg Schulz, Author and senior analyst at Server StorageIO and Microsoft MVP Cloud Data Center Management, as he discusses the top 7 backup and recovery challenges and how to overcome them.

Duration: 1 hour


Microsoft 365 Backup Checklist for 2024

Whether you’re already protecting critical data in Microsoft 365 or just starting out, watch this webinar as we reveal the top features and considerations in our 2024 Microsoft 365 backup checklist! If your mission is to formulate a successful backup strategy for Microsoft Exchange, SharePoint, OneDrive for Business, and Teams, you won’t want to miss this.

Duration: 1 hour


Coffee Talk: The 2024 Ransomware Response Toolkit: What to Do When the Worst Happens

Know the steps to take to salvage your data, minimize downtime, inform customers and end users, and keep your organization from making headlines for all the wrong reasons. Ransomware attacks stink, but bungling your response to one is worse. Get prepared – register today!

Duration: 1 hour


Maximizing the ROI of Microsoft 365 and E5

Today’s workforce is diverse, but all employees need digital tools to perform at their best from anywhere and on any device. But how do you maintain agility and enable your organization to stay ahead of workplace needs? Join in to learn more!


Put Your Resilience to the Test: Ensuring Readiness in a Ransomware-Ridden World Summit

This talk will cover the drama and intrigue but also help your organization focus on what the threats continue to be and how you can use tabletop exercises and testing to ensure your organization is best prepared for what ransomware is going to bring in 2024.

Duration: 2 hours


Best Practices for Optimizing Mission-Critical Microsoft Azure Workloads Summit

Join in to learn modern DevOps strategies to make sure your organization takes the fullest advantage of what Azure offers, what are the dos and don'ts for making sure your cloud infrastructure continues to support your organization’s business objectives for years to come, and more!

Duration: 3 hours


The 5 Critical Components of Achieving Highly Efficient Azure Infrastructure

In this session, we address some of the most common challenges that cloud operations teams face once their workloads are successfully operating in Azure, including how to most efficiently and cost-effectively scale infrastructure in a way that minimizes risk while ensuring performance and uptime, control costs and charge back cloud usage to appropriate departments to meet the business’s objectives , and more.

Duration: 3 hours


Snackable Active Directory Security: 30 Minutes a Day Keeps the Bad Guys Away

Cleaning up years of AD configuration drift and tech debt can be a daunting task … but not as unpleasant as trying to recover the identity system after a full-blown ransomware or cyberattack. In this webinar, Kriss Stephen (Solutions Architect, Semperis) demonstrates how to use Semperis’ free Purple Knight tool.

Duration: 1 hour


Endpoint Management Strategies for the Modern Workplace

In this session you’ll learn how to transform and modernize your existing endpoint management environment to deliver a superior end-user experience. Insight experts will cover how you can simplify and optimize your IT costs while unifying processes and services across all your devices and improving security.

Duration: 1 hour


Top Tech Trends for IT Leaders That Will Define 2024

Watch this webinar for exclusive insights from our tech experts. We’ll dive deep into their predictions on the key enterprise IT and software development trends that could drive a significant impact for your business.


How to Optimize Microsoft Security to Build a Custom Security Program

This webinar will focus on optimizing your Microsoft Security investments and leveraging advanced cybersecurity to develop a custom security program to fortify your organization against cyberattacks without overtaxing your resources.

Duration: 1 hour