Securing IT Efficiencies and Cost Savings in a Post COVID World

This webinar will outline how IT departments can proactively cut costs and increase efficiency all while maximizing security through quick win, high-impact projects and initiatives. Learn more.

Date: 11/04/2020

Time: 11:00am

Why Office 365 Backup Is ESSENTIAL for Remote Workers

Microsoft Office 365 enables your enterprise to efficiently work from home. With a massive influx of remote workers, businesses more than ever before are storing, sharing and accessing data within Microsoft Teams, OneDrive for Business, Exchange and SharePoint Online, and that data needs to be protected. See why in this webinar, brought to you by NewCloud Networks and Veeam. Learn more.

Date: 11/04/2020

Time: 11:00am

Office 365 Tenant to Tenant migrations

In this webcast, we will discuss the essential questions that the admin will need to answer before heading into a tenant-to-tenant migration. Learn more.

Date: 11/05/2020

Time: 11:00am

Hottest Third-Party Disaster Recovery Solutions

In this session the editors of Redmondmag.com and Virtualization & Cloud Review will guide you through some of the best solutions you'll want to implement now to be ready for 2021.  Learn more.

Date: 11/06/2020

Time: 11:00am

Expert Roundtable: Evolving Your Disaster Recovery Infrastructure for 2021

Do you have a modern disaster recovery plan that will ACTUALLY save your enterprise's operations and data? Join this session to find out. Learn more.

Date: 11/06/2020

Time: 10:00am

Ransomware in 50 Minutes: Top Current Threats & What Experts Expect in 2021

Join the editors of Virtualization & Cloud Review and Redmondmag.com along with independent Infosec experts to learn exactly what you need to know heading into 2021 about ongoing and upcoming ransomware threats. Learn more.

Date: 11/06/2020

Time: 9:00am

Disaster Recovery in 2021 Summit

Find out where disaster recovery is heading in 2021 in this information-packed half-day summit brought to you by the editors of Redmondmag.com and Virtualization & Cloud Review. Learn more.

Date: 11/06/2020

Time: 9:00am

SQL Backup and Recovery for Everyone

If you are not a database administrator, this doesn’t mean you can’t have amazing SQL Server backup and recovery. Learn more.

Date: 11/10/2020

Time: 11:00am

Microsoft 365 Security Solutions - What Can I Really Do With Them?

Join this webcast as we discuss the Microsoft 365 security journey and will explore how to accelerate internal adoption timelines for protecting user identity, devices, and data. Register now.

Date: 11/18/2020

Time: 2:00pm

Duration: 1.5 hours

Unleash the Full Potential of Your Microsoft License, Leveraging the Security, Automation and Consistency Already Built Into Your Cloud Investment

See how to unleash the full potential of your Microsoft license leveraging the security, automation and consistency already built into your cloud investment. Learn more.

Date: 11/19/2020

Time: 11:00am

On Demand

How to Move PST Files to Office 365

the need to move PST data to Office 365 and upgrade the user experience has never been greater. During this webinar you will learn how to locate all PST files on your network, what network and throughput considerations to plan for, and how to ensure happy end-user experience, both during and post-PST migration. Learn more!

Unleash Your Data and Drive Innovation Faster

This session will focus on how to provide a platform for data re-use, at the pace your need – taking what was once trapped data and unleash it to deliver new customer experiences, faster time to market, and more productive employees.  Learn more.

Meeting Enterprise Telephony Needs for Microsoft Teams via Direct Routing

Join this webinar on how to navigate Direct Routing and unleash the full potential of enterprise-grade communications to your Microsoft Teams users. Learn more.

Microsoft Sentinel & Managed SIEM Responsibilities in the Enterprise World

Join BlueVoyant’s Director of Microsoft Security Solutions, Micah Heaton, as he discusses the potential application of Azure Sentinel in your Microsoft cloud environments. He will explore how to accelerate internal adoption timelines for protecting user identity, devices, and data, and demonstrate a strategy for integration Azure Sentinel into your security posture. Read on.

Overcoming Your Top SharePoint Challenges

Join this webcast for a conversation about migrating content to Modern SharePoint from many different sources and the challenges they’ve helped organizations like yours overcome.

Data Protection Across Datacenters, Edges, and the Cloud

Join this webcast for a deep dive into five scenarios around protecting various parts of the Microsoft ecosystem.

Office 365 Security Checklist: Quick Steps You Can Take Now to Improve Your Security Posture

Join the editors of Redmondmag.com and independent security experts to guide you through exactly what you need to know to keep your enterprise installation of Office365 secure and compliant into 2021. Read on.

Duration: 3 hours

Deep Office 365 Insecurity: An Overview of Big Problems, Complex Threats and Dangerous Trends

Many administrators think Office 365 is totally self-securing, but that's not even close. Find out how to protect against even the biggest, most complex threats to an Office 365 environment. Learn more.

Duration: 3 hours

Top Tips for Protecting Active Directory Against Hackers

In this webcast, we will discuss common attack methods used to attain elevated privileges via Active Directory and ways to thwart malicious efforts using a live simulation of a Pass the Hash attack as an example. Learn more.

How HR/HCM Systems Play a Critical Role in IT Security

Join us for this live webcast to learn how HR/HCM systems play a key role in Identity and Access Management (IAM). Learn more.

Using Microsoft Teams To Transition Your Remote Workforce

Join this webcast and learn how to prepare for the next phase of “normalcy” by evaluating your return-to-office preparedness, enabling your conference rooms with Microsoft Teams and discovering the benefits of Microsoft Certified Cloud Video Interop. Learn more.

10 Best Practices for VM Backup

Proper protection and off-site solutions are essential for data availability. Learn more.

Scaling Efficiently in Multi-Cloud: A Half-day Virtual Summit

Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Join us for this half-day virtual summit to learn what you need to know now about efficiently scaling your multi-cloud environment. Find out more!

Duration: 3 hours

Scaling Efficiently in Multi-Cloud: A Half-day Virtual Summit

Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Join us for this half-day virtual summit to learn what you need to know now about efficiently scaling your multi-cloud environment. Find out more!

Duration: 3 hours

How the New Normal Puts New Strains on Azure Active Directory

Join us as we discuss the recent stresses placed on Azure Active Directory with its many dependencies on 20-year-old Active Directory technology. You'll get a sense of what Azure AD is doing well, and how Microsoft's technologies can be supplemented for maximum security and IT agility! Learn more.

Group Policy Management - GPOADmin Demo

Cyberattacks are becoming more frequent and complex, with attackers looking for ways to advance their infiltration within your network. Group Policy provides a means for attackers to infect endpoints, reconfigure security, and take control of your Active Directory – and yet, it remains one of the least protected parts of your network. Watch this 30-minute demo where we'll cover how GPOADmin is a proxy-based administration and governance system for Group Policy.

Recovering Active Directory in a Hybrid World: Episode 4 - Recovering the unrecoverable – restoring all types of Office 365 groups.

Chances are at some point you will experience a scenario where all of your Office 365 Groups or security group data is deleted. Native tools cannot properly recover these groups, and the Recycle Bin only keeps Office 365 Groups for 30 days. With no Azure AD change log or comparison report to help you determine which users and Azure objects have been changed or deleted, recovery is impossible. Learn how to restore the points where the group was used, repair Synchronization Scope and restore and confirm the group is recovered. Join Episode Four.

Recovering Active Directory in a Hybrid World: Episode 3 - AD Disasters are Real – Do you have the insurance coverage you need?

It's a dangerous world out there –and getting worse by the day. By 2021 the costs associated with cybercrime is predicted to be $6 trillion annually. Global damage from ransomware is predicted to be $20 billion a year from now. So how do you protect yourself? You need to apply a complete backup and recovery strategy to recover from any AD disaster at the object and attribute level, the directory level and the OS level across the entire forest. Join Episode Three to learn how to ensure your on-prem and Azure AD remain safe and available.

Controlling the Cost of Office 365: The Viability in Visibility

Licensing Office 365 seems straightforward enough: have a user, buy a license. But over time that strategy begins to fail as organizations lack the visibility around who licenses are assigned to, are they being used, at what cost, and – in many cases – at what loss. This lack of visibility has the potential to cause overspend and underutilization; a recipe for a licensing fiasco. So, how do you gain the needed visibility to get licensing cost back under control?

This is no joke: What if your AD is wiped out completely?

Watch this on-demand webcast with IT Pro Today contributing editor Eric B. Rux and Quest® Product Manager Michael Keenan to learn how Quest Recovery Manager for Active Directory can reinforce your AD security and put your mind at ease.

Extra Vigilance: Top 3 Ways to Adapt Your Security Log Monitoring for the Surge in Working from Home

With the rapid increase of employees working from home, you will need to throw out your old baseline of normal audit activity – especially on the network plane. Users are working on insecure home networks and devices, and connecting to cloud collaboration tools more frequently, which means you need to beef up your security monitoring to adapt to the new risks. With cyber criminals trying to take advantage of all these changes, you’ll need to act fast.

Become Your Company's Security Hero!

Join this Webinar featuring industry experts who will show you how to become your company's security hero. You'll learn not only how to simplify and manage true endpoint security (even in this age of remote work!), but also how you'll be able to improve the company's bottom line. Read on.

The Microsoft 365 E5 Security Licensing Journey

Join us as we discuss the M365 security journey and explore how to accelerate adoption timelines for protecting user identity, devices, and data. Learn more.

Top 7 Cloud Security Attack Vectors Heading into 2021

In this special session, IT security expert Ian Thornton-Trump will take you on a tour of the near-term threats in the cloud for organizations. Learn more.

10 Things Every IT Manager MUST Know About Cloud Security

Join this session for a deeper look at just what IT managers need to know to truly assure optimum data and network security in the cloud. Learn more.

Expert Best Practices for Hardening Your Enterprise Hybrid Cloud Infrastructure

In this engaging session, IT consultant and architect John O'Neill Sr. will have a one-on-one conversation with Converge360 Editorial Director Scott Bekker about hardening hybrid cloud infrastructure in the enterprise. You'll learn about best practices, tricks to use, pitfalls to avoid and lots of other insights. Read on.

Security in the Cloud 2021

Brought to you by the editors of Redmondmag.com and Virtualization & Cloud Review, join us for this half-day summit where independent experts will make sure you're up-to-day on everything you need to know (and do) to prepare your cloud infrastructure to be secure against attacks in 2021. Learn more.

Duration: 3 hours

Minimizing Complexity and Sprawl with SharePoint and Microsoft 365, While Maximizing Potential in the Enterprise

Join us for this webcast featuring collaboration expert Christian Buckley as he walks you through the state of Microsoft's collaboration platforms, their respective challenges and the trajectories of their product roadmaps. Learn more.

HCI Makes Accelerating Your Apps a Breeze

Join us to learn how to simplify deploying NVMe in your environment to realize the performance benefits of the latest drive technology. Learn more.

5 AD Security Settings Most Admins Have Not Heard Of, But Attackers Leverage!

Everyone knows Active Directory! Unfortunately, the attackers often know it better! Learn which settings the attackers are leveraging to move laterally and gain privileges within your network. Learn more!

The Best Ways to Stop Malware and Ransomware That No One Else Will Tell You

Join Roger Grimes as he dives into the best ways to stop malware dead in its tracks using real-life methods no one else is talking about. Learn more.

How to Ensure Business Continuity for Remote Workers

Join us to learn how to correctly configure site-to-site or point-to-site VPN tunnels. Learn more.

Seizing the Castle: A Medieval Battle Technique Workshop

Join this webcast for an unconventional workshop where we'll chat about new and emerging cyberattacks without actually talking about "cyber" at all. Learn more.

Turn Over a New Leaf With a Future Proof Private and Hybrid Cloud Platform

Join this webinar to see how easy it is to make the move to HCI, build out your private cloud, and when you are ready, turn it all into a hybrid cloud. Learn more.

5 Technologies For Assured Data Recovery

Watch this webinar and demo to learn about 5 technologies that ensure you can recover data when you need to!

Top 5 Cloud Data Security Issues in 2020

During this session, we’ll examine five of the top cloud data security threats organizations must brace for these days, and cover some of the best practices and technologies that can help organizations ensure their cloud-based data is indeed secure. Learn more.

Duration: 1 hours

The New Cloud Data Model

In this session we examine the considerations, the criteria, and the concerns you must focus on when moving data into the cloud. Learn more.

Duration: 1 hour

Expert Best Practices for Cloud Data Management

In this webinar you will learn about common pitfalls organizations encounter when doing cloud data projects. Learn more.

Duration: 1 hours

The Enterprise Cloud Data Summit: Why Securing and Managing Your Cloud Data Is the Future of Your Enterprise

Join us for this free half-day summit brought to you by the editors of Virtualization & Cloud Review where our experts will address today’s most difficult challenges when securing and managing your enterprise cloud data. Learn more!

Duration: 3 hours

Identity-Centric Healthcare Security: Defending the First Responders

This webinar will cover the cybersecurity challenges unique to the healthcare industry and how COVID-19 has raised the stakes. Learn more.

Best Practices for Combining Your Virtual and Cloud Environments

Make sure you have your infrastructure not just under control but moving ahead! Join this free, half-day virtual summit where the editors of Virtualization & Cloud Review work with independent experts to give you real-world insights and advice you can use right away to tackle and conquer your biggest infrastructure challenges. Learn more.

Duration: 1 hour

Cloud & Virtualization Summit

Make sure you have your infrastructure not just under control but moving ahead! Join this free, half-day virtual summit where the editors of Virtualization & Cloud Review work with independent experts to give you real-world insights and advice you can use right away to tackle and conquer your biggest infrastructure challenges. Learn more.

Duration: 3 hours

Virtualization and Cloud Cost Considerations Heading into 2021

Don't miss this session brought to you by Virtualization & Cloud Review's editors and independent experts. They'll give you real-world insights and advice you can use right away to tackle and conquer your most critical cost challenges. Learn more.

Duration: 1 hour

Expert Advice: Best Practices for Modern Backup and Recovery

Join the editors of Virtualization & Cloud Review plus independent experts to gain in-depth knowledge about best practices for modern backup and recovery Learn more.

Duration: 1 hour

How to Run Your Datacenter When You Can't Get Into Your Datacenter

Are you working remotely and finding it impossible to manage your IT infrastructure? Learn more.

5 Steps to Perform Risk Assessment in Your Network

The first step to building an efficient security strategy is to perform risk assessment. Learn more.

Protecting Your Office 365 Data: Why, What, How, and Where?

Join this webcast about Office 365 data and learn why you need to protect it, what should you protect, and how can you leverage the Cloud correctly to ensure your Office 365 data is recoverable?

Threat-Centric Vulnerability Management - A Security Insights-based Approach

Vulnerability management is a standard security practice is traditionally viewed through the lens of IT operations. Learn more.

The Big Migration: Problems Caused by the Fast, Forced March to Remote Work

Join this session for an eye-opening exploration of the biggest problems and issues that organizations are encountering with their newly remote workforces. Learn more.

Architectural Options: An Overview of Different Ways to Enable Remote Work

Attend this session and understand your options for improving the agility and productivity of your remote workforce and ensuring that they're ready for whatever happens next. Learn more.

Best Practices for Getting Remote Workers to a 2.0 Productivity Experience

In this timely session, we look at the best IT practices that can give organizations the future-ready strategies to rapidly adapt to their organizations' needs and keep their workforces safe, engaged, and productive. Learn more.

Remote Work 2.0 Virtual Summit: Lessons Learned and Best Practices for Workforce Agility

This virtual summit from the editors of Redmondmag.com and Virtualization and Cloud Review looks at lessons learned from the big migration and best practices for ongoing and future workforce agility -- both for end users and IT staff. Find out ways to iterate your remote workers into a 2.0 environment.

Duration: 3 hours

Top Strategies for Remote Workforce Data Protection

Learn three easy-to-implement security layers every organization should utilize to protect a remote workforce and best practices for Office 365 backup. Learn more.

Containers 103: How to Think about Costs with Containerized Apps

Attend this session and to gain a framework for thinking about overall enterprise container costs in various scenarios. Get all the details.

Containers 102: Kubernetes: Constructing Cloud Native and Vendor-neutral platforms

This session helps attendees understand what their enterprise container framework -- both software and hardware -- needs to look like to ensure maximum performance and minimal problems. Learn more!

Containers 101: What Are Containers and What Applications Are They Right (and Wrong) For?

This webcast provides attendees with a better understanding about which of their enterprise applications would benefit the most from a containerized approach. Learn more.

Virtual Summit: Guide to Getting Started with Enterprise Containers

Join us for the "Guide to Getting Started with Enterprise Containers," a half-day virtual event in which attendees will get a complete walk-through of everything they need to know about working with containers presented by true industry experts. Learn more.

Optimizing the Data Center: The Key to MSP Profitability

How can MSPs improve profitability by accurately building and maintaining data center resources to cost-effectively support the services you offer? Learn more.

Grappling with the Performance Challenges of a Multi-Cloud Approach

Cloud promises to offload a lot of the upkeep that leads to performance problems, but it can be trickier to isolate the issues when there is a problem. Join us for best practices and great tips for getting your multi-cloud environment under control. Learn more.

Securing a Multi-Cloud: Effective Approaches for Getting and Staying Secure

The more clouds you have, the more gaps exist between those clouds. Securing multiple clouds is tricky with multiple security models, different shared responsibility models and, of course, multiple sign-ins.

Corralling Costs in a Multi-Cloud Setting: Best Practices from the Experts

Organizations have many good reasons for using cloud offerings from Amazon, Microsoft, Google and others - all at the same time. Putting together a best of breed application environment where much or most of the infrastructure is someone else's responsibility is part of the appeal. But it can make it harder to control and even manage costs. Register today.

Getting Multi-Cloud Under Control: A Half-Day Summit

Usage and spending on multi-cloud was surging already when the pandemic, and its work-from-home imperatives, poured gasoline on the fire. Attend this half-day virtual summit to learn what you need to know now about getting multi-cloud under control. Learn more.

Ransomware Prevention Kit

This kit provides a data protection perspective on the cybersecurity challenges found in today’s digital landscape and how modern backup best practices provide the ability to effectively prevent, detect and restore from a ransomware attack without ever having to give-in to a ransom.

The Evolving Landscape of Data Management in Healthcare

How to imagine Security, Compliance, and Protection when everything is changing. Evolving technologies have been transforming healthcare delivery over the last decade, but now more than ever, the healthcare industry is being forced to evolve quickly. How should we be thinking about managing healthcare data?

Extending Visibility and Response with Microsoft Azure Sentinel and BlueVoyant

In this webcast you will learn how BlueVoyant is partnering with Microsoft to deliver extended detection and response services to orchestrate and automate response actions to neutralize threats across your ecosystem. Learn now!

How Healthcare Organizations Can Mitigate Cybersecurity Threats and Operational Disruption

In recent months, there has been a sharp rise in cyberattacks on healthcare organizations as they scramble to respond to the pandemic. Learn more.

SDN & SD-WAN: Why You Don't Want To Be Left Behind

Join us and hear from top independent experts on the true benefits that SDN and SD-WANs bring plus their top tips and insights for organizations still determining their software-defined strategy. Read on.

Hyperconvergence and Why It's Mandatory for 2021

Join us and learn from our independent experts who implement HCI on a daily basis on what the real benefits of HCI are, the limitations, plus best practices for getting started. Read on.

Hybrid Cloud Planning - Answers to the Most Important Questions

Find out why more and more enterprises are choosing to mix public and private clouds (as well as public cloud vendors). Get expert tips and best practices for implementation plus "gotchas" (including cost!) you need to watch out for. Read on!

The Future of IT Infrastructure Summit

From cloud to hyperconvergence, storage to software-defined networking, this one summit will cover what you need to know NOW about the future of infrastructure heading into 2021 and beyond. Learn more.

What Will it Take to Get You Into This Cloud? Examining Which of the Public Clouds is Easiest to Get Started With

When you make a decision to commit to a cloud, you bring legacy technologies, current professional experience and existing development models to the equation. Not every cloud is a cultural fit for every organization. What will it take to get you into this cloud? Learn more.

Tech Showdown: Azure, AWS or GCP? Which Cloud Platform Works Best for Your Enterprise Services?

Join us for this webcast to gain a sense of the conventional wisdom on the various strengths of Azure, AWS and GCP, as well as some insights into a few areas where that conventional wisdom is running slightly behind reality. Learn more.

Cost Shootout: Comparing the List Prices, Hidden Costs and Other IT Savings of the Major Public Cloud Platforms

Join us for part two of this free three-part event to understand how best to evaluate costs, capabililities and performance as major considerations when moving to the cloud. Register today.

Enterprise Cloud Wars Virtual Summit

Join independent industry experts from Virtualization & Cloud Review as they give you unvarnished insights on the pros and cons of all the top cloud platforms. We'll give you frameworks for evaluating your choices on everything from momentum to performance and technical considerations to critical questions of cost to deep insights about the cultural fit of certain cloud platforms to particular corporate or organizational cultures. Learn more.

Duration: 3 hours

Windows Group Policy: Powerful Configuration Tool or Hacker’s Best Friend?

In this webinar, Darren Mar-Elia (aka the “GPOGuy”) will share some of the tactics he’s discovered attackers are using to exploit Group Policy, and show you easy ways that you can prevent and shut down its abuse. Learn more.

Simple, Yet Powerful NAS Backup for Every Business!

NAS devices today are widely used for applications, large unstructured data sets, and virtualization. Learn more.

Artificial Intelligence, Machine Learning and Cybersecurity

Join Wayne Chung, Chief Analytics Officer at BlueVoyant, former Research Scientist at NSA’s think tank and CTO for the FBI in this informative webinar on Artificial Intelligence and Machine Learning and its application in cybersecurity. Wayne will discuss the use of AI/ML analytics for malware identification, account takeover, insider threats, web exploitation attempts and more. Read on.

All You Need to Know About National Institute of Standards and Technology's Password Policy Recommendations

In this webinar, ManageEngine's IT security expert will decode the NIST's recommendations for password security, and explain how you can easily implement them in your organization to bolster password security. Besides bolstering password security, the guidelines also help organizations meet regulatory compliance requirements such as HIPAA, and SOX.

Protecting Group Policy: Under Attack and Under the Radar

Cyberattacks are increasing in frequency and sophistication at an alarming rate, with attackers looking for ways to advance their infiltration within your network by living off the land. Learn more.

5 Ways to Improve O365 Email Security: Reduce Costs and IT Complexity While Preemptively Blocking Cyberattacks

Join us to receive a deep, practical understanding of the methods cyber criminals use to skirt O365 layers like ATP and DMARC, as well as the immediate actions you can take to fortify O365 email security, while reducing IT complexity. Register now.

Defining a Serverless Printing Infrastructure

This webinar will give IT decision-makers clarity around a modern printing infrastructure. By defining a serverless printing infrastructure IT professionals can architect future-proof printing. Learn more.

Take Two Steps to Obtain Endpoint Compliance and Data Protection

Join us in this information-packed session in which industry expert Tim Warner and Quest Software's Jillian Salamon walk you through practical steps to achieve endpoint compliance and cure your IT management teams' headaches. Learn more.

Best Practices for a Successful Cloud Center of Excellence

This session will walk through a framework to help you benchmark your cloud management processes, identify areas for improvement, and maintain cross-functional alignment across cloud financial management, operations, and security and compliance. Learn more.

Sector-17: The State of Cybersecurity in the Legal Sector

This webinar will review the findings of the global analysis and provide helpful insight to law firms in specific and concerned organizations in general. Find out more.

10 Incredible Ways to Hack Email & How to Stop the Bad Guys

Join us as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. We will also share a special treat - a (pre-recorded) hacking demo by Kevin Mitnick. Learn more!

10 Incredible Ways to Hack Email & How to Stop the Bad Guys

Join us as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. We will also share a special treat - a (pre-recorded) hacking demo by Kevin Mitnick. Learn more!

How to Consolidate Multiple Office 365 Tenants

Office 365 tenant to tenant migrations present a host of challenges that can impact end-users, but these can be mitigated against with smart planning and execution. Join us to learn how! Find out more here.

5-min demo: Data Security

Veeam Availability Suite 5-min Demo on Data Security. In mid-2018, the average ransomware payment was $41,198. By late-2019, that price more than doubled to $84,166. With modernized data protection, however, 96% of organizations cut their average ransomware recovery cost down to $5,000, with 76% of companies not paying anything at all. How? This demo shows how to protect your data with immutability from Veeam®.

5-min demo: Hybrid Cloud Acceleration

Veeam Availability Suite 5-min Demo on Hybrid Cloud Acceleration. The adoption of modern backup systems is driving rapid cloud adoption through the unification of tools — ensuring over 49% savings in hybrid cloud protection. This demo shows how to use native backup and recovery services straight from the cloud, reducing time, cost and resources.

5-min demo: Modernizing Backup

Veeam Availability Suite 5-min Demo on Backup Modernization. Through Cloud Data Management™, organizations are achieving substantial results, including 50% lower cost of data protection and backup, and higher productivity across development, backup and recovery teams. This demo shows how to re-use your backup data to drive rapid application development through virtual sandboxes.

Going Remote: Architecting Cybersecurity for the Short Term AND the Long Term

In this webinar, you will hear how a leading cybersecurity services company shifted to an all-remote delivery model and how their experience can be used to inform decisions for your own organization. Learn more.

Remote Employees' Password Self-Service and Productivity Tracking

Jay Reddy our IAM strategist, hands-out must-haves and must-dos for effective password management and productivity tracking for remote working use cases. Learn more.

Maximizing the Return on Your Office 365 Licenses

In this webinar, we cover how your Office 365 licensing can perfectly align with the needs of your organization via a combination of continuous measurement, automation and delegation. Learn more.

The Dos and Don’ts of Recovering Active Directory from a Scorched Earth Disaster

In this technical workshop, you’ll learn the dos and don’ts of recovering AD from a cyber disaster, including recovering AD even if domain controllers are infected or wiped, restoring AD to alternate hardware and eliminating reinfection of malware from system state backups. Learn more.

Re-think Your Refresh! Your Applications Deserve Better

Join this session about modern applications and the need for modern infrastructure and data protection. Learn more.

Choosing the Appropriate Cybersecurity Assessment for Your Organization

This webinar aims to empower decision makers on cybersecurity assessment selection with simplified analogies to home inspection that are then developed into in-depth comparisons of external and internal vulnerability assessments, penetration tests, red teaming and specialized types of assessments including CMMC. Learn more.

Endpoint Backups: Now More Important than Ever

In the work-from-home era; it is now time to consider the need to backup endpoints when they are out of the data center. Learn more.

Top 5 Ways to Prepare for your next Microsoft 365 (Office 365) Tenant Migration

The moving of data in Office 365 (now Microsoft 365) between tenants, in some ways, is the easy part. Learn more.

The Business Impact of Data Protection

Data protection has now become the heart and soul of many organizations. It’s not just simply about backing up and restoring data but extending your capabilities to reuse and get the most from that data. Learn more.

Many Ways to Defeat Multi-Factor Authentication and How To Stop the Bad Guys

Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years of experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite MFA solution Learn more.

Unleash the Power of NAS Backup

With the NEW Veeam® Backup & Replication™ v10, we bring the most powerful, reliable and easy-to-use file-level backup capabilities aimed at protecting your file shares.

Veeam Availability Suite v10 - Backup and Recovery capabilities you didn't know about

Your business is likely protecting data from and in any environment, including cloud, virtual and physical — but are you using the key capabilities needed to achieve your recovery and business agility goals? What about unstructured NAS data that is rapidly growing unchecked? When moving data off site — are your copies protected from things like ransomware?

Best Practices in Planning On-Prem and Cloud Backup

In this engaging, interactive webinar, we’ll look at the trends, issues and challenges of protecting a hybrid data center and provide best practices for what you can do to address them today. You’ll learn how to simplify your data protection strategy in the cloud and in the data center without compromise, all while removing complexity and cost.

Maximizing Your Hybrid Cloud Investment

The cloud has evolved from being a thorn in the side to IT to becoming a clear enabler of business. This on-demand webcast explores how IT professionals feel about using the cloud, both public and private. Don’t miss this opportunity for valuable, insightful data about cloud use from a broad spectrum of over 300 IT pros ― so you can see how your organization's use of cloud compares.

Protecting Microsoft Office 365 with NetVault

If you think your Office 365 data is automatically protected, think again. Sure, Microsoft may host the infrastructure, but it doesn’t offer the levels of data protection needed to satisfy your demanding data protection, disaster recovery and compliance goals. Watch this on-demand demo to see how NetVault delivers comprehensive Office 365 data protection.

Cloud Management Made Easy: Best Practices for Your Data-Driven Business

Adoption of the cloud continues to grow, yet despite its enormous advantages, the cloud also creates new challenges and pain points. For example, the more you explore and embrace different cloud services, the more costs increase. In addition, it becomes more difficult to keep track of workloads and services. And as you seek to modernize your applications via cloud-based containers, new management complexities arise.

Why Managing Containers Changes the Game for Cloud Applications

In this webcast, Peter Varhol of Technology Strategy Research, and Quest Foglight product designer Mike Condy, explore why teams are increasingly using containers, and what effect these decisions have on their operational strategies. They examine the uptake of containers as a development and deployment environment in the cloud, and how containers using Dockers and Kubernetes change application architectures for new applications.

Leave Nothing Behind: Cloud Migration Done Right

If you’re thinking about migrating workloads to AWS or Azure, do you know exactly what you’ll migrate, what you’ll leave on premises and what it’ll cost, now and in the future? Get full visibility into your cloud migrations and how migrations will affect your environment by listening Microsoft MVP Tim Warner, and Quest Software.

Best Practices in Office 365 Data Protection

Attend this webinar and learn about the gaps left by Microsoft’s Office 365 protection, the risks posed and how to overcome them all with a comprehensive 3rd-party data protection solution. Learn how to get the Office 365 backup and recovery strategy you need and want.

Making Veeam Backup & Replication Better

Join Greg Schulz, IT expert and founder of StorageIO, and Adrian Moir, Senior Consultant at Quest Data Protection, for an insightful and dynamic conversation about your evolving storage and backup requirements.

More Effective Cybersecurity: The Practical Application of The MITRE ATT&CK Framework

In this webinar, Mike Scutt delves deeply into the MITRE ATT&CK framework, discusses its implications for Security Teams and shares how to implement it. Learn more.

Ransomware vs. Active Directory Backups: What Can Throw a Wrench into Your Disaster Recovery Process?

In a cyber disaster, you must recover Active Directory before you can recover your business. But only one in five organizations have a tested plan in place for recovering AD after a cyberattack. This is alarming given the spike of ransomware attacks and the widespread impact of an AD outage. Learn more!

Optimizing the Office 365 Experience When Everyone’s at Home

As more and more individuals are working from home, IT organizations need to learn how to address bandwidth constraints, lack of corporate security safeguards, and cybercriminals looking to take advantage of the situation while still looking to deliver a fast, consistent, and secure Office 365 experience. Learn more.

Duration: 1 hour

Fill the Gaps in Your Office 365 Data Protection

Microsoft Office 365 versioning, archiving and replication fall short from being able to deliver the data protection and recovery needs you require to meet both business SLAs and compliance requirements. Learn more.

Database Migration to Azure: Which Option to Choose, and Why

Join Microsoft MVP Tim Warner and SolarWinds to understand how Microsoft Azure supports the infrastructure-as-a-service (IaaS) and Database-as-a-service (DBaaS) deployment models, and what questions you need to answer before you undertake your database migration journey. Learn more!

Duration: 1 hour

Reducing Reliance on AD as You Move to the Cloud

While on-prem AD infrastructure ages, many companies are looking to reduce their AD footprint as they are moving to more and more cloud services. Learn more.

Securing Active Directory: Proactively Detecting Attacks & Attack Pathways

Active Directory is seasoned and well known. Unfortunately, the security set at install, 15 years ago, is still weak. However, the attackers are using these attack pathways to move laterally and gain privileged access in AD. Let 15-time Microsoft MVP, Derek Melber, show you how to detect hidden misconfigurations, attacks, and even do threat hunting. Don’t miss this opportunity to secure your most essential identity and access control: AD. Learn more.

Securing Privileged Remote Access When Everything’s Insecure

We’ve quickly shifted to a world where even the most privileged IT admins need to connect using devices and network connections that may be anything but secure. Learn more.

Controlling the Cost of Office 365: The Viability in Visibility

Licensing Office 365 seems straightforward enough: have a user, buy a license. Learn more.

Cyber CSI: Learn How to Forensically Examine Phishing Emails to Better Protect Your Organization Today

In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will show you how to become a digital private investigator and get inside the mind of the hacker, learn their techniques, and how to spot phishing attempts before it’s too late! Learn more.

Active Directory: Best Practices for Administration and Backup

Microsoft Active Directory is the basis for every Microsoft‑oriented networking environment. However, it’s not always a solid basis. With thousands of network environments under their belts, Sander Berkouwer (Microsoft MVP) and Veeam’s® Andrey Zhelezko know their Active Directory. Watch this webinar to benefit from their best practices.

3 Ultimate Strategies for Ransomware Prevention

Ransomware is here to stay. As much as no one likes to hear that, we have to admit that it’s no longer a question of ‘if’ but rather ‘when’ and ‘to what’ extent your business might be affected. Rather than hope it won’t get you, let’s explore all the options that exist to prevent, locate, disarm and mitigate ransomware risks. We’ll go over some essential strategies you can implement today and also review what a comprehensive backup software can offer you.

Attacking & Defending Active Directory Workshop

In this workshop, we’ll demonstrate real-world attacks used against Active Directory, including credential theft, Kerberos-based attacks, Group Policy-based attacks, and ACL attacks. This is a red vs. blue standoff, so don’t expect a bunch of slideware. Read on!

Modernize Your BC/DR on a Back-to-School Budget

Unitrends has long empowered SLED institutions to achieve robust data protection without unnecessary complexity. Join a Unitrends specialist as we discuss how SLED organizations leverage their platform to break down silos and deliver rapid ROI. Learn more!

Public vs. Private vs. Hybrid: What Cloud to Use When and Why (or Why Not)

In this detail-rich session, our cloud architecture expert lays out some of the basic considerations and other concerns that organizations must account for in order to make the right decision about putting data and applications in the public cloud, in a private cloud or in a hybrid cloud. Learn more.

Duration: 1 hour

Enterprise Hybrid Cloud Virtual Summit

Join us for this free three-hour virtual event to introduce you to the state of the art and best practices for making the most of a hybrid cloud infrastructure. Key takeaways will include strategies and tactics for addressing top management issues and a framework for understanding the pros and cons of various configuration options. Learn more!

Duration: 3 hours

[COVID-19] WFH Essentials for IAM Administrators. Must-Haves and Must-Dos.

Learn from our IAM experts, how we at Zoho Corporation successfully implemented WFH for our 10,000 strong workforce. You'll also learn how you can simplify identity and access management for teleworkers to ensure business continuity. Read on.

OnDemand Webcast - IT Decision Maker’s Guide To Office 365 Backup

Whether they have completely migrated to Office 365, or have a hybrid exchange and Office 365 deployment, a business’s objectives remain the same. Organizations must remain in control of their data, and with Veeam Backup for Microsoft Office 365 from NewCloud Networks, businesses can take control of their data instantly.

TLS and the Zero Trust Paradigm

Modern cyberattacks are not limited to just network intrusion from the outside. Learn more.

Achieve Endpoint Compliance in 2 Easy Steps

Today’s IT professionals face enormous challenges in securing and meeting compliance regulations. Learn more.

Office 365 Adoption: The “Dale Carnegie” Approach

Moving to Office 365 introduces a world of collaborative workloads - such as Teams, SharePoint Online, and OneDrive for Business - but driving user adoption of these new platforms can be a huge challenge, especially for larger organizations. Learn more.

IT Management Strategies to Optimize Productivity with Windows 10

The modern workplace puts pressure on IT management in unprecedented ways. People expect to be connected and productive anywhere, at any time, and from their preferred device. Learn how one IT Director efficiently manages 40 hardware models with one Windows 10 image. Watch now!

Duration: 30 minutes

Securing a Hybrid On-Premises/Cloud Directory: Guard Against Common Mistakes

Join this detail-rich session for expert advice on common mistakes, pitfalls, misconfigurations and misunderstandings that can lead to credential or system compromise and other serious security and compliance problems. Learn more!

Should Active Directory Go in the Cloud, Stay On-Premises or Both? What to Put Where, When and Why

Join us for this in-depth session, as our experts explore the advantages and disadvantages of having different parts of your identity and authentication infrastructure in different places -- on-premises, in the cloud or in both places at once. Learn more!

What's New in Active Directory and Azure AD: New Feature Round-Up

Join us for an expert view of which GA, public preview and private preview features are the ones to watch and implement. Learn more!

Active Directory & Azure AD Summit

Join us for this free three-hour virtual event to introduce you to the state of the art and best practices surrounding the use of Microsoft's power duo of directory technologies. Learn more!

The essential guide for physical and cloud data protection

Organizations have data in many different places that all must be made available and resilient. Physical systems and the cloud aren't exceptions from this requirement. Despite obvious differences, these types of environments are still much alike in terms of data protection and they demand a proper backup strategy. Luckily, Veeam has an answer to this challenge. Join this session where Andrew is going to showcase how Veeam Agents can play a major role in physical and cloud environments’ data Availability.

7 expert tips for multi-Cloud Data Management

Join Veeam®, Cisco and LinxDataCenter for a discussion on working in a multi-cloud environment and the challenges that go along this journey.

Duration: 1 hour

The Biggest IT challenge in 2020 is coming from the board room

Three out of four organizations have a “reality gap” between what business leaders expect from IT and what IT is geared to deliver. This session will examine the industry trends that are causing the gap, how those expectations are driving 2020 challenges and strategy, and give some ideas on how to close the gap from both a technical and an operational perspective. Watch now.

Duration: 1 hour

Intro - Veeam Predictions 2020

VeeamON Virtual provides the latest insights and predictions for Cloud Data Management. Veeam will highlight predictions that will remain top of mind for 2020, including ones that will affect the backup and Availability markets. Understanding these predictions and preparing for them ahead of time will allow organizations to enhance and optimize their Cloud Data Management practice. Watch now.

Duration: 1 hour

Flash-enabled Availability: Evolving beyond the backup

Introducing Flash-to-Flash-to-Cloud (F2F2C), a solution designed for the scale and use cases of modern data backup and protection. Together, with Pure Storage and Veeam® Backup & Replication™, this architecture provides significant improvements in recovery times.

Modernize your Data Center with Veeam Availability for Nutanix AHV

Veeam Availability for Nutanix AHV is an easy to use prism-like interface that gives you a possibility to look at snapshot jobs, do restores and recoveries, see job errors and more. Watch this video, which will walk you through the menu and interface, and get acquainted with all the functions and features of it.

AHV VeeamLive - The New Availability Standard for Nutanix AHV

In this episode Shawn Lieu, Jason Leiva, Ronn Martin and a special guest from Nutanix have discussed the NEW Veeam Availability for Nutanix AHV software solution that provides Nutanix AHV integration with Veeam Backup & Replication. This customer requested solution combines agentless AHV backups with Prism like management interface to deliver the world-class ease-of-use, reliability and Availability, that Veeam customers currently enjoy for VMware and Hyper-V environments.

Mission Availability: Restore to Azure and Azure stack in 2 steps

As more businesses look to move workloads to the cloud, they can encounter challenges and constraints with their current data management solutions. In fact, 47% of IT leaders are concerned that their cloud workloads are not as portable as intended. It is your mission as an IT guru to obtain workload portability in the cloud.

Mission Availability: Native data retention on Azure Blob

One thing is certain about data today — it’s growing exponentially. With this rapid increase of data created by organizations, it’s no surprise that challenges such as storage capacity and cost are starting to take hold. In addition, compliance requirements are requiring businesses to hold onto data for longer and longer. It is your mission to manage data growth, while also addressing compliance requirements.

The Security Risk in SSL/TLS Traffic: Architecting Visibility and Security Through Decryption

Nearly all commerce, communications, and data traffic going over the web is encrypted. As organizations transform operations, leverage more of the cloud, expanding locations, and utilizing remote workforces, IT’s lack of visibility into encrypted traffic puts the organization at risk for a cyberattack, data breach and compliance failures. Learn more.

Active Directory Security: Early Stage Attack Activities to Watch For

Join us at this webcast as we discuss two early stage attack activities: LDAP reconnaissance and Password Spraying – that allow attackers to map out the target infrastructure to plan out their attack and begin to take over accounts. Detection strategies and mitigation steps will also be explained. Sign up.

Duration: 1 hour

Stay Out of the Net: Your Ultimate Guide to Phishing Mitigation

Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, as he explores techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. Roger won't just cover one angle. He'll come at it from all angles! Read on.

Active Directory Security: Detecting Internal Attacks

In this webinar, MVP Derek Melber will guide you through how you can configure your SIEM to detect direct attacks and also improve your SIEM with technologies such as user behavior analytics. Find out more.

Ooops! Your AD is Encrypted…!

Don't let Active Directory fall victim to a cyber attack! When it comes to protecting your Active Directory, there is no room for error. In this On Demand Webcast , join Dale Meredith, cyber security expert as he explores ways to protect AD from cyber criminals. Watch now!

Leveraging Cloud-Based Object Storage as Part of a Modern Data Protection Strategy

In this discussion, Dave Russell Vice President of Enterprise Strategy of Veeam reviews the considerations for adopting cloud-based object storage and how to leverage cloud object storage for the best outcome. Learn more.

4 Best Practices for Azure Cloud Management

In this webinar, we'll offer you best practices and key trends to help you maximize the return on your Azure cloud investment and gain control of your scaling cloud infrastructure. Learn more.

Duration: 1 hour

The Future of Business Critical Asset Data and Analytics

In today’s competitive world, using new technology to set your business apart can make the difference between getting ahead or falling behind. But staying in control of the growing complexity is tough. Learn more.

Natural Disasters: Top Tips to Help IT Keep the Business Going

It's been said that North America has some of the wildest weather on Earth. With the summer months approaching, it's the season for thunderstorms, tornados, hurricanes, wildfires and floods. Is your business data prepared to weather any approaching storms? Learn more.

Shed On-Prem Identity Complexity in a Cloud-First World

The shift to the cloud always seems to focus on enhanced productivity for an organization overall. But cloud adoption also means IT must figure out how to integrate “all-things-cloud” with on-prem Active Directory. Learn more.

Duration: 1 hour

What Keeps IT Pros Like You Up at Night

When attempting to protect your organization, you’re being pulled in a million directions, trying to secure every possible attack vector. Learn more.

Duration: 1 hour

Ransomware Update: Biggest Emerging Risks, Aftermath of Recent Events & IT Best Practices

If there's one silver lining to the emergence of ransomware in the last few years, it's this -- it's brought into sharp relief how interrelated security, backup and recovery, disaster recovery, business continuity, training and organizational policies are in a solid defense strategy. Learn more.

Duration: 1 hour

Encryption for End Users: What IT Managers Need to Know

When it comes to end-user security, hard-drive encryption is a key pillar to consider for your security strategy. Yet while it adds a layer of security and can be required for compliance, it also adds some challenges and creates risks of accidental data loss on individual PCs. Learn more.

Duration: 1 hour

How to Accelerate Your Veeam Backups to Azure

Using your Veeam solution for backup and replication to the Microsoft Azure cloud is a great start, but did you know it’s possible to make it better and faster? Learn more.

Duration: 1 hour

How to Accelerate Your Veeam Backups to Azure

Using your Veeam solution for backup and replication to the Microsoft Azure cloud is a great start, but did you know it’s possible to make it better and faster? Read on.

Duration: 1 hour

The Extended Enterprise: Top 5 Things IT Must Know

Many organizations need to provide network access to their extended enterprise -- contractors, temp workers, partners, vendors, and others -- to effectively run their business. However, these users create unique challenges and introduce new cybersecurity risks. Join us to learn the top five questions IT must address to successfully manage the extended enterprise. Learn more.

Active Directory Migration Planning

Active Directory is the living heart of most IT organizations. No matter if your organization is on-premises, in the cloud, or in some hybrid situation somewhere in-between your on-premises Active Directory is most likely the most important part of your IT infrastructure. Read on.

Duration: 1 hour

10 Ways to Fail at Enterprise Data Protection in 2019

The data estate that organizations have to protect in 2019 is more complicated than ever. The old concept of a network perimeter is gone, bulldozed by cloud storage, Software as a Service applications, bring your own device practices, data on mobile phones and many employees who never really go off the clock no matter where they are. Learn more.

Duration: 1 hour

Top 5 Hybrid AD Management Mistakes and How to Avoid Them

While Hybrid messaging and collaboration with MS Office 365 offers compelling benefits to larger organizations and the enterprises, it comes with new security and compliance risks. Learn More.

What the California Consumer Privacy Act Means for IT Pros

Data privacy and data security have been among the hottest topics of 2018, mainly due to the GDPR, which came in force on May 25. However, 2018 also saw the signing of another important law, the California Consumer Privacy Act (CCPA). Although it has gotten a lot less press than the GDPR, it is nearly as sweeping, since it applies to all organizations that store the personal information of California residents. Learn more.

Duration: 1 hour

Citrix Virtual Tech Summit

As your environment grows more diverse—more clouds, more devices, more types of apps—you need a more efficient and secure approach to management. At this technical online event for hands-on IT leaders, we’ll discuss the building blocks of a modern digital workspace. Register now!

Duration: 1 Hour

The 3 Pillars of SharePoint Security

Many organizations purchase and implement software solutions based on factors like a rich feature set, a low price and an appealing user interface. Unfortunately, security issues are often pushed to the side or forgotten altogether. Consider SharePoint, Microsoft’s flagship collaboration platform. Learn more.

Duration: 1 Hour

The 3 Pillars of SharePoint Security

Many organizations purchase and implement software solutions based on factors like a rich feature set, a low price and an appealing user interface. Unfortunately, security issues are often pushed to the side or forgotten altogether. Consider SharePoint, Microsoft’s flagship collaboration platform. Learn more.

Duration: 1 Hour

How to Spend Your Security Budget in a DevOps World

In this session, Threat Stack Security Engineer, Mark Moore, and CFO, Kevin Durkin, will discuss the current state of security processes and investments as organizations shift to the cloud. Learn how to build a scalable security program that fits your organization’s budget. Join us on November 8th at 1pm ET! Sign up today!

Duration: 1 Hour

Gain Control Over Windows 10 Updates

There’s no doubt about it, Windows 10 upgrades have caused disruption across IT departments. Our team of Windows 10 specialists will share stories from the field and tips for successful management of Windows 10 in this technical discussion. We’ll highlight the latest best practices that every company should follow and explore the usability of unified endpoint management toolsets from VMware, Citrix, and Microsoft asking, “Do they really solve the need?”

Duration: 30 mIN

IT Security Horrors that Keep You Up at Night

One reason companies continue to get breached is that they are too focused on the wrong things. You lose sleep over the “shock and awe” security headlines in the news — while your executives and directors use a password of monkey123 without 2-factor authentication for their email. The good news is you can greatly increase the security of your network without spending thousands of dollars on shiny new boxes with pretty blinking lights!

Duration: 1 Hour

Accelerating Office 365 Adoption: Making the Cloud Less Cloudy

Join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Matthew Vinton from Quest Software as they discuss migrating to, management of, and securing of Office 365. Learn more.

Duration: 30 minutes

Top Nine Insider Attacks and How to Spot Them

In this live webcast, Quest experts Shawn Barker and Ghazwan Khairi will be introducing our brand new product Change Auditor Threat Detection — a powerful solution for proactively detecting anomalous behavior based on user activity. You will discover ways to minimize your insider threat risk. Learn more.

Duration: 1 Hour

Session 1 - The Human Factor: Malicious Insiders vs. Negligent End Users

Breaches resulting from insider misdeeds are front-page news on a regular basis. Unfortunately, the average employee misses a critical common thread across many these stories. It’s up to IT pros to understand the techniques attackers use, educate their users to avoid common traps, and take the necessary steps to avoid breaches. Learn more.

Duration: 1 Hour

Reduce Your Security and Compliance Risks with IT Asset Inventory Management

To minimize security and compliance risks, as well as reduce costs on under-utilized hardware and software, IT pros need to inventory all IT assets their organization has and track changes to them. If done manually, these tasks require hours of tedious work, so many organizations seek tools that streamline the process. Learn more.

Duration: 1 Hour

Align HR and IT to Streamline Employee Onboarding

Growing companies onboard 30 new employees, on average, each month. This is no small challenge for the HR and IT teams. Now is the time for onboarding processes that are automatic, efficient and secure. Learn more.

Duration: 1 Hour

Identity Management Key to IT Modernization

Enterprises are saddled with an IT architecture that has evolved organically over time. With the adoption of cloud and a drive to a more distributed workforce, IT is tasked with securely managing more users, on more devices, in more locations, and accessing more applications. The demands on IT are compounding quickly. And, limited staffing and budgets mean IT is constantly being asked to do more with less. Learn more.

Duration: 1 Hour

Netwrix Auditor – Data Discovery & Classification Edition

Meet the brand-new Netwrix Auditor – Data Discovery and Classification Edition, which provides complete visibility into where sensitive files are, what content is inside them, who can access the files and who actually uses them. Learn more!

Duration: 1 Hour

A Hacker Explains: How Attackers Exploit Office 365 Vulnerabilities

Office 365 has become the platform of choice for document collaboration and sharing. If you’re using Office 365 or planning to migrate there, understanding the types of security attacks you can expect is imperative. Microsoft provides tools for testing your end users by simulating some of the most common attacks, so you can educate them as part of your broader defense strategy. Learn more.

Duration: 1 Hour

The Role of Virtualization in the Hybrid Cloud Era

Join us on this webinar to learn how both on premises infrastructure and public cloud can play a role giving enterprise IT the freedom to leverage the best attributes of both by creating a hybrid cloud environment making the deployment and transition between environments simple and seamless. Learn more.

Five Expert Tips to Overcome Compliance Challenges

Regulatory compliance is one of the biggest challenges that IT pros face today, regardless of their organization’s location, size or industry. Although GDPR, PCI DSS, HIPAA, GLBA, CJIS and other compliance regulations focus on different things, the underlying objective is the same — securing the data. Register now!

Duration: 1 Hour

Netwrix Auditor Product Demo

See what the new Netwrix Auditor 9.6 has to offer, including how you can now classify and secure your data. Register today!

Duration: 1 Hour

Netwrix Auditor Product Demo

See what the new Netwrix Auditor 9.6 has to offer, including how you can now classify and secure your data. Register today!

Duration: 1 Hour

VIDEO: Optimize Your Connection to Oracle Cloud with Equinix

Learn how Oracle and Equinix help organizations to transform their business by integrating hybrid and multicloud environments to increase operational efficiency, enhance system processes, improve customer experiences and grow revenues. Learn more.

Duration: 1 Hour

VIDEO: Optimize Your Connection to Oracle Cloud with Equinix

Learn how Oracle and Equinix help organizations to transform their business by integrating hybrid and multicloud environments to increase operational efficiency, enhance system processes, improve customer experiences and grow revenues. Learn more.

Duration: 1 Hour

A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.

A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.

Netwrix Auditor Product Demo

In this technical webinar, we will guide you through the key functionality of Netwrix Auditor 9.5. You’ll learn how to use Netwrix Auditor more effectively to audit critical systems such as Active Directory, Windows file servers, Microsoft SQL Server and many more.

Duration: 1 Hour

Availability On-Premises, In The Cloud And On The Go with Veeam Agent for Microsoft Windows

Are you looking to find out more about avoiding downtime and data loss quickly and easily for Windows-based physical or public-cloud workloads? How can you bring more Availability to these workloads? Learn more.

Duration: 1 Hour

To The Cloud, From The Cloud, Within The Cloud

Learn from Mike Jones on what modern approaches exist to do what you want with your data in the cloud. Whether you are starting your cloud journey, already underway or not sure how to meet your technical and business requirements in a cloud-ready world, there is something for everyone on this webinar. Watch it now.

Duration: 1 Hour

Total Control and Protection of Email Data with Veeam Backup for Microsoft Office 365

Whether you have completely migrated to Microsoft Office 365, or have a hybrid exchange and Office 365 deployment, your business objectives remain the same. You must remain in control of your data and be able to backup and recover Microsoft Office 365 items at all times. Veeam® Backup for Microsoft Office 365 enables you to mitigate the risk of losing access to Office 365 email data and ensure Availability for users. Learn more.

Duration: 1 Hour

Availability Outside of the Data Center

Take a deep dive into how Veeam® Agents deliver Availability for Windows-based physical servers and Linux-based server instances. We’ll discuss how to meet RPOs and reduce the risk of data loss for laptops and tablets outside the corporate network. We will also discuss how you can solve key challenges like managing remote offices, offering Backup as a Service and Disaster Recovery as a Service, and more.

Duration: 1 Hour

How the Cloud Drives Availability and Data Protection

Data is to this century what oil was to the last century – a driver of massive growth and change. This is not just about technology, but also new ways of doing business. And yet, Availability and data protection are among the biggest challenges facing IT leaders today, particularly with the recent increases in cyberattacks, such as ransomware, which have affected companies of all sizes. Learn more.

Duration: 1 Hour

Hyper-V 2016: The Next Generation of Virtualization

Watch this interactive, demo-filled webinar that will provide all of the details on the largest announcements within Hyper-V 2016. Join Microsoft Cloud and Datacenter Management MVP, Clint Wyckoff, as he illustrates the pieces of Hyper-V 2016! Learn more.

Duration: 1 Hour

Security Configuration Management Best Practices

In this webinar, we’ll talk about some of the things you should be looking at when it comes to security configuration management. We’ll talk about some best practices, default tools used, as well as some very common misconfigurations that are seen in the “wild”, possibly even ones that you’ve configured!

Active Directory Deep-Dive: Top Issues, Tips and Gotchas from the Experts

Active Directory (AD) is the personnel file of Microsoft Windows—the library that manages password policy and access to enterprise resources like applications or devices. Learn more.