Webcasts


Upcoming

Modern Tips for Microsoft 365 Tenant Migrations

In this webcast, we will explore the top 5 tips for Tenant-To-Tenant migrations, including methods to prepare, migrate, coexist, and manage in this changing world. Learn more.

Date: 12/02/2021

Time: 11:00am


Cloud Security & Recovery Summit

What are the top threats after your cloud today and heading into 2022? How can you make sure your cloud infrastructure and data remain as safe as possible, and easily recoverable if the worst happens? Join the editors of Redmondmag.com and Virtualization & Cloud Review for this free half-day summit. Learn more.

Date: 12/03/2021

Time: 9:00 am

Duration: 3 hours


Top 10 Cloud Infrastructure & Data Best Practices

In this session Top 10 Cloud and Infrastructure and Data best practices you will gain valuable insight into protecting your cloud from our expert speakers. Learn more.

Date: 12/03/2021

Time: 10:00 am

Duration: 1 hour


The Cloud Security Threat Landscape Heading Into 2022

Join Ian Thornton-Trump CD for a look backward, a look forward and a stark warning about the biggest threats and the biggest opportunities for organization’s digital transformation efforts. Learn more.

Date: 12/03/2021

Time: 9:00 am

Duration: 1 hour


Simplifying Azure data protection and migration with Veeam

Simplify data management between on-premises and public cloud environments and lower storage expenses with Azure-native backup and recovery, built for simplicity, scale, savings and security.

Date: 12/07/2021

Time: 11:00 am


Your Hybrid/Multi-Cloud Infrastructure & Data: Wise Decisions for 2022 and Beyond

Whether its decisions about how to manage backups, or how to design high availability solutions in a hybrid cloud scenario, join us to learn about how to ensure you have availability, security and data integrity. Learn more.

Date: 12/08/2021

Time: 9:00 am

Duration: 1 hour


Hybrid & Multi-Cloud Data & Database Best Practices

Whether you are on platform as a service, or infrastructure as a service, or in a hybrid model, you will face new and different challenges when moving to the cloud. Join this session to learn about how to optimize your databases in modern infrastructure. Learn more.

Date: 12/08/2021

Time: 10:00 am

Duration: 1 hour


Hybrid Cloud & Cloud Database Preparation for 2022 and Beyond

Attend this free, half-day virtual summit brought to you by the editors of Virtualization & Cloud Review, Redmondmag.com & AWSInsider.net to learn what you need to know now about performance, best practices and more for managing your hybrid cloud infrastructure and data thanks to insights, advice and insights brought to you by leading independent hybrid cloud experts. Learn more.

Date: 12/08/2021

Time: 9:00 am

Duration: 3 hours


Veeam Platform Updates: Protect Cloud, Virtual, Physical environments

Watch this webinar for a full run down of the latest on the Veeam Platform products with a demo of some of the newest capabilities, including native and advanced protection for AWS, Azure and Google Cloud Platform, and more! Learn more.

Date: 12/09/2021

Time: 11:00 am


What's New in Microsoft 365: Top Features You Might Have Missed

Keeping up with all the changes and new features in Microsoft 365 is a constant challenge. Join Nathan O’Bryan in this session as he covers some of the new features and functionality that have been announced for Microsoft 365. Learn more.

Date: 12/10/2021

Time: 9:00 am

Duration: 1 hour


Microsoft 365: A Look Ahead to 2022 Summit

In this summit, join the editors of Redmondmag.com plus independent experts to learn everything you need to know about changes coming to Microsoft 365 in 2022! Learn more.

Date: 12/10/2021

Time: 9:00 am

Duration: 3 hours


Why Office 365 Backup is Essential

With Office 365, It's your data — you control it — and it is your responsibility to protect it. Join the experts to find out why Office 365 backup is so essential! Learn more.

Date: 12/13/2021

Time: 11:00 am


Expert AWS Best Practices Summit

Hear from experts who live and breathe AWS security, performance and recoverability and the editors of AWSinsider.net and Virtualization & Cloud Review in this half-day summit packed with tips and real-world advice.

Date: 12/15/2021

Time: 9:00 am

Duration: 3 hours


Identity & Access Management Summit

In this virtual summit, we look at top issues surrounding IAM, supplementing Active Directory and Azure AD, including SaaS authentication, changing compliance requirements and emerging approaches such as CARTA, continuous and adaptive risk and trust assessment. Learn more.

Date: 01/19/2022

Time: 9:00 am

Duration: 3 hours


Microsoft Security in 2022 Summit

The editors of Redmondmag.com have created this half-day summit to get you up to speed on exactly what's happening with Microsoft's Security Roadmap plus give you tips, advice and best practices you can use right away to secure your Windows-based ecosystem. Learn more.

Date: 01/28/2022

Time: 9:00 am

Duration: 3 hours


Digital Transformation in 2022 Summit

Don't miss this half-day summit brought to you by the editors of Virtualization & Cloud Review, Redmondmag.com, PureAI.com, AWSInsider.net, MCPmag.com and ADTmag.com where you'll learn about how digital transformation has transformed for 2022 and how you can take steps now to take advantage of it in the coming year and beyond. Don't miss out!

Date: 03/18/2022

Time: 9:00 am

Duration: 3 hours


On Demand

How to Painlessly Deliver and Scale Company Email Signatures

How do you address your organization’s growing (and evolving) email signature needs n without making it a full-time job? Learn more.


Masterclass: Simplifying Identity and Access Management with AD360

In this webinar we'll discuss in-depth a platform that can take care of all your IAM needs. Join to learn how to efficiently evaluate an IAM platform, see how ManageEngine AD360 can help you tackle IAM challenges across AD, Exchange, and Microsoft 365 environments and more! Learn more.


What About the Email Archive? Modern Strategies for Migration

Join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Jason Jacobo from Quadrotech/Quest, for this educational webcast as they discuss why you can't just start migrating your archive, what archive data should and shouldn't be migrated and what your options are when it comes to migration strategies. Learn more.


Maximizing Microsoft 365 Summit

Join the editors of Redmondmag.com plus independent experts in this half-day summit that will walk you through what you need to know about configuration, optimization, security, backup tips and tricks plus more. Learn more.

Duration: 3 hours


Top Tips for Managing and Optimizing Microsoft 365

Join us to learn the top tips for managing your Teams environment and getting the most out of your deployment beyond just keeping Teams running for your users. Learn more.

Duration: 1 hour


The Top 10 Actions Every Organization Should Take to Protect their AD from Attacks

Join us to learn the 10 actions you can take that will greatly increase your chances of fighting off attackers and building your resilience. Learn more.


Migrating to Windows 11: It’s All About the Preparation

What does it take to simplify the process of migration to achieve a secure and productive Windows 11 environment when you’re done? Learn more.


The Top 10 Ransomware Attacks Enterprises Need To Worry About

Join us as we take a page from the Facts of Life and look at the impact law enforcement is having on ransomware attacks and the groups that are still a threat.

Duration: 1 hour


Top Security & Ransomware Threats Summit

From the latest threats to the best recovery methods should the worst happen, this half-day summit will make sure you’re armed and ready if (when) your enterprise falls under attack. Learn more.

Duration: 3 hours


Top Steps Every Enterprise Must Take NOW to Protect Themselves from Ransomware

Join two of the industry’s top experts on Cyber Security and Ransomware as they discuss how to take a proactive approach against Ransomware today. Learn more.

Duration: 1 hour


Enterprise Disaster Recovery Summit for 2022 and Beyond

Join the editors of Redmondmag.com and Virtualization & Cloud Review, plus their hand-picked independent experts, as they walk you through the real-world advice that your organization is going to need to make sure you're truly protected in the year ahead with a disaster recovery and backup plan that is truly recoverable and that is also manageable and secure. Learn more.

Duration: 3 hours


Why Disaster Recovery Will Matter Even More in 2022

Join us as we discuss the dynamics of a new-age disaster recovery program that addresses a mobile workforce, the threat of ransomware, the sudden absence of key people, and how to define viable alternatives in the New Year. Learn more.

Duration: 1 hour


What's New in Microsoft Teams for Security, Performance & Management

Join us to learn the latest updates to Microsoft Teams that you need to know about in order to get the most from your Teams deployment. Learn more.

Duration: 1 hour


Microsoft Teams: Security, Performance & More Summit

Join Redmondmag.com and independent Microsoft Teams experts for this completely free half-day summit to bring you real-world guidance you can use today to make your Microsoft Teams installation more secure, better performing and much easier to manage. Learn more.

Duration: 3 hours


Top 10 Microsoft Teams Best Practices Every Organization Needs To Implement

Join us to learn the top Microsoft Teams deployment considerations and an explanation on how these choices can have a lasting impact on your Teams deployment. Learn more.

Duration: 1 hour


Why office 365 Backup is Essential for the Modern Business

There is a common misconception that Microsoft fully backs up your data on your behalf, but the reality is that this is YOUR responsibility. Join NewCloud, an Otava Company and Veeam as we discuss Backup for Microsoft Office 365 and how it can help your business.


Cloud Data Protection for 2022 Summit

Don't miss this important look ahead at cloud data protection strategies that you need to know brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com. Learn more.

Duration: 3 hours


Modern Cloud Data Protection Best Practices

Join us for a look at what practices you and your organization should be implementing in your cloud and hybrid data solutions including Confidential Computing & Zero Trust, Data Security Features, Anti-tamper Features, and more! Learn more.

Duration: 1 hour


Top Threats to Your Cloud Data Landscape in 2022

Join Ian Thornton-Trump CD, CISO for Cyjax Ltd as he outlines how we arrived into a post-pandemic digitally transformed landscape and the top threats to SaaS and hosting services. Learn more.

Duration: 1 hour


Top 10 Things You Should Never Do with a Multi-Cloud Architecture

Join our experts to gain deep insight on the top 10 things you should never do with a Multi-Cloud Architecture. Learn more.

Duration: 1 hour


Hybrid Cloud/Multicloud Security Summit

Don’t miss this half-day summit brought to you by the editors of Redmondmag.com, Virtualization & Cloud review and AWSinsider.net will bring together independent cloud security experts that will give you real-world information you can use to make sure your cloud data is truly secure. Learn more.

Duration: 3 hours


The New Generation of Hybrid Cloud Security Best Practices

Join us to learn the best emerging practices for ensuring the optimal security posture for both the public and private cloud as part of an enterprise hybrid cloud platform. Learn more.

Duration: 1 hour


Understanding the New Remote Workforce

Join us to learn how the key to the remote workforce of tomorrow is to produce productivity and performance through people, platforms, applications, programs, processes, and policies. Learn more.

Duration: 1 hour


Remote Workforce Summit

Join the editors of Redmondmag.com and Virtualization & Cloud Review along with independent experts who will share their insights on what you need to do NOW to make sure your remote workforce and digital workplace is protected for the future. Learn more.

Duration: 3 hours


Top 10 New Best Practices for a Secure Remote Workforce

Because remote work was put into place so quickly, the solutions that were rapidly adopted probably aren’t as secure as they might be if the organization had been able to take its time. Join us in taking a step back to consider how things could be improved – especially with regard to security. Learn more.

Duration: 1 hour


Incorporate Zero Trust and SASE into your IAM strategy to secure your hybrid workforce

Join us as we discuss the security challenges involved in catering to a hybrid workforce, how Zero Trust and Secure Access Service Edge should be at the forefront of your IAM strategy and how to keep up with the key trends to build a strong IAM framework for your organization. Learn more.


A Master Class on Cybersecurity: Roger Grimes Teaches Data-Driven Defense

Join Roger Grimes for this thought-provoking webinar where he’ll share the most common reasons for data breaches and a data-driven approach to determining your organization’s specific weaknesses. Learn more.


Cloud Infrastructure in 2022 Summit

Join this summit to find out what your top infrastructure and cloud security concerns should be for the rest of 2021 and heading into 2022. Learn more.


Architecting Security for the Cloud

Join us as an expert reviews the importance of not relying on only one control, and what additional measures can be used to protect you, or at least mitigate, against future problems.

Duration: 1 hour


Top 10 Tips for Cloud Infrastructure Heading into 2022

Join the experts as they discuss the top 10 tips for Cloud Infrastructure in 2022 surrounding networking, site connectivity, security, administration and more. Learn more.

Duration: 1 hour


Microsoft 365 Security, Backup & Recovery Summit

Join the editors of Redmondmag.com and Virtualization & Cloud Review for this free half-day summit where they'll bring you together with independent experts who work with Microsoft 365 security day-in and day-out. Learn more.

Duration: 3 hours


Top Microsoft 365 Security, Backup & Recovery Mistakes

Join us as we look into the common mistakes or assumptions related to making sure your data in Microsoft 365 is safe and how to correct them. Learn more.

Duration: 1 hour


The New Best Practices for Microsoft 365 Security, Backup & Recovery

In this Webinar, you will learn a number of data protection strategies particularly with regard to data backups and security. Learn more!

Duration: 1 hour


Negate Cyber Attacks: Secure Vulnerabilities, Misconfigurations, Privileged Account Attacks

The steps of a cyber attack against an enterprise are always the same. The exploits attackers leverage are nearly the same as well. Therefore, it is due time that we start protecting our networks with more intelligent approaches. Let 17X Microsoft MVP Derek Melber give you a clear path to a more secure network. Learn more.


VIDEO: Best Practices on Microsoft 365 Backup

Watch this technical product demo to get an in-depth technical look into the best practices for operating Veeam® Backup for Microsoft Office 365.


Defending Against Active Directory Attacks That Leave No Trace

In this session, an identity and access management expert will walk you through some attack techniques that bypass traditional monitoring solutions. Learn more.


AWS Security, Backup and Recovery Best Practices

Join us to learn how to protect yourself against ransomware and the latest security threats as we discuss AWS Architectures designed for data protection, backups, and disaster recovery. Learn more.

Duration: 1 hour


AWS Cloud Security Summit

Are you prepared to manage your entire AWS cloud ecosystem securely? Make sure you're truly secure with this free half-day summit. Learn more.

Duration: 3 hours


Threat Detection Thursday — Life of a Zero-Day in the BlueVoyant SOC

Join this panel Q&A commenting on the lessons learned from the angles of Improved Detection, Threat Hunting, and Accelerated Response. 


Ransomware: All About the Benjamins

2021 has been a weird one for ransomware. We've seen more ransomware groups than ever either taken down by law enforcement or decide to "retire" but ransomware attacks have not slowed down at all. Learn more.


Best Practices for Cloud Storage, Backup & Recovery Summit

Don't miss this half-day summit where you will learn best practices and insights you need to make sure, should the worst happen (and it very well could), you can come back up with the click of a button. Learn more.

Duration: 3 hours


Fuel Digital Transformation: Changing Document Productivity Challenges into Opportunities

The shift to a hybrid workforce and digital workspaces has caused many organizations to heavily rely on PDF documents, e-signatures and workflows to replace manual in-office processes that no longer meet current business needs. Learn more.


Challenges and Best Practices for Protecting Azure Kubernetes Services

Enterprises all over the world are seeing more mission-critical cloud-native applications deployed on Kubernetes. Learn more.


Transforming Cloud Security with SASE

SASE is a security framework designed to counter threats that thrive in an environment which is invisible and distributed. Learn more.


Modernizing Privileged Access Management: Stopping Cyberattacks in Their Tracks

How can you implement privileged access management where both flexibility and effectiveness are achieved? Learn more.


Microsoft 365 and SharePoint Online Best Practices Summit

Don’t miss this summit that will keep you ahead of those changes and give you real-world insights you can use the same day to improve your Microsoft 365 and SharePoint Online installations. Learn more.

Duration: 3 hours


Top 10 Security & Backup Tips for Microsoft Office 365 and SharePoint Online

Join us for this session to learn a number of best practices that can enhance SharePoint’s performance. Learn more.

Duration: 1 hour


Best Practices for Managing & Optimizing Microsoft 365

Join us for this session to learn a number of best practices that can enhance SharePoint’s performance. Learn more.

Duration: 1 hour


Why it’s Time to Revisit Your Teams Strategy

This Webcast explains why it’s time to take a step back and take a critical look at your organization’s unified communications strategy, especially as it relates to Teams. Learn more.


How You Can Extend the Cloud Perimeter Beyond the Microsoft Cloud

During this webinar, we'll be unpacking some of the deeper integration potential around MCAS and your 3rd party SaaS and PaaS apps. Learn more.


Multi-Cloud Security Summit

Join us to discover top cloud security threats and what you can do to secure your multi-cloud and hybrid cloud environment in the face of today's top threats. Learn more.

Duration: 3 hours


Top Hybrid/Multi-Cloud Security Threats

The key takeaways from this presentation will help security and IT teams support your organization’s business objectives while at the same time continuing to maintain a robust security and compliance posture. Learn more.

Duration: 1 hour


Security Best Practices for Hybrid/Multi-Cloud Environments

This session outlines strategies and tactics for keeping our hybrid cloud environments safe from ever-increasing threats. Learn more.

Duration: 1 hour


An Admins Guide to Secure and Efficient Microsoft Teams Management

In this webinar, we're going to provide some of our favorite tips and guidance to help you best manage Microsoft Teams. Learn more.


Digital Resiliency Strategies for Application Infrastructure in a Hybrid Cloud World

Application delivery infrastructure and security have become more complex. Learn more.


Maximizing Microsoft Teams Summit

Join the editors of Redmondmag.com and independent Microsoft Teams experts for this free, half-day summit filled with real-world tips, advice and best practices to help you get the most out of your Microsoft teams installation, no matter the size of your organization. Learn more.

Duration: 3 hours


Expert Insights for Maximizing Your Microsoft Teams Installations

Join this session as we look at ways you can maximize some of the other benefits Microsoft Teams has to offer. Hopefully, you'll come away from this session with at least one new piece of functionality within Teams that you can take back to your organization to help you get even more from platform! Learn more.

Duration: 1 hour


Top Microsoft Teams Best Practices for Today's Workforce

Join Senior Resultant, Howard M. Cohen, as he shows you how to produce your best results by leveraging Teams best practices. Learn more.

Duration: 1 hour


Veeam CDP: Tips for Lightning-Fast Recovery

In this webcast, we will share the latest tips and tricks for implementing this new capability for those critical workloads that require near-zero Recovery Point Objectives (RPOs). Learn more.


Understand the Differences Between Traditional Endpoint and Cloud-Based Device Management

Sign up for this webcast and you’ll come away with a clear understanding around system and licensing requirements, and talking points to convince your internal stakeholders of the shift. Learn more.


Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim?

After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Learn more.


Cloud Data Protection Best Practices for AWS & Azure

Join us for the second session of summit as you will learn about the options you have, their cost impact and structure, and finally best practices for securing your environment. Learn more.

Duration: 1 hour


The Top Ransomware Threats You're Facing Right Now

Join us for the first session of summit to learn how ransomware groups are going after the cloud with the same ferocity they have been attacking local networks and learn what you need to do to protect yourself and your cloud providers. Learn more.

Duration: 1 hour


Ransomware & Cloud Data Protection Summit

Join us for this half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practice advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Learn more.

Duration: 3 hours


The European Union's Recommendations to Prevent Cyberattacks on SMEs

After identifying and analyzing the cybersecurity issues faced by SMEs post-pandemic, the EU has developed recommendations that could help SMEs improve their cybersecurity posture. Learn more.


How to Create a Unified Threat Hunting Experience Across Security Portals

This webinar is for you if you’ve been comfortable with the old portal but want to know more about the new environment. Learn more.


Pain Points: When to Consider Switching or Evolving Your Cloud Architecture

Please join us for this session as we discuss tips on how to make your cloud usage more efficient! Learn more.

Duration: 1 hour


State of the Cloud Art: The What, When and Why of Public vs. Private vs. Hybrid vs. Multi-Cloud

Remember when managing your network or data center meant constantly updating, upgrading, and shopping for new hardware and new software to constantly keep making your infrastructure better and better? Learn more.

Duration: 1 hour


Choosing Your Cloud Summit

Attendees of this Redmond and Virtualization & Cloud Review virtual summit will find out the latest on the key emerging differences of each major approach and for ideas from experts to get more business value out of their architecture. Learn more.

Duration: 3 hours


Modern Best Practices for Cloud Data Protection, Collaboration & Compliance

Join IT industry veteran Howard M. Cohen for an in-depth examination of best practices around managing both your people and your tech to achieve maximum security, and maximum regulatory compliance, too! Learn more.

Duration: 1 hour


Top 10 Threats to Your Cloud Data in 2021

Join Ian Thornton-Trump CD for a blunt assessment of the ten threats to your cloud data, how Digital Transformation projects can derail organizational security and how to introduce new attack surfaces for malicious actors to pray upon. Learn more.

Duration: 1 hour


Modern Cloud Data Protection Summit

Join the editors of Virtualization & Cloud Review and Redmondmag.com as they bring together experts in the cloud and Infosec world to make sure their data stays secure in their modern cloud infrastructure. Learn more.

Duration: 3 hours


Integration Between Microsoft’s EDR Technology and Incident Response Across the Productivity and Collaboration Layer

Join this webcast and you’ll walk away understanding how to balance the needs around organizational security with your user’s quality of work life. Learn more.


Ransomware Defense & Recovery Summit

Join editors and experts of Virtualization & Cloud Review to find out what you need to know to defend, protect and recover when ransomware comes after you. Learn more.

Duration: 3 hours


How to Reduce Alert Fatigue, Optimize Logs, and Concentrate on High Value Sources of Information

Join us for this webcast as we discuss Attack Surface Reduction, creating valuable Identity Protection Policies, and managing your end user’s experience in the process. Learn more.


#1 Office 365 Backup: Technical Deep Dive

Join this webcast and learn about the infrastructure components, and how simple it is to use Veeam Backup for Microsoft Office 365 — from the early planning stage all the way to performing restores. Learn more.


Implement DMARC the Right Way to Keep Phishing Attacks Out of Your Inbox

​​​​​​​Get the details you need to know now to protect your organization from phishing and social engineering attacks. Learn more.


Expert Hybrid Cloud Data Tips & Infrastructure Best Practices

Join us as Howard M. Cohen examines how to approach data management and protection in today’s hybrid environments. Learn more.

Duration: 1 hour


Top Hybrid Cloud Data Dos and Don'ts

Join this session of summit to learn about networking, authentication, security, and monitoring concerns, and techniques for resolving them. Learn more!

Duration: 1 hour


Hybrid Cloud Data Summit

To help guide you the editors of Virtualization & Cloud Review, AWSinsider.net and Redmondmag.com have teamed up with independent cloud experts to show you how architecture, best practices, security protocols, new tools and much more can make your job managing these systems so much easier. Learn more!

Duration: 3 hours


Microsoft Office 365 for Enterprises Summit

This half-day summit brings together the editors of Redmondmag.com plus independent experts to show IT pros how they can maximize Microsoft Office 365 in their enterprise environment. Learn more.

Duration: 3 hours


Best Practices for Implementing, Managing and Optimizing Office 365/Microsoft 365

This informative presentation provides practical tips that administrators can use to make sure that they deploy Microsoft 365 in a way that truly meets the organization’s needs. Learn more.

Duration: 1 hour


Top Security Concerns Every Enterprise Must Know for Office 365/Microsoft 365

This session will provide expert advice and insight on optimizing and securing your organization’s Office 365 infrastructure today and preparing and upgrading it for tomorrow. Learn more.

Duration: 1 hour


Protecting Your Organization Against Zero-Day Vulnerabilities

Join us as we take a deep dive into the process of these Proxylogon attacks and use this information to establish steps you can take to keep your organization secure from similar zero-day attacks using a strong SIEM framework. Learn more.


The New Reality: How Covid-19 Changed Everything

Join us for this session of summit to learn how others are evaluating and planning how and where work will be happening going forward.  Learn more.

Duration: 1 hour


Transforming Your Remote Workforce Summit

The editors of Redmondmag.com and Virtualization & Cloud Review, along with independent experts, will provide expert advice and insight on optimizing and securing your prospect's infrastructure today and preparing and upgrading it for tomorrow.  Learn more.

Duration: 3 hours


4 Hybrid Identity Security Pitfalls You Probably Already Forgot About

Over the past 18 months, it’s likely you’ve forgotten about potential risks that existed when expanding to the cloud. Learn more.


Secure and Extend Your AD Environments: Starling CertAccess + Active Roles

Join us for this webcast from IAM Security analyst experts to hear the top considerations and pitfalls to avoid when determining your IAM Active Directory (AD) security and management strategy. Learn more.


The Good, Bad, and the Ugly of the Rush to Remote Work

For this session Tom Fenton reached out to his friends in the industry to get their insights and he will go over what they and he has learned over the last year: the good, the bad and, of course, the ugly of enabling remote workers. Get the useful details.

Duration: 1 hour


Next-generation Approaches to End-User Computing in 2021

Join us for this session as we discuss how the pandemic began to grip the world in early 2020 and kicked off a forced march to remote work. Learn more.

Duration: 1 hour


Future of Desktop Infrastructure Summit

Join the editorial staff of Virtualization & Cloud Review and Redmondmag.com as well as independent experts for this half-day informational summit packed with real-world advice and insights you can't afford to miss! Learn more.

Duration: 3 hours


VDI or Daas? The Future of EUC is Hybrid

In this 30 minute discussion, we'll cover the advantages of a hybrid and multi-cloud EUC solution. Learn more.

Duration: 1 hour


Applying the MITRE ATT&CK Framework to Your Active Directory

With the accelerating pace and increasing sophistication of cyberattacks, having a common framework for your security strategy helps you cope with the changing threat landscape. Learn more.


DEMO: Microsoft Teams Backup

Although Teams data has its own basic retention, Microsoft doesn’t fully protect against accidental deletion or security threats that lead to data loss, nor does it enable long-term retention for compliance or regulatory purposes. Whether it’s Teams or your entire Office 365 environment, it's your data — you control it — and it is your responsibility to protect it.


Microsoft Azure Stack HCI Summit

IT decision-maker attendees of this Redmondmag.com Microsoft Azure Stack HCI Summit will find out about key advantages of the Microsoft hybrid cloud approach for HCI, and best practices and use cases involving Azure Stack HCI.

Duration: 2 hours


Threat Detection Tuesday - What's In Your Toolbox?

Join BlueVoyant’s Owen Allen and Mike Scutt for a deep dive into some of the tools and techniques used by BlueVoyant Threat Hunters to identify breaches and threats more quickly. Learn more.

Duration: 1 hour


Managing Your Microsoft Dynamics 365 Data: Retain, Recover, and Be Ransomware-Ready

During this session, they’ll discuss how Microsoft Dynamics 365 is transforming business operations in the cloud and how the newest Metallic SaaS offering extends native capabilities for purpose-built protection, rapid recovery from attack, and long-term data retention to meet SLA compliance. Learn more.


Top Cloud Backup & Recovery Best Practices for Every IT Pro

In this session, we will look at best practices, tips, trends and techniques pertaining to cloud backup and recovery so you can be prepared when something happens. Learn more.

Duration: 1 hour


Modern Cloud Backup & Recovery Summit

This free, half-day summit is for every IT pro who isn't 100 percent confident their cloud backup recovery can withstand natural (or not-so-natural) disasters, ransomware, other hacks, or even just the weakness of the cloud systems themselves. Learn more.

Duration: 3 hours


A Master Class on IT Security: Roger Grimes Teaches Ransomware Mitigation

Join Roger for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware. Learn more.


Prevent Active Directory Password Attacks: Steps and Tools

Password attacks are one of the most common reasons for data breaches even in 2021. The best way to get ahead of cybercriminals is to think like them. In this webinar, we'll show you how. Learn more!


Azure AD & Active Directory Security Summit

This half-day summit brings together the editorial staff of Redmondmag.com and independent experts to educate IT pros on what they need to know to protect their enterprise. Learn more.

Duration: 3 hours


Ransomware in 50 Minutes: Top Current Threats & What Experts Expect in 2021

Join Ian Thornton-Trump CD for the first session of our Azure AD & Active Directory Security Summit for a walk-through of a recent US Government Agency compromise and how monitoring of the Windows Security Event log could have revealed the unauthorized activity - on many occasions. Learn more.

Duration: 1 hour


Threat Detection Thursday - Breaking All The Rules!

This session will provide an overview of detection types, applicability, and rule aggregation to help you better focus on events that matter. If you can't tell your RBA from your UBA, join us on our journey to detection excellence! Learn more.

Duration: 1 hour


Enabling Digital Transformation with Windows Embedded IoT Solutions

Join us at this interactive and engaging webinar to learn how Microsoft Windows Embedded IoT and Azure cloud enable digital transformations helping partners to accelerate their delivery goals. Find out more now.


Addressing Endpoint and Data Insecurity in a Post-COVID World

The shifts that have occurred in the last 12 months in the way your organization operates have resulted in a drastically different working environment than what previously existed. Learn how you should go about addressing post-COVID insecurity? Register now.


Active Directory Hybrid Cloud Management: Top Security Risks to Watch For

In this webinar, we'll will discuss the top three security considerations when shifting to a hybrid identity model. Learn more.


Microsoft Teams Summit

It's time for your IT department to become your company's Microsoft Teams hero! Join the editors of Redmondmag.com plus independent experts in this half-day summit that will walk you through what you need to know about configuration, optimization, security, tips and tricks plus more. Learn more.

Duration: 3 hours


Simplifying Microsoft 365 Tenant Migrations When M&A Makes it Complicated

The pandemic has created opportunity for plenty of M&A/Divestiture activity. Learn more.


Don’t Do This With Your VM, Physical or NAS Backups: Worst Practices Gallery

So, you think you’ve seen it all? Think again. Join this webcast and learn more.


Hybrid Cloud 102: Best Practices for Hybrid Cloud Enterprise Configuration

Join us for session two of this summit as we look at best practices for Enterprise Hybrid Cloud Configuration and associated topics. Learn more.

Duration: 1 hour


Hybrid Cloud 101 Summit

Do you know the best practices for setup and configuration? What about the tools that can help? Join the editors of Virtualization & Cloud Review along with independent experts for this information-packed half-day seminar. Learn more.

Duration: 3 hours


Digital Transformation & The Cloud: Expert Best Practices for Transforming Your Enterprise

In this special editorial webcast, experts from Redmondmag.com will walk you through basic steps for considering a major Digital Transformation project. We'll look at everything from identifying stakeholders, rallying organizational support, to determining and securing budget and executing the project. Learn more.


How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches

Active Directory Exploitation Is the Common Thread in Recent High-Profile Attacks. Colonial Pipeline, SolarWinds, Hafnium - every day we hear about a new attack, a new vulnerability, and devastating consequences. Learn more.


Calculating the Impact of Cloud PBX for Microsoft Teams

Join us for this informative webinar to understand the critical nature and impact of selecting the right telephony partner for your Microsoft Teams direct routing deployment. Learn more.


Threat Detection Thursday

Based on methodologies developed though BlueVoyant's continuous research into attacker TTPs and real-world experience in countering espionage and financial crimes, our Threat Hunters will expose expert perspectives on human-driven defense. Learn more.


Enterprise Cloud Wars 2021 Summit

Join for this fun and fast-paced half-day summit where the editors of Redmondmag.com and Virtualization & Cloud Review bring together independent experts to discuss the pros and cons of many of today's top cloud solutions as well as what's working for organizations like yours.  Learn more.

Duration: 3 hours


AWS vs. Azure vs. GCP: Public Cloud Smackdown

In this tongue-in-cheek but informative roundtable session, public cloud experts will review what makes different public cloud systems great but also the weaknesses of each and what you might want to watch out for.  Learn more.

Duration: 1 hour


Best Practices for Making AWS and Azure Work Together

Join the second session of our Enterprise Cloud Wars 2021 Summit and get insights on what you need to do in your enterprise to make them work well together. Learn more.

Duration: 1 hour


Top 5 Identity and Access Management Challenges of 2021 and How to Overcome Them

In this webinar, we'll discuss top five identity and access management challenges IT admins will likely face in 2021 and how to overcome these challenges. Learn more.

Duration: 1 hour


A Master Class on IT Security: Roger Grimes Teaches You Phishing Mitigation

Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist where he’ll share a comprehensive strategy for phishing mitigation and how securing your users can become your best, last line of defense. Learn more.


Top Security and Compliance Issues with Office 365

In this session, we'll look at 5 of the top security and compliance issues with Microsoft 365 and what you can do to make sure your company doesn't fall victim to data compromises using Microsoft 365 services. Learn more.

Duration: 1 hour


What's New/What's Hot/What's Not with Office 365/Microsoft 365 Security

In this session, you will learn about the security features that you should be using and about some new features that you might not yet be familiar with. Learn more.

Duration: 1 hour


Office/Microsoft 365 Security Summit

Stay up to date on the latest features and security issues with Office 365/Microsoft 365 in this information-packed half-day seminar.  Learn more.

Duration: 3 hours


Microsoft Teams Backup: 8 Facts you NEED to Know!

Microsoft Teams is now the center of our productivity universe — but should you back it up? Learn more.


Getting More From Your Microsoft Teams Investment

In this webcast we'll cover the obstacles you will likely encounter on your way to a full Teams deployment and tips for how to overcome those obstacles. Learn more.


Top Do's and Don'ts of Enterprise Cloud Migration

Join cloud solution architect and technical trainer Tim Warner for a content-rich, “no fluff” breakdown of proven “do this, not that” cloud migration approaches.  Learn more.

Duration: 1 hour


Enterprise Cloud Migration Summit

Join us for this half-day summit brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com to learn what you need to know to get your enterprise safely cloud-enabled. Learn more.

Duration: 3 hours


Enterprise Cloud Migration Best Practices

Join this session as we look into topics including having a plan, being prepared, and understanding your application and data infrastructure environment.   Learn more.

Duration: 1 hour


What You Need to Know About Securing Active Directory

In this web seminar, we will discuss AD access points used in recent cyberattacks, how to look for warning signs that AD has been compromised, and steps to take in the event of an attack. Learn more.


Understanding the Hybrid and Private Cloud Dynamics

Cloud computing technology is evolving fast! Join this session as we answer your top questions and learn what the best solution for your business needs are. Learn more.

Duration: 1 hour


Best Practices for Architecting and Securing Your Hybrid and Private Clouds

During this session, we will examine several best practices for architecting your hybrid and private cloud environment so it will be as secure and resilient as possible. Learn more.

Duration: 1 hour


Cloud Architecture & Security Summit

The enterprise most likely has a mix of hybrid/private cloud infrastructure —or is striving to achieve it. Join this summit and learn more.

Duration: 3 hours


Microsoft 365 Data Protection – It’s Not Just Backup

Join Redmondmag.com Editor-in-Chief Scott Bekker, 14-time Microsoft Office Apps and Services MVP Matthew McDermott, and Spanning Director of Product Marketing Dave Wallen for a lively discussion around Microsoft 365 Data Protection. Learn more.


Best Practices for Multi-Cloud Environments

Join IT industry veteran Howard M. Cohen in exploring some of these best practices, why they’re each critical to your success, and how they enable you to recognize the full value of your multi-cloud strategy. Learn more.

Duration: 1 hour


Multi-Cloud Management Summit

Join this half-day virtual event to learn from topics like: Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Learn more.

Duration: 3 hours


How to Apply the Cyber Kill Chain Framework to Identify and Combat Cyberattacks

Join us to learn how the cyberattack chain model can help IT security teams put in place strategies to “kill” or contain the attack at various stages, and how to better protect their IT ecosystem.


Navigate your Hybrid Workplace Strategy with Microsoft Teams and BlueJeans

In this webcast you will learn about key predications regarding the future of the workplace, the next of Microsoft Teams for collaboration and how to get the office ready for a productive hybrid workforce. Find out more.


Hacking Multifactor Authentication: An IT Pro’s Lessons Learned After Testing 150 MFA Products

Join Roger as he discusses the good, the bad, and the ugly lessons he learned from his research. He’ll share with you what works, what doesn’t, and what you should absolutely avoid. Learn more.


Migrating Your Microsoft 365 Tenant Through Mergers & Acquisitions

Mergers, acquisitions, and divestitures are common business activities that can have a huge impact on your Microsoft 365 tenant. Learn more.


How to Apply the Cyber Kill Chain Framework to Identify and Combat Cyberattacks

Join us to learn how the cyberattack chain model can help IT security teams put in place strategies to “kill” or contain the attack at various stages, and how to better protect their IT ecosystem.


Would Your Organization Fail the Active Directory Security Assessment?

Join Microsoft identity experts as they walk through the most common weak spots in Active Directory configurations—and how to fix them. Learn more.


Building Your Distance Learning Experience

In the era of distance learning, education institutions have been forced to quickly adapt how their students learn as well as how their educators teach into a completely digital experience. Learn more.


The Changing Role of Active Directory Engineers in a Cyber-Resilient Organization

Join this webcast for a discussion on how AD engineers and architects can expand their roles and add value to the company by focusing on developing and implementing a strategy to ensure that AD is secure from malicious intruders. Learn more.


Why PSTs are Such a Bad Idea in the Cloud

Join us for a discussion about why we think PSTs are an obsolete and potentially dangerous storage location for email. Learn more.


Migrating Active Directory in a Work-From-Anywhere World

There can be many reasons why your organization might need to do an Active Directory migration. No matter the reason, you are going to have to make a decision about what tools to use. Learn more.


The FBI's Recommendations to Prevent BEC Attacks on Office 365 Users

Join this webinar as our cybersecurity expert explains how you can implement the FBI's recommendations to mitigate BEC scams. Learn more.


The War on Ransomware Continues: Tips and Best Practices with Veeam v11

In this webinar, we'll share the latest tips for beating ransomware by assessing the threatscape and steps you can take to protect your data. Learn more.


The Modern SOC and the optimization of Microsoft Security

Company exposure today can appear in many sizes and forms. As a business ecosystem expands so do the risks, whatever the size of the company. By using the latest thinking from Microsoft, BlueVoyant is helping customers optimize their Microsoft 365 E5 license. By working with an expert to unite the security tools from one manufacturer, you can not only save money, time and resources but concentrate on managing those risks that actually have the potential to disrupt your business. Learn more.


The Latest on the Microsoft 365 E5 Security Licensing Journey

Join BlueVoyant’s Director of Microsoft Security Solutions, Micah Heaton, as he recaps their M365 E5 license bundle conversation from last October and shares insights on announcements made at Microsoft Ignite around Endpoint Management, Information Protection, and Identity and Access Management. Learn more.


Remote Workforce & Digital Workplaces: Why Infrastructure Matters Even More

Join the editors of Redmondmag.com plus independent technology experts as they share their insights to guide you through the top tips you need to know when considering your infrastructure of a remote future. Learn more.

Duration: 1 hour


Transforming the Enterprise: The Remote Workforce and Digital Workplaces Summit

Join the editors of Redmondmag.com along with independent experts who will share their insights on what you need to do NOW to make sure your remote workforce and digital workplace is protected for the future. Learn more.

Duration: 3 hours


Security, Security and Security: The Top 3 Concerns of a Remote Workforce & Digital Workplaces

Hear from independent infosec experts and the editors of Redmondmag.com on the top security concerns you need to be concerned about now and the best practices you can implement to mitigate them. Learn more.

Duration: 1 hour


Solving the Insecurity of Education in the Remote Workforce Era

Join us for this webcast to learn how can educational institutions better manage the security of their remote workforce. Learn more.


Protect, Detect, and Respond to Supply Chain Cyber Attacks (e.g. Solarwinds) Using Splunk Enterprise Managed Security Services

Join this webcast for an in-depth discussion about the SolarWinds attack, and learn best practices and strategies to strengthen your defenses. Learn more.


Modern Best Practices for Cloud Data Protection, Collaboration & Compliance

Attend this session of our Modern Cloud Data Protection Summit and walk away with top tips and best practices around cloud data protection. Learn more.

Duration: 1 hour


What the SolarWinds Attacks Mean for Cloud Data Protection

In this timely session, Editorial Director Scott Bekker and security expert Ian Thornton-Trump will have a conversation about what cloud data protection requires in light of the revelations. Learn more.

Duration: 1 hour


Modern Cloud Data Protection Summit

Join the editors of Virtualization & Cloud Review and Redmondmag.com as they bring together experts in the cloud and Infosec world to make sure your data stays secure in your modern cloud infrastructure. Learn more.

Duration: 3 hours


Zscaler and Microsoft 365: Best-of-Breed Platforms Supercharge Digital Transformation

The definition of the workplace has fundamentally changed. Modern enterprises are transforming their applications and network stack to support the cloud-and-mobile-first reality of today. Learn more.


Expert Q&A: State of Office 365 Protection

Join Redmondmag.com Editorial Director Scott Bekker for this wide-ranging discussion with Microsoft MVP Matt McDermott and Dave Wallen about the state of Office 365 security. Learn more.


Ransomware Recovery: What to do if You're Hit and You Didn't Have a Plan

In this session, Cyber-Security Trainer and Pluralsight Author Dale Meredith will review the critical steps every organization should take after a data breach. Join us!

Duration: 1 hour


Ransomware 2021: What to Expect in the Year Ahead, from Malware Families to Payout Trends

In this session we will look at trends so far in 2021 and what to expect the rest of the year.  Join us!

Duration: 1 hour


Responding to Ransomware Virtual Summit

In this special editorial summit, experts gathered by Virtualization & Cloud Review look at what organizations can do once they're hit with ransomware. Join us!

Duration: 3 hours


Office 365, SharePoint & Data Protection: Top Tips for Protecting Your Enterprise

Join us for this editorial webcast to understand the unique data protection challenges in Office 365 and SharePoint, and come away with ideas for addressing them. Learn more.


Teams Data Protection — 8 Facts You NEED to Know!

Microsoft Teams is now the center of our productivity universe — but should you back it up? Learn more.


Top Do's and Don'ts of Enterprise Cloud Migration

In this session, you will learn about how to optimize costs, secure your cloud control plane and resources, and how to take advantage of the flexibility of the public cloud. Learn more.

Duration: 1 hour


Enterprise Cloud Migration Summit

Join us for this half-day summit brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com to learn how to get your enterprise safely cloud-enabled. Learn more.

Duration: 3 hours


Hyperconverged Infrastructure Summit

Join the editorial staff of Virtualization & Cloud Review and Redmondmag.com as well as independent experts for this half-day informational summit packed with real-world advice and insights you can't afford to miss! Learn more.

Duration: 3 hours


Understanding the True Benefits of Hyperconvergence

Join us in this seminar to find out about what HCI really is and why so many enterprises are moving to this new way of architecting their systems. Learn more.

Duration: 1 hour


HCI Best Practices 

Join us for the second session of our Hyperconverged Infrastructure Summit and you’ll leave with a solid understanding of the top things do (and not to do) when implementing HCI. Learn more.

Duration: 1 hour


Modern Best Practices for Cloud Backup and Recovery

Join the second session of our Cloud Backup and Recovery for 2021 Summit as Dave Kawula reviews his top tips to ensure your cloud backups are protected and recoverable.  Learn more.

Duration: 1 hour


Top Trends in Cloud Backup and Recovery

During this opening session of the "Cloud Backup and Recovery for 2021 Summit," we will examine some of the trends emerging around cloud-based backup and recovery, and how you can capitalize on those trends to support your enterprise backup and recovery efforts. Learn more.

Duration: 1 hours


Cloud Backup and Recovery for 2021

Join the editors of Redmondmag.com and Virtualization & Cloud Review to get up to speed with everything you need to know about Cloud Backup and Recovery in 2021. Learn more.

Duration: 3 hours


How to Secure Your Remote Workforce with a Microsoft-Powered Solution - Part 2

In this webinar, we'll discuss how using Microsoft Defender for Endpoint with Intune can help your organization improve its ability to identify and respond to risks. Learn more.


Re-Imagining Businesses With the Power of Digital

Join this webcast as we discuss a human-centric approach towards reimagining newer business models, the significance of data and how to lead successful digital business transformation. Learn more.


8-Step Framework for Tracking and Measuring Enterprise IAM Metrics

In this webinar, our IAM expert, Jay, will help you identify IAM metrics that align with your business needs, and show you how to track them effectively. Learn more.


Top 10 Security Features in Office 365/Microsoft 365

This session will look at the ten native Microsoft 365 security features that can make the biggest difference to your organization’s security. Join us!

Duration: 1 hour


What's New for Enterprises in Office 365 in 50 Minutes

Join this session as we will talk about what is new in Microsoft 365 and how you can stay up-to-date with this fast-paced and ever-evolving service. Join us!

Duration: 1 hour


What's New in Microsoft 365/Office 365 Summit

An expert-led dive into everything new that enterprises need to know about in Microsoft's Office 365 cloud productivity suite. Join us!

Duration: 3 hours


Combatting Rogue URL Tricks: How You Can Quickly Identify and Investigate the Latest Phishing Attacks

Join us for this webcast presented by KnowBe4 and find out what you need to know to keep your network protected. Learn more.


Microsoft Cloud App Security (MCAS): A Uniquely Integrated CASB Built for Today's SOC

Micah Heaton Director of Microsoft Security Services and John Wagner Sr. M365 Engineer from BlueVoyant will show you how Microsoft Cloud App Security (MCAS) is designed to take on this problem and then some. Learn more.


A CISO Debate: What's the Achilles Heel of Security in 2021?

Join the conversation with our panel of security experts as they challenge yesteryear's best practices and push towards a safer tomorrow. You'll hear from industry CISOs, each bringing unique perspectives, challenges, and solutions to the table. Learn more.


Expert Cloud Data Best Practices

In this practical, hands-on session, Microsoft MVP Tim Warner reviews the most important proven practices in cloud data security. Learn more.

Duration: 1 hour


Top IT Concerns for a Modern Cloud Infrastructure

This session looks at what you can do to avoid flying blind managing your IT cloud data infrastructure, including those who have already moved to public clouds, those in progress, and those starting their migration planning. Learn more.

Duration: 1 hour


2021 Cloud Best Practices Summit

Join this summit as our experts cover security, infrastructure, management and data trends that could affect cloud performance in 2021. Get the best practices you need for the year ahead. Learn more.

Duration: 3 hours


How to Combat Insider Threats in 2021

In this webcast you'll learn how an insider threat mitigation strategy can act as a powerful combatant to insider threats and how NIST provides a mapping of risk-based security controls which can help organizations create a blueprint for an insider threat program. Find out more.


Securing Microsoft Productivity and Collaboration Platforms

This webinar will focus on the need for identity and access management controls for productivity and collaboration tools in the Microsoft cloud. Learn more.


Azure Mistakes: Identifying the Common Problems that Cost Organizations the Most

Attend this webcast with Redmondmag.com to hear from the experts on ways to get the maximum value and potential out of your Azure spend. Learn more.


Expert Best Practices for Hardening Your Enterprise Hybrid Cloud Infrastructure

During this session, we will examine several best practices for hardening both and ensuring a hybrid cloud platform that is secure and resilient as possible. Learn more.


Seven Ways to Fail at Cloud Security

Let’s face the grim facts. The failure of digital transformation projects for many businesses has a myriad of reasons. Join Ian Thornton-Trump CD, as he presents his “seven evil samurai of cloud fail.” Learn more.


Enterprise Cloud Security Summit

Join us for this half-day summit where independent experts will make sure you're up-to-date on everything you need to know (and do) to prepare your cloud infrastructure to be secure against attacks in 2021. Learn more.


Achieving Zero Trust When Active Directory is In the Way

Zero Trust’s foundational “never trust, always verify” mantra is needed in today’s world filled with daily cyberattacks, successful breaches, increasingly costly ransomware attacks, and mounting compliance pressures. Learn more.


The 4 Pillars of Active Directory Security

In this session, 16X MVP Derek Melber will give you his view of how we need to address AD security, so that we are secure from point "A" to point "B". His four pillars of security approach will give you more than enough to think about, plus immediate action items that you can do when you get back to the office. Learn more.


Put Together a Ransomware Plan for 2021

Attend this special editorial webcast for an after-action report on what happened with ransomware in 2020, as well as best practices for defending against the most likely methods of attack in 2021. Come away from this session with a solid plan for ransomware remediation this year! Learn more.


Hottest Third-Party Cloud Data Products

Join Vice President of Web Becky Nagel as she walks you through a showcase of hot products and the chance to win a pair of high-end BOSE Noise Cancelling Headphones. Learn more.

Duration: 1 hour


Cloud Data in 2021: 10 Things You Need To Know

Join the editors of Virtualization & Cloud Review as well as world-renowned enterprise data architect, speaker and author Karen Lopez for this highly informative session where you'll get caught up to speed on the real-world best practices you need for your enterprise cloud data headed into 2021 (and beyond). Learn more.

Duration: 1 hour


AWS and Azure Backup and Recovery Best Practices

Join the editors of Virtualization & Cloud Review as well as architect, author, speaker and highly sought after cloud data and data expert Joey D'Antoni as he walks you through how to quickly recover your data in the cloud. Learn more.

Duration: 1 hour


Cloud Data Summit

Join the editors of Virtualization & Cloud review plus independent experts who will walk you through the best practices for you to manage, store, secure and restore your cloud-based data, whatever the service or configuration. Learn more.

Duration: 3 hours


How to Add the Cloud Into Your Backups

This engaging Webinar explores ways that organizations can incorporate the cloud into their backups, but without implementing radical changes to their data protection infrastructure, policies and operations. Learn more.


How to Secure Your Remote Workforce with a Microsoft-Powered Solution

Keeping your remote workforce and the company data they’re using secure can be an expensive and complicated undertaking. In this webinar you will learn how Microsoft is addressing the issue. Learn more.


Tackling Your Top IT Security Challenges (and Convincing Your C-Suite To Go Along!)

Cyber-security is a "top-down" approach, and with the speed at which technology is advancing, we need to make sure that our security profile is on the cutting edge and everyone is adhering to all the changes and challenges that appear daily. Learn more.


Pharma and Healthcare Needs Increased Active Directory Security

The increased attacks on Pharma and Healthcare has caused significant damage to the Covid research and even caused deaths. Core network security needs to be enhanced to reduce the successful attacks. Learn more.


Microsoft Security: Securing Financial Data in the Microsoft Cloud

Join BlueVoyant as we shine a spotlight on the unsung capabilities of Data Leakage Protection, discuss how to apply templatized protection schemes and examine why you no longer need to deploy an expensive classification and protection system for your on-prem and cloud-file repositories. Read on.


The Pesky Password Problem: Policies That Help You Gain the Upper Hand on the Bad Guys

Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, to find out what your password policy should be and learn about the common mistakes organizations make when creating password policy. Learn more


Transforming Collaboration: Making Teams Migrations Impactful

Teams has become such an integral part of most organizations today that it has 115 million daily active users. Learn more.


A Beginner’s Guide to Building a Secure Website

This webinar will teach you how to easily add secure login to your web apps so that you can save time and get right into building the core of your application. Learn more.


The Mess of 2020 and the World We Need in 2021 and Beyond

Join the editors of Redmondmag.com and Virtualization & Cloud Review plus a top security expert to find out the answers you need to know. Learn more.


2021: The Modern IT Infrastructure Summit

Join this summit to find out exactly how new technologies in the areas of cloud, backup and recovery and security and launch your enterprise forward in 2021, while keeping you secure and compliant. Learn more.


Backup and Recovery: Best Practices for Transforming Your Enterprise

Join the editors of Virtualization & Cloud Review as well as independent experts for top best practice insights that you can implement right away! Learn more.


2021: The Modern IT Infrastructure Summit

Join this summit to find out exactly how new technologies in the areas of cloud, backup and recovery and security and launch your enterprise forward in 2021, while keeping you secure and compliant. Learn more.


The New Enterprise Cloud Dynamic

Beyond the migration of workloads and applications from on-prem to the cloud, many enterprises have shifted the center of their IT operations to the cloud as well. Learn more.


Secrets to Delivering High Quality Software

Attend a1qa's workshop dedicated to gaining a competitive advantage in 2021 through high software product quality. Learn more.


Building DR in the Cloud Now with an Eye on the Future

Join us for this editorial webcast to get a better understanding of what your current DR decisions mean for the future of your organization. Learn more.


Beyond the Perimeter: Continuous Monitoring With NIST's Zero Trust Security Model

Join this webinar as our cybersecurity expert explains why organizations are rapidly adopting the Zero Trust security model, and how it can change the way you manage your network. Learn more.


How to Prepare for Office 365 License Renewal

If you want to become your Finance Director’s best friend via a strategic approach to Office 365 license renewal, make sure you tune in for this webinar. Learn more.


Unleash the Full Potential of Azure Sentinel, Leveraging the Security, Automation and Consistency Already Built Into Your Cloud Investment

See how to unleash the full potential of your Microsoft license leveraging the security, automation and consistency already built into your cloud investment. Learn more.


Microsoft 365 Security Solutions - What Can I Really Do With Them?

Join this webcast as we discuss the Microsoft 365 security journey and will explore how to accelerate internal adoption timelines for protecting user identity, devices, and data. Register now.

Duration: 1.5 hours


A Deep Dive Into How to Use Azure Sentinel

In this webinar, we'll get into the proverbial weeds to discuss several use cases around how to optimize and maximize the value of an Azure Sentinel deployment. Learn more.


SQL Backup and Recovery for Everyone

If you are not a database administrator, this doesn’t mean you can’t have amazing SQL Server backup and recovery. Learn more.


Hottest Third-Party Disaster Recovery Solutions

In this session the editors of Redmondmag.com and Virtualization & Cloud Review will guide you through some of the best solutions you'll want to implement now to be ready for 2021.  Learn more.


Expert Roundtable: Evolving Your Disaster Recovery Infrastructure for 2021

Do you have a modern disaster recovery plan that will ACTUALLY save your enterprise's operations and data? Join this session to find out. Learn more.


Ransomware in 50 Minutes: Top Current Threats & What Experts Expect in 2021

Join the editors of Virtualization & Cloud Review and Redmondmag.com along with independent Infosec experts to learn exactly what you need to know heading into 2021 about ongoing and upcoming ransomware threats. Learn more.


Disaster Recovery in 2021 Summit

Find out where disaster recovery is heading in 2021 in this information-packed half-day summit brought to you by the editors of Redmondmag.com and Virtualization & Cloud Review. Learn more.


Office 365 Tenant to Tenant migrations

In this webcast, we will discuss the essential questions that the admin will need to answer before heading into a tenant-to-tenant migration. Learn more.


Tips for Managing Security and Costs in a Post-COVID World

This webinar will outline how IT departments can proactively cut costs and increase efficiency all while maximizing security through quick win, high-impact projects and initiatives. Learn more.


Why Office 365 Backup Is ESSENTIAL for Remote Workers

Microsoft Office 365 enables your enterprise to efficiently work from home. With a massive influx of remote workers, businesses more than ever before are storing, sharing and accessing data within Microsoft Teams, OneDrive for Business, Exchange and SharePoint Online, and that data needs to be protected. See why in this webinar, brought to you by NewCloud Networks and Veeam. Learn more.


How to Move PST Files to Office 365

the need to move PST data to Office 365 and upgrade the user experience has never been greater. During this webinar you will learn how to locate all PST files on your network, what network and throughput considerations to plan for, and how to ensure happy end-user experience, both during and post-PST migration. Learn more!


Unleash Your Data and Drive Innovation Faster

This session will focus on how to provide a platform for data re-use, at the pace your need – taking what was once trapped data and unleash it to deliver new customer experiences, faster time to market, and more productive employees.  Learn more.


Meeting Enterprise Telephony Needs for Microsoft Teams via Direct Routing

Join this webinar on how to navigate Direct Routing and unleash the full potential of enterprise-grade communications to your Microsoft Teams users. Learn more.


Microsoft Sentinel & Managed SIEM Responsibilities in the Enterprise World

Join BlueVoyant’s Director of Microsoft Security Solutions, Micah Heaton, as he discusses the potential application of Azure Sentinel in your Microsoft cloud environments. He will explore how to accelerate internal adoption timelines for protecting user identity, devices, and data, and demonstrate a strategy for integration Azure Sentinel into your security posture. Read on.


Overcoming Your Top SharePoint Challenges

Join this webcast for a conversation about migrating content to Modern SharePoint from many different sources and the challenges they’ve helped organizations like yours overcome.


Data Protection Across Datacenters, Edges, and the Cloud

Join this webcast for a deep dive into five scenarios around protecting various parts of the Microsoft ecosystem.


Office 365 Security Checklist: Quick Steps You Can Take Now to Improve Your Security Posture

Join the editors of Redmondmag.com and independent security experts to guide you through exactly what you need to know to keep your enterprise installation of Office365 secure and compliant into 2021. Read on.

Duration: 3 hours


Deep Office 365 Insecurity: An Overview of Big Problems, Complex Threats and Dangerous Trends

Many administrators think Office 365 is totally self-securing, but that's not even close. Find out how to protect against even the biggest, most complex threats to an Office 365 environment. Learn more.

Duration: 3 hours


Top Tips for Protecting Active Directory Against Hackers

In this webcast, we will discuss common attack methods used to attain elevated privileges via Active Directory and ways to thwart malicious efforts using a live simulation of a Pass the Hash attack as an example. Learn more.


How HR/HCM Systems Play a Critical Role in IT Security

Join us for this live webcast to learn how HR/HCM systems play a key role in Identity and Access Management (IAM). Learn more.


Using Microsoft Teams To Transition Your Remote Workforce

Join this webcast and learn how to prepare for the next phase of “normalcy” by evaluating your return-to-office preparedness, enabling your conference rooms with Microsoft Teams and discovering the benefits of Microsoft Certified Cloud Video Interop. Learn more.


10 Best Practices for VM Backup

Proper protection and off-site solutions are essential for data availability. Learn more.


Scaling Efficiently in Multi-Cloud: A Half-day Virtual Summit

Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Join us for this half-day virtual summit to learn what you need to know now about efficiently scaling your multi-cloud environment. Find out more!

Duration: 3 hours


Scaling Efficiently in Multi-Cloud: A Half-day Virtual Summit

Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Join us for this half-day virtual summit to learn what you need to know now about efficiently scaling your multi-cloud environment. Find out more!

Duration: 3 hours


How the New Normal Puts New Strains on Azure Active Directory

Join us as we discuss the recent stresses placed on Azure Active Directory with its many dependencies on 20-year-old Active Directory technology. You'll get a sense of what Azure AD is doing well, and how Microsoft's technologies can be supplemented for maximum security and IT agility! Learn more.


Become Your Company's Security Hero!

Join this Webinar featuring industry experts who will show you how to become your company's security hero. You'll learn not only how to simplify and manage true endpoint security (even in this age of remote work!), but also how you'll be able to improve the company's bottom line. Read on.


The Microsoft 365 E5 Security Licensing Journey

Join us as we discuss the M365 security journey and explore how to accelerate adoption timelines for protecting user identity, devices, and data. Learn more.


Top 7 Cloud Security Attack Vectors Heading into 2021

In this special session, IT security expert Ian Thornton-Trump will take you on a tour of the near-term threats in the cloud for organizations. Learn more.


10 Things Every IT Manager MUST Know About Cloud Security

Join this session for a deeper look at just what IT managers need to know to truly assure optimum data and network security in the cloud. Learn more.


Expert Best Practices for Hardening Your Enterprise Hybrid Cloud Infrastructure

In this engaging session, IT consultant and architect John O'Neill Sr. will have a one-on-one conversation with Converge360 Editorial Director Scott Bekker about hardening hybrid cloud infrastructure in the enterprise. You'll learn about best practices, tricks to use, pitfalls to avoid and lots of other insights. Read on.


Security in the Cloud 2021

Brought to you by the editors of Redmondmag.com and Virtualization & Cloud Review, join us for this half-day summit where independent experts will make sure you're up-to-day on everything you need to know (and do) to prepare your cloud infrastructure to be secure against attacks in 2021. Learn more.

Duration: 3 hours


Minimizing Complexity and Sprawl with SharePoint and Microsoft 365, While Maximizing Potential in the Enterprise

Join us for this webcast featuring collaboration expert Christian Buckley as he walks you through the state of Microsoft's collaboration platforms, their respective challenges and the trajectories of their product roadmaps. Learn more.


HCI Makes Accelerating Your Apps a Breeze

Join us to learn how to simplify deploying NVMe in your environment to realize the performance benefits of the latest drive technology. Learn more.


5 AD Security Settings Most Admins Have Not Heard Of, But Attackers Leverage!

Everyone knows Active Directory! Unfortunately, the attackers often know it better! Learn which settings the attackers are leveraging to move laterally and gain privileges within your network. Learn more!


The Best Ways to Stop Malware and Ransomware That No One Else Will Tell You

Join Roger Grimes as he dives into the best ways to stop malware dead in its tracks using real-life methods no one else is talking about. Learn more.


How to Ensure Business Continuity for Remote Workers

Join us to learn how to correctly configure site-to-site or point-to-site VPN tunnels. Learn more.


Seizing the Castle: A Medieval Battle Technique Workshop

Join this webcast for an unconventional workshop where we'll chat about new and emerging cyberattacks without actually talking about "cyber" at all. Learn more.


Turn Over a New Leaf With a Future Proof Private and Hybrid Cloud Platform

Join this webinar to see how easy it is to make the move to HCI, build out your private cloud, and when you are ready, turn it all into a hybrid cloud. Learn more.


Top 5 Cloud Data Security Issues in 2020

During this session, we’ll examine five of the top cloud data security threats organizations must brace for these days, and cover some of the best practices and technologies that can help organizations ensure their cloud-based data is indeed secure. Learn more.

Duration: 1 hours


The New Cloud Data Model

In this session we examine the considerations, the criteria, and the concerns you must focus on when moving data into the cloud. Learn more.

Duration: 1 hour


Expert Best Practices for Cloud Data Management

In this webinar you will learn about common pitfalls organizations encounter when doing cloud data projects. Learn more.

Duration: 1 hours


The Enterprise Cloud Data Summit: Why Securing and Managing Your Cloud Data Is the Future of Your Enterprise

Join us for this free half-day summit brought to you by the editors of Virtualization & Cloud Review where our experts will address today’s most difficult challenges when securing and managing your enterprise cloud data. Learn more!

Duration: 3 hours


Identity-Centric Healthcare Security: Defending the First Responders

This webinar will cover the cybersecurity challenges unique to the healthcare industry and how COVID-19 has raised the stakes. Learn more.


Best Practices for Combining Your Virtual and Cloud Environments

Make sure you have your infrastructure not just under control but moving ahead! Join this free, half-day virtual summit where the editors of Virtualization & Cloud Review work with independent experts to give you real-world insights and advice you can use right away to tackle and conquer your biggest infrastructure challenges. Learn more.

Duration: 1 hour


Cloud & Virtualization Summit

Make sure you have your infrastructure not just under control but moving ahead! Join this free, half-day virtual summit where the editors of Virtualization & Cloud Review work with independent experts to give you real-world insights and advice you can use right away to tackle and conquer your biggest infrastructure challenges. Learn more.

Duration: 3 hours


Virtualization and Cloud Cost Considerations Heading into 2021

Don't miss this session brought to you by Virtualization & Cloud Review's editors and independent experts. They'll give you real-world insights and advice you can use right away to tackle and conquer your most critical cost challenges. Learn more.

Duration: 1 hour


Expert Advice: Best Practices for Modern Backup and Recovery

Join the editors of Virtualization & Cloud Review plus independent experts to gain in-depth knowledge about best practices for modern backup and recovery Learn more.

Duration: 1 hour


5 Steps to Perform Risk Assessment in Your Network

The first step to building an efficient security strategy is to perform risk assessment. Learn more.


Protecting Your Office 365 Data: Why, What, How, and Where?

Join this webcast about Office 365 data and learn why you need to protect it, what should you protect, and how can you leverage the Cloud correctly to ensure your Office 365 data is recoverable?


The Big Migration: Problems Caused by the Fast, Forced March to Remote Work

Join this session for an eye-opening exploration of the biggest problems and issues that organizations are encountering with their newly remote workforces. Learn more.


Architectural Options: An Overview of Different Ways to Enable Remote Work

Attend this session and understand your options for improving the agility and productivity of your remote workforce and ensuring that they're ready for whatever happens next. Learn more.


Best Practices for Getting Remote Workers to a 2.0 Productivity Experience

In this timely session, we look at the best IT practices that can give organizations the future-ready strategies to rapidly adapt to their organizations' needs and keep their workforces safe, engaged, and productive. Learn more.


Remote Work 2.0 Virtual Summit: Lessons Learned and Best Practices for Workforce Agility

This virtual summit from the editors of Redmondmag.com and Virtualization and Cloud Review looks at lessons learned from the big migration and best practices for ongoing and future workforce agility -- both for end users and IT staff. Find out ways to iterate your remote workers into a 2.0 environment.

Duration: 3 hours


Containers 103: How to Think about Costs with Containerized Apps

Attend this session and to gain a framework for thinking about overall enterprise container costs in various scenarios. Get all the details.


Containers 102: Kubernetes: Constructing Cloud Native and Vendor-neutral platforms

This session helps attendees understand what their enterprise container framework -- both software and hardware -- needs to look like to ensure maximum performance and minimal problems. Learn more!


Containers 101: What Are Containers and What Applications Are They Right (and Wrong) For?

This webcast provides attendees with a better understanding about which of their enterprise applications would benefit the most from a containerized approach. Learn more.


Virtual Summit: Guide to Getting Started with Enterprise Containers

Join us for the "Guide to Getting Started with Enterprise Containers," a half-day virtual event in which attendees will get a complete walk-through of everything they need to know about working with containers presented by true industry experts. Learn more.


Grappling with the Performance Challenges of a Multi-Cloud Approach

Cloud promises to offload a lot of the upkeep that leads to performance problems, but it can be trickier to isolate the issues when there is a problem. Join us for best practices and great tips for getting your multi-cloud environment under control. Learn more.


Securing a Multi-Cloud: Effective Approaches for Getting and Staying Secure

The more clouds you have, the more gaps exist between those clouds. Securing multiple clouds is tricky with multiple security models, different shared responsibility models and, of course, multiple sign-ins.


Corralling Costs in a Multi-Cloud Setting: Best Practices from the Experts

Organizations have many good reasons for using cloud offerings from Amazon, Microsoft, Google and others - all at the same time. Putting together a best of breed application environment where much or most of the infrastructure is someone else's responsibility is part of the appeal. But it can make it harder to control and even manage costs. Register today.


Getting Multi-Cloud Under Control: A Half-Day Summit

Usage and spending on multi-cloud was surging already when the pandemic, and its work-from-home imperatives, poured gasoline on the fire. Attend this half-day virtual summit to learn what you need to know now about getting multi-cloud under control. Learn more.


The Evolving Landscape of Data Management in Healthcare

How to imagine Security, Compliance, and Protection when everything is changing. Evolving technologies have been transforming healthcare delivery over the last decade, but now more than ever, the healthcare industry is being forced to evolve quickly. How should we be thinking about managing healthcare data?


SDN & SD-WAN: Why You Don't Want To Be Left Behind

Join us and hear from top independent experts on the true benefits that SDN and SD-WANs bring plus their top tips and insights for organizations still determining their software-defined strategy. Read on.


Hyperconvergence and Why It's Mandatory for 2021

Join us and learn from our independent experts who implement HCI on a daily basis on what the real benefits of HCI are, the limitations, plus best practices for getting started. Read on.


Hybrid Cloud Planning - Answers to the Most Important Questions

Find out why more and more enterprises are choosing to mix public and private clouds (as well as public cloud vendors). Get expert tips and best practices for implementation plus "gotchas" (including cost!) you need to watch out for. Read on!


The Future of IT Infrastructure Summit

From cloud to hyperconvergence, storage to software-defined networking, this one summit will cover what you need to know NOW about the future of infrastructure heading into 2021 and beyond. Learn more.


What Will it Take to Get You Into This Cloud? Examining Which of the Public Clouds is Easiest to Get Started With

When you make a decision to commit to a cloud, you bring legacy technologies, current professional experience and existing development models to the equation. Not every cloud is a cultural fit for every organization. What will it take to get you into this cloud? Learn more.


Tech Showdown: Azure, AWS or GCP? Which Cloud Platform Works Best for Your Enterprise Services?

Join us for this webcast to gain a sense of the conventional wisdom on the various strengths of Azure, AWS and GCP, as well as some insights into a few areas where that conventional wisdom is running slightly behind reality. Learn more.


Cost Shootout: Comparing the List Prices, Hidden Costs and Other IT Savings of the Major Public Cloud Platforms

Join us for part two of this free three-part event to understand how best to evaluate costs, capabililities and performance as major considerations when moving to the cloud. Register today.


Enterprise Cloud Wars Virtual Summit

Join independent industry experts from Virtualization & Cloud Review as they give you unvarnished insights on the pros and cons of all the top cloud platforms. We'll give you frameworks for evaluating your choices on everything from momentum to performance and technical considerations to critical questions of cost to deep insights about the cultural fit of certain cloud platforms to particular corporate or organizational cultures. Learn more.

Duration: 3 hours


All You Need to Know About National Institute of Standards and Technology's Password Policy Recommendations

In this webinar, ManageEngine's IT security expert will decode the NIST's recommendations for password security, and explain how you can easily implement them in your organization to bolster password security. Besides bolstering password security, the guidelines also help organizations meet regulatory compliance requirements such as HIPAA, and SOX.


Defining a Serverless Printing Infrastructure

This webinar will give IT decision-makers clarity around a modern printing infrastructure. By defining a serverless printing infrastructure IT professionals can architect future-proof printing. Learn more.


5-min demo: Data Security

Veeam Availability Suite 5-min Demo on Data Security. In mid-2018, the average ransomware payment was $41,198. By late-2019, that price more than doubled to $84,166. With modernized data protection, however, 96% of organizations cut their average ransomware recovery cost down to $5,000, with 76% of companies not paying anything at all. How? This demo shows how to protect your data with immutability from Veeam®.


5-min demo: Hybrid Cloud Acceleration

Veeam Availability Suite 5-min Demo on Hybrid Cloud Acceleration. The adoption of modern backup systems is driving rapid cloud adoption through the unification of tools — ensuring over 49% savings in hybrid cloud protection. This demo shows how to use native backup and recovery services straight from the cloud, reducing time, cost and resources.


5-min demo: Modernizing Backup

Veeam Availability Suite 5-min Demo on Backup Modernization. Through Cloud Data Management™, organizations are achieving substantial results, including 50% lower cost of data protection and backup, and higher productivity across development, backup and recovery teams. This demo shows how to re-use your backup data to drive rapid application development through virtual sandboxes.


Unleash the Power of NAS Backup

With the NEW Veeam® Backup & Replication™ v10, we bring the most powerful, reliable and easy-to-use file-level backup capabilities aimed at protecting your file shares.


Veeam Availability Suite v10 - Backup and Recovery capabilities you didn't know about

Your business is likely protecting data from and in any environment, including cloud, virtual and physical — but are you using the key capabilities needed to achieve your recovery and business agility goals? What about unstructured NAS data that is rapidly growing unchecked? When moving data off site — are your copies protected from things like ransomware?


Best Practices in Planning On-Prem and Cloud Backup

In this engaging, interactive webinar, we’ll look at the trends, issues and challenges of protecting a hybrid data center and provide best practices for what you can do to address them today. You’ll learn how to simplify your data protection strategy in the cloud and in the data center without compromise, all while removing complexity and cost.


Maximizing Your Hybrid Cloud Investment

The cloud has evolved from being a thorn in the side to IT to becoming a clear enabler of business. This on-demand webcast explores how IT professionals feel about using the cloud, both public and private. Don’t miss this opportunity for valuable, insightful data about cloud use from a broad spectrum of over 300 IT pros ― so you can see how your organization's use of cloud compares.


Protecting Microsoft Office 365 with NetVault

If you think your Office 365 data is automatically protected, think again. Sure, Microsoft may host the infrastructure, but it doesn’t offer the levels of data protection needed to satisfy your demanding data protection, disaster recovery and compliance goals. Watch this on-demand demo to see how NetVault delivers comprehensive Office 365 data protection.


Cloud Management Made Easy: Best Practices for Your Data-Driven Business

Adoption of the cloud continues to grow, yet despite its enormous advantages, the cloud also creates new challenges and pain points. For example, the more you explore and embrace different cloud services, the more costs increase. In addition, it becomes more difficult to keep track of workloads and services. And as you seek to modernize your applications via cloud-based containers, new management complexities arise.


Why Managing Containers Changes the Game for Cloud Applications

In this webcast, Peter Varhol of Technology Strategy Research, and Quest Foglight product designer Mike Condy, explore why teams are increasingly using containers, and what effect these decisions have on their operational strategies. They examine the uptake of containers as a development and deployment environment in the cloud, and how containers using Dockers and Kubernetes change application architectures for new applications.


Leave Nothing Behind: Cloud Migration Done Right

If you’re thinking about migrating workloads to AWS or Azure, do you know exactly what you’ll migrate, what you’ll leave on premises and what it’ll cost, now and in the future? Get full visibility into your cloud migrations and how migrations will affect your environment by listening Microsoft MVP Tim Warner, and Quest Software.


Best Practices in Office 365 Data Protection

Attend this webinar and learn about the gaps left by Microsoft’s Office 365 protection, the risks posed and how to overcome them all with a comprehensive 3rd-party data protection solution. Learn how to get the Office 365 backup and recovery strategy you need and want.


Making Veeam Backup & Replication Better

Join Greg Schulz, IT expert and founder of StorageIO, and Adrian Moir, Senior Consultant at Quest Data Protection, for an insightful and dynamic conversation about your evolving storage and backup requirements.


Fill the Gaps in Your Office 365 Data Protection

Microsoft Office 365 versioning, archiving and replication fall short from being able to deliver the data protection and recovery needs you require to meet both business SLAs and compliance requirements. Learn more.


Active Directory: Best Practices for Administration and Backup

Microsoft Active Directory is the basis for every Microsoft‑oriented networking environment. However, it’s not always a solid basis. With thousands of network environments under their belts, Sander Berkouwer (Microsoft MVP) and Veeam’s® Andrey Zhelezko know their Active Directory. Watch this webinar to benefit from their best practices.


3 Ultimate Strategies for Ransomware Prevention

Ransomware is here to stay. As much as no one likes to hear that, we have to admit that it’s no longer a question of ‘if’ but rather ‘when’ and ‘to what’ extent your business might be affected. Rather than hope it won’t get you, let’s explore all the options that exist to prevent, locate, disarm and mitigate ransomware risks. We’ll go over some essential strategies you can implement today and also review what a comprehensive backup software can offer you.


Public vs. Private vs. Hybrid: What Cloud to Use When and Why (or Why Not)

In this detail-rich session, our cloud architecture expert lays out some of the basic considerations and other concerns that organizations must account for in order to make the right decision about putting data and applications in the public cloud, in a private cloud or in a hybrid cloud. Learn more.

Duration: 1 hour


Enterprise Hybrid Cloud Virtual Summit

Join us for this free three-hour virtual event to introduce you to the state of the art and best practices for making the most of a hybrid cloud infrastructure. Key takeaways will include strategies and tactics for addressing top management issues and a framework for understanding the pros and cons of various configuration options. Learn more!

Duration: 3 hours


OnDemand Webcast - IT Decision Maker’s Guide To Office 365 Backup

Whether they have completely migrated to Office 365, or have a hybrid exchange and Office 365 deployment, a business’s objectives remain the same. Organizations must remain in control of their data, and with Veeam Backup for Microsoft Office 365 from NewCloud Networks, businesses can take control of their data instantly.


TLS and the Zero Trust Paradigm

Modern cyberattacks are not limited to just network intrusion from the outside. Learn more.


Office 365 Adoption: The “Dale Carnegie” Approach

Moving to Office 365 introduces a world of collaborative workloads - such as Teams, SharePoint Online, and OneDrive for Business - but driving user adoption of these new platforms can be a huge challenge, especially for larger organizations. Learn more.


Securing a Hybrid On-Premises/Cloud Directory: Guard Against Common Mistakes

Join this detail-rich session for expert advice on common mistakes, pitfalls, misconfigurations and misunderstandings that can lead to credential or system compromise and other serious security and compliance problems. Learn more!


Should Active Directory Go in the Cloud, Stay On-Premises or Both? What to Put Where, When and Why

Join us for this in-depth session, as our experts explore the advantages and disadvantages of having different parts of your identity and authentication infrastructure in different places -- on-premises, in the cloud or in both places at once. Learn more!


What's New in Active Directory and Azure AD: New Feature Round-Up

Join us for an expert view of which GA, public preview and private preview features are the ones to watch and implement. Learn more!


Active Directory & Azure AD Summit

Join us for this free three-hour virtual event to introduce you to the state of the art and best practices surrounding the use of Microsoft's power duo of directory technologies. Learn more!


The essential guide for physical and cloud data protection

Organizations have data in many different places that all must be made available and resilient. Physical systems and the cloud aren't exceptions from this requirement. Despite obvious differences, these types of environments are still much alike in terms of data protection and they demand a proper backup strategy. Luckily, Veeam has an answer to this challenge. Join this session where Andrew is going to showcase how Veeam Agents can play a major role in physical and cloud environments’ data Availability.


7 expert tips for multi-Cloud Data Management

Join Veeam®, Cisco and LinxDataCenter for a discussion on working in a multi-cloud environment and the challenges that go along this journey.

Duration: 1 hour


The Biggest IT challenge in 2020 is coming from the board room

Three out of four organizations have a “reality gap” between what business leaders expect from IT and what IT is geared to deliver. This session will examine the industry trends that are causing the gap, how those expectations are driving 2020 challenges and strategy, and give some ideas on how to close the gap from both a technical and an operational perspective. Watch now.

Duration: 1 hour


Intro - Veeam Predictions 2020

VeeamON Virtual provides the latest insights and predictions for Cloud Data Management. Veeam will highlight predictions that will remain top of mind for 2020, including ones that will affect the backup and Availability markets. Understanding these predictions and preparing for them ahead of time will allow organizations to enhance and optimize their Cloud Data Management practice. Watch now.

Duration: 1 hour


Flash-enabled Availability: Evolving beyond the backup

Introducing Flash-to-Flash-to-Cloud (F2F2C), a solution designed for the scale and use cases of modern data backup and protection. Together, with Pure Storage and Veeam® Backup & Replication™, this architecture provides significant improvements in recovery times.


Modernize your Data Center with Veeam Availability for Nutanix AHV

Veeam Availability for Nutanix AHV is an easy to use prism-like interface that gives you a possibility to look at snapshot jobs, do restores and recoveries, see job errors and more. Watch this video, which will walk you through the menu and interface, and get acquainted with all the functions and features of it.


AHV VeeamLive - The New Availability Standard for Nutanix AHV

In this episode Shawn Lieu, Jason Leiva, Ronn Martin and a special guest from Nutanix have discussed the NEW Veeam Availability for Nutanix AHV software solution that provides Nutanix AHV integration with Veeam Backup & Replication. This customer requested solution combines agentless AHV backups with Prism like management interface to deliver the world-class ease-of-use, reliability and Availability, that Veeam customers currently enjoy for VMware and Hyper-V environments.


Mission Availability: Restore to Azure and Azure stack in 2 steps

As more businesses look to move workloads to the cloud, they can encounter challenges and constraints with their current data management solutions. In fact, 47% of IT leaders are concerned that their cloud workloads are not as portable as intended. It is your mission as an IT guru to obtain workload portability in the cloud.


Mission Availability: Native data retention on Azure Blob

One thing is certain about data today — it’s growing exponentially. With this rapid increase of data created by organizations, it’s no surprise that challenges such as storage capacity and cost are starting to take hold. In addition, compliance requirements are requiring businesses to hold onto data for longer and longer. It is your mission to manage data growth, while also addressing compliance requirements.


The Security Risk in SSL/TLS Traffic: Architecting Visibility and Security Through Decryption

Nearly all commerce, communications, and data traffic going over the web is encrypted. As organizations transform operations, leverage more of the cloud, expanding locations, and utilizing remote workforces, IT’s lack of visibility into encrypted traffic puts the organization at risk for a cyberattack, data breach and compliance failures. Learn more.


Active Directory Security: Early Stage Attack Activities to Watch For

Join us at this webcast as we discuss two early stage attack activities: LDAP reconnaissance and Password Spraying – that allow attackers to map out the target infrastructure to plan out their attack and begin to take over accounts. Detection strategies and mitigation steps will also be explained. Sign up.

Duration: 1 hour


Stay Out of the Net: Your Ultimate Guide to Phishing Mitigation

Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, as he explores techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. Roger won't just cover one angle. He'll come at it from all angles! Read on.


Active Directory Security: Detecting Internal Attacks

In this webinar, MVP Derek Melber will guide you through how you can configure your SIEM to detect direct attacks and also improve your SIEM with technologies such as user behavior analytics. Find out more.


Ooops! Your AD is Encrypted…!

Don't let Active Directory fall victim to a cyber attack! When it comes to protecting your Active Directory, there is no room for error. In this On Demand Webcast , join Dale Meredith, cyber security expert as he explores ways to protect AD from cyber criminals. Watch now!


Leveraging Cloud-Based Object Storage as Part of a Modern Data Protection Strategy

In this discussion, Dave Russell Vice President of Enterprise Strategy of Veeam reviews the considerations for adopting cloud-based object storage and how to leverage cloud object storage for the best outcome. Learn more.


4 Best Practices for Azure Cloud Management

In this webinar, we'll offer you best practices and key trends to help you maximize the return on your Azure cloud investment and gain control of your scaling cloud infrastructure. Learn more.

Duration: 1 hour


The Future of Business Critical Asset Data and Analytics

In today’s competitive world, using new technology to set your business apart can make the difference between getting ahead or falling behind. But staying in control of the growing complexity is tough. Learn more.


Natural Disasters: Top Tips to Help IT Keep the Business Going

It's been said that North America has some of the wildest weather on Earth. With the summer months approaching, it's the season for thunderstorms, tornados, hurricanes, wildfires and floods. Is your business data prepared to weather any approaching storms? Learn more.


Shed On-Prem Identity Complexity in a Cloud-First World

The shift to the cloud always seems to focus on enhanced productivity for an organization overall. But cloud adoption also means IT must figure out how to integrate “all-things-cloud” with on-prem Active Directory. Learn more.

Duration: 1 hour


What Keeps IT Pros Like You Up at Night

When attempting to protect your organization, you’re being pulled in a million directions, trying to secure every possible attack vector. Learn more.

Duration: 1 hour


Ransomware Update: Biggest Emerging Risks, Aftermath of Recent Events & IT Best Practices

If there's one silver lining to the emergence of ransomware in the last few years, it's this -- it's brought into sharp relief how interrelated security, backup and recovery, disaster recovery, business continuity, training and organizational policies are in a solid defense strategy. Learn more.

Duration: 1 hour


Encryption for End Users: What IT Managers Need to Know

When it comes to end-user security, hard-drive encryption is a key pillar to consider for your security strategy. Yet while it adds a layer of security and can be required for compliance, it also adds some challenges and creates risks of accidental data loss on individual PCs. Learn more.

Duration: 1 hour


How to Accelerate Your Veeam Backups to Azure

Using your Veeam solution for backup and replication to the Microsoft Azure cloud is a great start, but did you know it’s possible to make it better and faster? Learn more.

Duration: 1 hour


How to Accelerate Your Veeam Backups to Azure

Using your Veeam solution for backup and replication to the Microsoft Azure cloud is a great start, but did you know it’s possible to make it better and faster? Read on.

Duration: 1 hour


The Extended Enterprise: Top 5 Things IT Must Know

Many organizations need to provide network access to their extended enterprise -- contractors, temp workers, partners, vendors, and others -- to effectively run their business. However, these users create unique challenges and introduce new cybersecurity risks. Join us to learn the top five questions IT must address to successfully manage the extended enterprise. Learn more.


Active Directory Migration Planning

Active Directory is the living heart of most IT organizations. No matter if your organization is on-premises, in the cloud, or in some hybrid situation somewhere in-between your on-premises Active Directory is most likely the most important part of your IT infrastructure. Read on.

Duration: 1 hour


10 Ways to Fail at Enterprise Data Protection in 2019

The data estate that organizations have to protect in 2019 is more complicated than ever. The old concept of a network perimeter is gone, bulldozed by cloud storage, Software as a Service applications, bring your own device practices, data on mobile phones and many employees who never really go off the clock no matter where they are. Learn more.

Duration: 1 hour


Top 5 Hybrid AD Management Mistakes and How to Avoid Them

While Hybrid messaging and collaboration with MS Office 365 offers compelling benefits to larger organizations and the enterprises, it comes with new security and compliance risks. Learn More.


What the California Consumer Privacy Act Means for IT Pros

Data privacy and data security have been among the hottest topics of 2018, mainly due to the GDPR, which came in force on May 25. However, 2018 also saw the signing of another important law, the California Consumer Privacy Act (CCPA). Although it has gotten a lot less press than the GDPR, it is nearly as sweeping, since it applies to all organizations that store the personal information of California residents. Learn more.

Duration: 1 hour


Citrix Virtual Tech Summit

As your environment grows more diverse—more clouds, more devices, more types of apps—you need a more efficient and secure approach to management. At this technical online event for hands-on IT leaders, we’ll discuss the building blocks of a modern digital workspace. Register now!

Duration: 1 Hour


The 3 Pillars of SharePoint Security

Many organizations purchase and implement software solutions based on factors like a rich feature set, a low price and an appealing user interface. Unfortunately, security issues are often pushed to the side or forgotten altogether. Consider SharePoint, Microsoft’s flagship collaboration platform. Learn more.

Duration: 1 Hour


The 3 Pillars of SharePoint Security

Many organizations purchase and implement software solutions based on factors like a rich feature set, a low price and an appealing user interface. Unfortunately, security issues are often pushed to the side or forgotten altogether. Consider SharePoint, Microsoft’s flagship collaboration platform. Learn more.

Duration: 1 Hour


How to Spend Your Security Budget in a DevOps World

In this session, Threat Stack Security Engineer, Mark Moore, and CFO, Kevin Durkin, will discuss the current state of security processes and investments as organizations shift to the cloud. Learn how to build a scalable security program that fits your organization’s budget. Join us on November 8th at 1pm ET! Sign up today!

Duration: 1 Hour


Gain Control Over Windows 10 Updates

There’s no doubt about it, Windows 10 upgrades have caused disruption across IT departments. Our team of Windows 10 specialists will share stories from the field and tips for successful management of Windows 10 in this technical discussion. We’ll highlight the latest best practices that every company should follow and explore the usability of unified endpoint management toolsets from VMware, Citrix, and Microsoft asking, “Do they really solve the need?”

Duration: 30 mIN


IT Security Horrors that Keep You Up at Night

One reason companies continue to get breached is that they are too focused on the wrong things. You lose sleep over the “shock and awe” security headlines in the news — while your executives and directors use a password of monkey123 without 2-factor authentication for their email. The good news is you can greatly increase the security of your network without spending thousands of dollars on shiny new boxes with pretty blinking lights!

Duration: 1 Hour


Accelerating Office 365 Adoption: Making the Cloud Less Cloudy

Join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Matthew Vinton from Quest Software as they discuss migrating to, management of, and securing of Office 365. Learn more.

Duration: 30 minutes


Top Nine Insider Attacks and How to Spot Them

In this live webcast, Quest experts Shawn Barker and Ghazwan Khairi will be introducing our brand new product Change Auditor Threat Detection — a powerful solution for proactively detecting anomalous behavior based on user activity. You will discover ways to minimize your insider threat risk. Learn more.

Duration: 1 Hour


Session 1 - The Human Factor: Malicious Insiders vs. Negligent End Users

Breaches resulting from insider misdeeds are front-page news on a regular basis. Unfortunately, the average employee misses a critical common thread across many these stories. It’s up to IT pros to understand the techniques attackers use, educate their users to avoid common traps, and take the necessary steps to avoid breaches. Learn more.

Duration: 1 Hour


Reduce Your Security and Compliance Risks with IT Asset Inventory Management

To minimize security and compliance risks, as well as reduce costs on under-utilized hardware and software, IT pros need to inventory all IT assets their organization has and track changes to them. If done manually, these tasks require hours of tedious work, so many organizations seek tools that streamline the process. Learn more.

Duration: 1 Hour


Align HR and IT to Streamline Employee Onboarding

Growing companies onboard 30 new employees, on average, each month. This is no small challenge for the HR and IT teams. Now is the time for onboarding processes that are automatic, efficient and secure. Learn more.

Duration: 1 Hour


Identity Management Key to IT Modernization

Enterprises are saddled with an IT architecture that has evolved organically over time. With the adoption of cloud and a drive to a more distributed workforce, IT is tasked with securely managing more users, on more devices, in more locations, and accessing more applications. The demands on IT are compounding quickly. And, limited staffing and budgets mean IT is constantly being asked to do more with less. Learn more.

Duration: 1 Hour


Netwrix Auditor – Data Discovery & Classification Edition

Meet the brand-new Netwrix Auditor – Data Discovery and Classification Edition, which provides complete visibility into where sensitive files are, what content is inside them, who can access the files and who actually uses them. Learn more!

Duration: 1 Hour


A Hacker Explains: How Attackers Exploit Office 365 Vulnerabilities

Office 365 has become the platform of choice for document collaboration and sharing. If you’re using Office 365 or planning to migrate there, understanding the types of security attacks you can expect is imperative. Microsoft provides tools for testing your end users by simulating some of the most common attacks, so you can educate them as part of your broader defense strategy. Learn more.

Duration: 1 Hour


The Role of Virtualization in the Hybrid Cloud Era

Join us on this webinar to learn how both on premises infrastructure and public cloud can play a role giving enterprise IT the freedom to leverage the best attributes of both by creating a hybrid cloud environment making the deployment and transition between environments simple and seamless. Learn more.


Five Expert Tips to Overcome Compliance Challenges

Regulatory compliance is one of the biggest challenges that IT pros face today, regardless of their organization’s location, size or industry. Although GDPR, PCI DSS, HIPAA, GLBA, CJIS and other compliance regulations focus on different things, the underlying objective is the same — securing the data. Register now!

Duration: 1 Hour


Netwrix Auditor Product Demo

See what the new Netwrix Auditor 9.6 has to offer, including how you can now classify and secure your data. Register today!

Duration: 1 Hour


Netwrix Auditor Product Demo

See what the new Netwrix Auditor 9.6 has to offer, including how you can now classify and secure your data. Register today!

Duration: 1 Hour


VIDEO: Optimize Your Connection to Oracle Cloud with Equinix

Learn how Oracle and Equinix help organizations to transform their business by integrating hybrid and multicloud environments to increase operational efficiency, enhance system processes, improve customer experiences and grow revenues. Learn more.

Duration: 1 Hour


VIDEO: Optimize Your Connection to Oracle Cloud with Equinix

Learn how Oracle and Equinix help organizations to transform their business by integrating hybrid and multicloud environments to increase operational efficiency, enhance system processes, improve customer experiences and grow revenues. Learn more.

Duration: 1 Hour


A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.


A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.


Netwrix Auditor Product Demo

In this technical webinar, we will guide you through the key functionality of Netwrix Auditor 9.5. You’ll learn how to use Netwrix Auditor more effectively to audit critical systems such as Active Directory, Windows file servers, Microsoft SQL Server and many more.

Duration: 1 Hour


Availability On-Premises, In The Cloud And On The Go with Veeam Agent for Microsoft Windows

Are you looking to find out more about avoiding downtime and data loss quickly and easily for Windows-based physical or public-cloud workloads? How can you bring more Availability to these workloads? Learn more.

Duration: 1 Hour


To The Cloud, From The Cloud, Within The Cloud

Learn from Mike Jones on what modern approaches exist to do what you want with your data in the cloud. Whether you are starting your cloud journey, already underway or not sure how to meet your technical and business requirements in a cloud-ready world, there is something for everyone on this webinar. Watch it now.

Duration: 1 Hour


Total Control and Protection of Email Data with Veeam Backup for Microsoft Office 365

Whether you have completely migrated to Microsoft Office 365, or have a hybrid exchange and Office 365 deployment, your business objectives remain the same. You must remain in control of your data and be able to backup and recover Microsoft Office 365 items at all times. Veeam® Backup for Microsoft Office 365 enables you to mitigate the risk of losing access to Office 365 email data and ensure Availability for users. Learn more.

Duration: 1 Hour


Availability Outside of the Data Center

Take a deep dive into how Veeam® Agents deliver Availability for Windows-based physical servers and Linux-based server instances. We’ll discuss how to meet RPOs and reduce the risk of data loss for laptops and tablets outside the corporate network. We will also discuss how you can solve key challenges like managing remote offices, offering Backup as a Service and Disaster Recovery as a Service, and more.

Duration: 1 Hour


How the Cloud Drives Availability and Data Protection

Data is to this century what oil was to the last century – a driver of massive growth and change. This is not just about technology, but also new ways of doing business. And yet, Availability and data protection are among the biggest challenges facing IT leaders today, particularly with the recent increases in cyberattacks, such as ransomware, which have affected companies of all sizes. Learn more.

Duration: 1 Hour


Hyper-V 2016: The Next Generation of Virtualization

Watch this interactive, demo-filled webinar that will provide all of the details on the largest announcements within Hyper-V 2016. Join Microsoft Cloud and Datacenter Management MVP, Clint Wyckoff, as he illustrates the pieces of Hyper-V 2016! Learn more.

Duration: 1 Hour


Security Configuration Management Best Practices

In this webinar, we’ll talk about some of the things you should be looking at when it comes to security configuration management. We’ll talk about some best practices, default tools used, as well as some very common misconfigurations that are seen in the “wild”, possibly even ones that you’ve configured!


Active Directory Deep-Dive: Top Issues, Tips and Gotchas from the Experts

Active Directory (AD) is the personnel file of Microsoft Windows—the library that manages password policy and access to enterprise resources like applications or devices. Learn more.