On Demand
Join Vice President of Web Becky Nagel as she walks you through a showcase of hot products and the chance to win a pair of high-end BOSE Noise Cancelling Headphones. Learn more.
Duration: 1 hour
Join the editors of Virtualization & Cloud Review as well as architect, author, speaker and highly sought after cloud data and data expert Joey D'Antoni as he walks you through how to quickly recover your data in the cloud. Learn more.
Duration: 1 hour
Join the editors of Virtualization & Cloud Review as well as world-renowned enterprise data architect, speaker and author Karen Lopez for this highly informative session where you'll get caught up to speed on the real-world best practices you need for your enterprise cloud data headed into 2021 (and beyond). Learn more.
Duration: 1 hour
Join the editors of Virtualization & Cloud review plus independent experts who will walk you through the best practices for you to manage, store, secure and restore your cloud-based data, whatever the service or configuration. Learn more.
Duration: 3 hours
This engaging Webinar explores ways that organizations can incorporate the cloud into their backups, but without implementing radical changes to their data protection infrastructure, policies and operations. Learn more.
Keeping your remote workforce and the company data they’re using secure can be an expensive and complicated undertaking. In this webinar you will learn how Microsoft is addressing the issue. Learn more.
Cyber-security is a "top-down" approach, and with the speed at which technology is advancing, we need to make sure that our security profile is on the cutting edge and everyone is adhering to all the changes and challenges that appear daily. Learn more.
This is the true story of an IT Manager who was tired of his users clicking everything and wanted to teach them a lesson… in a good way. Join us as we talk with Tory Dombrowski, IT Manager at Takeform about his experiences and lessons learned while delivering a security awareness training program for his users. See how he has fun with phishing, how he creates allies in the fight against careless clicking, and why security awareness training is his organization’s best, last line of defense.
Tory and Erich Kron, KnowBe4's Security Awareness Advocate will dive deep to share best practices and creative ideas to inspire you and your own security awareness program.
This is the true story of an IT Manager who was tired of his users clicking on everything and wanted to teach them a lesson… in a good way. Find out what happens, when you stop being polite, and start getting real. The Real World: Security Awareness Training!
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.
In this on-demand webinar Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer and former Gartner Analyst, steps you through key measures that will help you make an informed security awareness decision for your organization.
This webinar, hosted by Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, covers a number of techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. We didn't just cover one angle. We came at it from all angles!
As a security leader, you have a lot on your plate. Even as you increase your budget for sophisticated security software, your exposure to cybercrime keeps going up. IT security seems to be a race between effective technology and ever evolving attack strategies from the bad guys. However, there’s an often-overlooked security layer that can significantly reduce your organization’s attack surface: New-school security awareness training.
David Tutwiler, Director of Information Technology, South Western Communications, knows first hand what it’s like to have a security incident interrupt his evening. That spoofed CEO email requesting gift cards can certainly mimic real life circumstances. And when real life and threats in the wild come together, your planned downtime can turn into a nightmare.
The increased attacks on Pharma and Healthcare has caused significant damage to the Covid research and even caused deaths. Core network security needs to be enhanced to reduce the successful attacks. Learn more.
Join BlueVoyant as we shine a spotlight on the unsung capabilities of Data Leakage Protection, discuss how to apply templatized protection schemes and examine why you no longer need to deploy an expensive classification and protection system for your on-prem and cloud-file repositories. Read on.
Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, to find out what your password policy should be and learn about the common mistakes organizations make when creating password policy. Learn more
Teams has become such an integral part of most organizations today that it has 115 million daily active users. Learn more.
This webinar will teach you how to easily add secure login to your web apps so that you can save time and get right into building the core of your application. Learn more.
Join the editors of Redmondmag.com and Virtualization & Cloud Review plus a top security expert to find out the answers you need to know. Learn more.
Beyond the migration of workloads and applications from on-prem to the cloud, many enterprises have shifted the center of their IT operations to the cloud as well. Learn more.
Join this summit to find out exactly how new technologies in the areas of cloud, backup and recovery and security and launch your enterprise forward in 2021, while keeping you secure and compliant. Learn more.
Join the editors of Virtualization & Cloud Review as well as independent experts for top best practice insights that you can implement right away! Learn more.
Join this summit to find out exactly how new technologies in the areas of cloud, backup and recovery and security and launch your enterprise forward in 2021, while keeping you secure and compliant. Learn more.
Attend a1qa's workshop dedicated to gaining a competitive advantage in 2021 through high software product quality. Learn more.
Join us for this editorial webcast to get a better understanding of what your current DR decisions mean for the future of your organization. Learn more.
Join this webinar as our cybersecurity expert explains why organizations are rapidly adopting the Zero Trust security model, and how it can change the way you manage your network. Learn more.
This webinar, hosted by Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will cover a number of techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. We won’t just cover one angle. We’ll come at it from all angles!
In this on-demand webinar Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer and former Gartner Analyst, steps you through key measures that will help you make an informed security awareness decision for your organization.
Join Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, and Joanna Huisman, KnowBe4's Senior Vice President of Strategic Insights and Research, for a review of our 2020 Phishing By Industry Benchmarking Report, a data set of nearly four million users across 17,000 organizations.
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.
If you want to become your Finance Director’s best friend via a strategic approach to Office 365 license renewal, make sure you tune in for this webinar. Learn more.
See how to unleash the full potential of your Microsoft license leveraging the security, automation and consistency already built into your cloud investment. Learn more.
Join this webcast as we discuss the Microsoft 365 security journey and will explore how to accelerate internal adoption timelines for protecting user identity, devices, and data. Register now.
Duration: 1.5 hours
In this webinar, we'll get into the proverbial weeds to discuss several use cases around how to optimize and maximize the value of an Azure Sentinel deployment. Learn more.
Microsoft Office 365 enables your enterprise to efficiently work from home. With a massive influx of remote workers, businesses more than ever before are storing, sharing and accessing data within Microsoft Teams, OneDrive for Business, Exchange and SharePoint Online, and that data needs to be protected.
This 8-minute demo of Veeam® Backup for Microsoft Office 365 will show how to eliminate the risk of losing access and control over your Office 365 data including Exchange Online, SharePoint Online, OneDrive for Business and Microsoft Teams.
Watch this technical product demo to get an in-depth technical look into the best practices for operating Veeam® Backup for Microsoft Office 365.
Veeam® Backup for Microsoft Office 365 on the IBM Cloud eliminates the risk of losing access to your Office 365 data, including Exchange Online, SharePoint Online and OneDrive for Business.
This short demo highlights how easy is to deploy, backup, and recover Veeam® Backup for Microsoft Office 365 in Azure.
If you are not a database administrator, this doesn’t mean you can’t have amazing SQL Server backup and recovery. Learn more.
In this session the editors of Redmondmag.com and Virtualization & Cloud Review will guide you through some of the best solutions you'll want to implement now to be ready for 2021. Learn more.
Do you have a modern disaster recovery plan that will ACTUALLY save your enterprise's operations and data? Join this session to find out. Learn more.
Join the editors of Virtualization & Cloud Review and Redmondmag.com along with independent Infosec experts to learn exactly what you need to know heading into 2021 about ongoing and upcoming ransomware threats. Learn more.
Find out where disaster recovery is heading in 2021 in this information-packed half-day summit brought to you by the editors of Redmondmag.com and Virtualization & Cloud Review. Learn more.
In this webcast, we will discuss the essential questions that the admin will need to answer before heading into a tenant-to-tenant migration. Learn more.
This webinar will outline how IT departments can proactively cut costs and increase efficiency all while maximizing security through quick win, high-impact projects and initiatives. Learn more.
Microsoft Office 365 enables your enterprise to efficiently work from home. With a massive influx of remote workers, businesses more than ever before are storing, sharing and accessing data within Microsoft Teams, OneDrive for Business, Exchange and SharePoint Online, and that data needs to be protected. See why in this webinar, brought to you by NewCloud Networks and Veeam. Learn more.
the need to move PST data to Office 365 and upgrade the user experience has never been greater. During this webinar you will learn how to locate all PST files on your network, what network and throughput considerations to plan for, and how to ensure happy end-user experience, both during and post-PST migration. Learn more!
This session will focus on how to provide a platform for data re-use, at the pace your need – taking what was once trapped data and unleash it to deliver new customer experiences, faster time to market, and more productive employees. Learn more.
Join this webinar on how to navigate Direct Routing and unleash the full potential of enterprise-grade communications to your Microsoft Teams users. Learn more.
Join BlueVoyant’s Director of Microsoft Security Solutions, Micah Heaton, as he discusses the potential application of Azure Sentinel in your Microsoft cloud environments. He will explore how to accelerate internal adoption timelines for protecting user identity, devices, and data, and demonstrate a strategy for integration Azure Sentinel into your security posture. Read on.
Join this webcast for a conversation about migrating content to Modern SharePoint from many different sources and the challenges they’ve helped organizations like yours overcome.
Join this webcast for a deep dive into five scenarios around protecting various parts of the Microsoft ecosystem.
Join the editors of Redmondmag.com and independent security experts to guide you through exactly what you need to know to keep your enterprise installation of Office365 secure and compliant into 2021. Read on.
Duration: 3 hours
Many administrators think Office 365 is totally self-securing, but that's not even close. Find out how to protect against even the biggest, most complex threats to an Office 365 environment. Learn more.
Duration: 3 hours
In this webcast, we will discuss common attack methods used to attain elevated privileges via Active Directory and ways to thwart malicious efforts using a live simulation of a Pass the Hash attack as an example. Learn more.
Join us for this live webcast to learn how HR/HCM systems play a key role in Identity and Access Management (IAM). Learn more.
Join this webcast and learn how to prepare for the next phase of “normalcy” by evaluating your return-to-office preparedness, enabling your conference rooms with Microsoft Teams and discovering the benefits of Microsoft Certified Cloud Video Interop. Learn more.
Proper protection and off-site solutions are essential for data availability. Learn more.
Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Join us for this half-day virtual summit to learn what you need to know now about efficiently scaling your multi-cloud environment. Find out more!
Duration: 3 hours
Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Join us for this half-day virtual summit to learn what you need to know now about efficiently scaling your multi-cloud environment. Find out more!
Duration: 3 hours
Join us as we discuss the recent stresses placed on Azure Active Directory with its many dependencies on 20-year-old Active Directory technology. You'll get a sense of what Azure AD is doing well, and how Microsoft's technologies can be supplemented for maximum security and IT agility! Learn more.
Join this Webinar featuring industry experts who will show you how to become your company's security hero. You'll learn not only how to simplify and manage true endpoint security (even in this age of remote work!), but also how you'll be able to improve the company's bottom line. Read on.
Join us as we discuss the M365 security journey and explore how to accelerate adoption timelines for protecting user identity, devices, and data. Learn more.
In this special session, IT security expert Ian Thornton-Trump will take you on a tour of the near-term threats in the cloud for organizations. Learn more.
Join this session for a deeper look at just what IT managers need to know to truly assure optimum data and network security in the cloud. Learn more.
In this engaging session, IT consultant and architect John O'Neill Sr. will have a one-on-one conversation with Converge360 Editorial Director Scott Bekker about hardening hybrid cloud infrastructure in the enterprise. You'll learn about best practices, tricks to use, pitfalls to avoid and lots of other insights. Read on.
Brought to you by the editors of Redmondmag.com and Virtualization & Cloud Review, join us for this half-day summit where independent experts will make sure you're up-to-day on everything you need to know (and do) to prepare your cloud infrastructure to be secure against attacks in 2021. Learn more.
Duration: 3 hours
Join us for this webcast featuring collaboration expert Christian Buckley as he walks you through the state of Microsoft's collaboration platforms, their respective challenges and the trajectories of their product roadmaps. Learn more.
Join us to learn how to simplify deploying NVMe in your environment to realize the performance benefits of the latest drive technology. Learn more.
Everyone knows Active Directory! Unfortunately, the attackers often know it better! Learn which settings the attackers are leveraging to move laterally and gain privileges within your network. Learn more!
Join Roger Grimes as he dives into the best ways to stop malware dead in its tracks using real-life methods no one else is talking about. Learn more.
Join us to learn how to correctly configure site-to-site or point-to-site VPN tunnels. Learn more.
Join this webcast for an unconventional workshop where we'll chat about new and emerging cyberattacks without actually talking about "cyber" at all. Learn more.
Join this webinar to see how easy it is to make the move to HCI, build out your private cloud, and when you are ready, turn it all into a hybrid cloud. Learn more.
Watch this webinar and demo to learn about 5 technologies that ensure you can recover data when you need to!
During this session, we’ll examine five of the top cloud data security threats organizations must brace for these days, and cover some of the best practices and technologies that can help organizations ensure their cloud-based data is indeed secure. Learn more.
Duration: 1 hours
In this session we examine the considerations, the criteria, and the concerns you must focus on when moving data into the cloud. Learn more.
Duration: 1 hour
In this webinar you will learn about common pitfalls organizations encounter when doing cloud data projects. Learn more.
Duration: 1 hours
Join us for this free half-day summit brought to you by the editors of Virtualization & Cloud Review where our experts will address today’s most difficult challenges when securing and managing your enterprise cloud data. Learn more!
Duration: 3 hours
This webinar will cover the cybersecurity challenges unique to the healthcare industry and how COVID-19 has raised the stakes. Learn more.
Make sure you have your infrastructure not just under control but moving ahead! Join this free, half-day virtual summit where the editors of Virtualization & Cloud Review work with independent experts to give you real-world insights and advice you can use right away to tackle and conquer your biggest infrastructure challenges. Learn more.
Duration: 1 hour
Make sure you have your infrastructure not just under control but moving ahead! Join this free, half-day virtual summit where the editors of Virtualization & Cloud Review work with independent experts to give you real-world insights and advice you can use right away to tackle and conquer your biggest infrastructure challenges. Learn more.
Duration: 3 hours
Don't miss this session brought to you by Virtualization & Cloud Review's editors and independent experts. They'll give you real-world insights and advice you can use right away to tackle and conquer your most critical cost challenges. Learn more.
Duration: 1 hour
Join the editors of Virtualization & Cloud Review plus independent experts to gain in-depth knowledge about best practices for modern backup and recovery Learn more.
Duration: 1 hour
The first step to building an efficient security strategy is to perform risk assessment. Learn more.
Join this webcast about Office 365 data and learn why you need to protect it, what should you protect, and how can you leverage the Cloud correctly to ensure your Office 365 data is recoverable?
Join this session for an eye-opening exploration of the biggest problems and issues that organizations are encountering with their newly remote workforces. Learn more.
Attend this session and understand your options for improving the agility and productivity of your remote workforce and ensuring that they're ready for whatever happens next. Learn more.
In this timely session, we look at the best IT practices that can give organizations the future-ready strategies to rapidly adapt to their organizations' needs and keep their workforces safe, engaged, and productive. Learn more.
This virtual summit from the editors of Redmondmag.com and Virtualization and Cloud Review looks at lessons learned from the big migration and best practices for ongoing and future workforce agility -- both for end users and IT staff. Find out ways to iterate your remote workers into a 2.0 environment.
Duration: 3 hours
Attend this session and to gain a framework for thinking about overall enterprise container costs in various scenarios. Get all the details.
This session helps attendees understand what their enterprise container framework -- both software and hardware -- needs to look like to ensure maximum performance and minimal problems. Learn more!
This webcast provides attendees with a better understanding about which of their enterprise applications would benefit the most from a containerized approach. Learn more.
Join us for the "Guide to Getting Started with Enterprise Containers," a half-day virtual event in which attendees will get a complete walk-through of everything they need to know about working with containers presented by true industry experts. Learn more.
Cloud promises to offload a lot of the upkeep that leads to performance problems, but it can be trickier to isolate the issues when there is a problem. Join us for best practices and great tips for getting your multi-cloud environment under control. Learn more.
The more clouds you have, the more gaps exist between those clouds. Securing multiple clouds is tricky with multiple security models, different shared responsibility models and, of course, multiple sign-ins.
Organizations have many good reasons for using cloud offerings from Amazon, Microsoft, Google and others - all at the same time. Putting together a best of breed application environment where much or most of the infrastructure is someone else's responsibility is part of the appeal. But it can make it harder to control and even manage costs. Register today.
Usage and spending on multi-cloud was surging already when the pandemic, and its work-from-home imperatives, poured gasoline on the fire. Attend this half-day virtual summit to learn what you need to know now about getting multi-cloud under control. Learn more.
This kit provides a data protection perspective on the cybersecurity challenges found in today’s digital landscape and how modern backup best practices provide the ability to effectively prevent, detect and restore from a ransomware attack without ever having to give-in to a ransom.
How to imagine Security, Compliance, and Protection when everything is changing.
Evolving technologies have been transforming healthcare delivery over the last decade, but now more than ever, the healthcare industry is being forced to evolve quickly. How should we be thinking about managing healthcare data?
Join us and hear from top independent experts on the true benefits that SDN and SD-WANs bring plus their top tips and insights for organizations still determining their software-defined strategy. Read on.
Join us and learn from our independent experts who implement HCI on a daily basis on what the real benefits of HCI are, the limitations, plus best practices for getting started. Read on.
Find out why more and more enterprises are choosing to mix public and private clouds (as well as public cloud vendors). Get expert tips and best practices for implementation plus "gotchas" (including cost!) you need to watch out for. Read on!
From cloud to hyperconvergence, storage to software-defined networking, this one summit will cover what you need to know NOW about the future of infrastructure heading into 2021 and beyond. Learn more.
When you make a decision to commit to a cloud, you bring legacy technologies, current professional experience and existing development models to the equation. Not every cloud is a cultural fit for every organization. What will it take to get you into this cloud? Learn more.
Join us for this webcast to gain a sense of the conventional wisdom on the various strengths of Azure, AWS and GCP, as well as some insights into a few areas where that conventional wisdom is running slightly behind reality. Learn more.
Join us for part two of this free three-part event to understand how best to evaluate costs, capabililities and performance as major considerations when moving to the cloud. Register today.
Join independent industry experts from Virtualization & Cloud Review as they give you unvarnished insights on the pros and cons of all the top cloud platforms. We'll give you frameworks for evaluating your choices on everything from momentum to performance and technical considerations to critical questions of cost to deep insights about the cultural fit of certain cloud platforms to particular corporate or organizational cultures. Learn more.
Duration: 3 hours
In this webinar, ManageEngine's IT security expert will decode the NIST's recommendations for password security, and explain how you can easily implement them in your organization to bolster password security. Besides bolstering password security, the guidelines also help organizations meet regulatory compliance requirements such as HIPAA, and SOX.
This webinar will give IT decision-makers clarity around a modern printing infrastructure. By defining a serverless printing infrastructure IT professionals can architect future-proof printing. Learn more.
Veeam Availability Suite 5-min Demo on Data Security. In mid-2018, the average ransomware payment was $41,198. By late-2019, that price more than doubled to $84,166. With modernized data protection, however, 96% of organizations cut their average ransomware recovery cost down to $5,000, with 76% of companies not paying anything at all. How? This demo shows how to protect your data with immutability from Veeam®.
Veeam Availability Suite 5-min Demo on Hybrid Cloud Acceleration. The adoption of modern backup systems is driving rapid cloud adoption through the unification of tools — ensuring over 49% savings in hybrid cloud protection. This demo shows how to use native backup and recovery services straight from the cloud, reducing time, cost and resources.
Veeam Availability Suite 5-min Demo on Backup Modernization. Through Cloud Data Management™, organizations are achieving substantial results, including 50% lower cost of data protection and backup, and higher productivity across development, backup and recovery teams. This demo shows how to re-use your backup data to drive rapid application development through virtual sandboxes.
With the NEW Veeam® Backup & Replication™ v10, we bring the most powerful, reliable and easy-to-use file-level backup capabilities aimed at protecting your file shares.
Your business is likely protecting data from and in any environment, including cloud, virtual and physical — but are you using the key capabilities needed to achieve your recovery and business agility goals? What about unstructured NAS data that is rapidly growing unchecked? When moving data off site — are your copies protected from things like ransomware?
In this engaging, interactive webinar, we’ll look at the trends, issues and challenges of protecting a hybrid data center and provide best practices for what you can do to address them today. You’ll learn how to simplify your data protection strategy in the cloud and in the data center without compromise, all while removing complexity and cost.
The cloud has evolved from being a thorn in the side to IT to becoming a clear enabler of business. This on-demand webcast explores how IT professionals feel about using the cloud, both public and private. Don’t miss this opportunity for valuable, insightful data about cloud use from a broad spectrum of over 300 IT pros ― so you can see how your organization's use of cloud compares.
If you think your Office 365 data is automatically protected, think again. Sure, Microsoft may host the infrastructure, but it doesn’t offer the levels of data protection needed to satisfy your demanding data protection, disaster recovery and compliance goals. Watch this on-demand demo to see how NetVault delivers comprehensive Office 365 data protection.
Adoption of the cloud continues to grow, yet despite its enormous advantages, the cloud also creates new challenges and pain points. For example, the more you explore and embrace different cloud services, the more costs increase. In addition, it becomes more difficult to keep track of workloads and services. And as you seek to modernize your applications via cloud-based containers, new management complexities arise.
In this webcast, Peter Varhol of Technology Strategy Research, and Quest Foglight product designer Mike Condy, explore why teams are increasingly using containers, and what effect these decisions have on their operational strategies. They examine the uptake of containers as a development and deployment environment in the cloud, and how containers using Dockers and Kubernetes change application architectures for new applications.
If you’re thinking about migrating workloads to AWS or Azure, do you know exactly what you’ll migrate, what you’ll leave on premises and what it’ll cost, now and in the future? Get full visibility into your cloud migrations and how migrations will affect your environment by listening Microsoft MVP Tim Warner, and Quest Software.
Attend this webinar and learn about the gaps left by Microsoft’s Office 365 protection, the risks posed and how to overcome them all with a comprehensive 3rd-party data protection solution. Learn how to get the Office 365 backup and recovery strategy you need and want.
Join Greg Schulz, IT expert and founder of StorageIO, and Adrian Moir, Senior Consultant at Quest Data Protection, for an insightful and dynamic conversation about your evolving storage and backup requirements.
Microsoft Office 365 versioning, archiving and replication fall short from being able to deliver the data protection and recovery needs you require to meet both business SLAs and compliance requirements. Learn more.
Microsoft Active Directory is the basis for every Microsoft‑oriented networking environment. However, it’s not always a solid basis. With thousands of network environments under their belts, Sander Berkouwer (Microsoft MVP) and Veeam’s® Andrey Zhelezko know their Active Directory. Watch this webinar to benefit from their best practices.
Ransomware is here to stay. As much as no one likes to hear that, we have to admit that it’s no longer a question of ‘if’ but rather ‘when’ and ‘to what’ extent your business might be affected. Rather than hope it won’t get you, let’s explore all the options that exist to prevent, locate, disarm and mitigate ransomware risks. We’ll go over some essential strategies you can implement today and also review what a comprehensive backup software can offer you.
In this detail-rich session, our cloud architecture expert lays out some of the basic considerations and other concerns that organizations must account for in order to make the right decision about putting data and applications in the public cloud, in a private cloud or in a hybrid cloud. Learn more.
Duration: 1 hour
Join us for this free three-hour virtual event to introduce you to the state of the art and best practices for making the most of a hybrid cloud infrastructure. Key takeaways will include strategies and tactics for addressing top management issues and a framework for understanding the pros and cons of various configuration options. Learn more!
Duration: 3 hours
Whether they have completely migrated to Office 365, or have a hybrid exchange and Office 365 deployment, a business’s objectives remain the same. Organizations must remain in control of their data, and with Veeam Backup for Microsoft Office 365 from NewCloud Networks, businesses can take control of their data instantly.
Modern cyberattacks are not limited to just network intrusion from the outside. Learn more.
Moving to Office 365 introduces a world of collaborative workloads - such as Teams, SharePoint Online, and OneDrive for Business - but driving user adoption of these new platforms can be a huge challenge, especially for larger organizations. Learn more.
Join this detail-rich session for expert advice on common mistakes, pitfalls, misconfigurations and misunderstandings that can lead to credential or system compromise and other serious security and compliance problems. Learn more!
Join us for this in-depth session, as our experts explore the advantages and disadvantages of having different parts of your identity and authentication infrastructure in different places -- on-premises, in the cloud or in both places at once. Learn more!
Join us for an expert view of which GA, public preview and private preview features are the ones to watch and implement. Learn more!
Join us for this free three-hour virtual event to introduce you to the state of the art and best practices surrounding the use of Microsoft's power duo of directory technologies. Learn more!
Organizations have data in many different places that all must be made available and resilient. Physical systems and the cloud aren't exceptions from this requirement. Despite obvious differences, these types of environments are still much alike in terms of data protection and they demand a proper backup strategy. Luckily, Veeam has an answer to this challenge. Join this session where Andrew is going to showcase how Veeam Agents can play a major role in physical and cloud environments’ data Availability.
Join Veeam®, Cisco and LinxDataCenter for a discussion on working in a multi-cloud environment and the challenges that go along this journey.
Duration: 1 hour
Three out of four organizations have a “reality gap” between what business leaders expect from IT and what IT is geared to deliver. This session will examine the industry trends that are causing the gap, how those expectations are driving 2020 challenges and strategy, and give some ideas on how to close the gap from both a technical and an operational perspective. Watch now.
Duration: 1 hour
VeeamON Virtual provides the latest insights and predictions for Cloud Data Management. Veeam will highlight predictions that will remain top of mind for 2020, including ones that will affect the backup and Availability markets. Understanding these predictions and preparing for them ahead of time will allow organizations to enhance and optimize their Cloud Data Management practice. Watch now.
Duration: 1 hour
Introducing Flash-to-Flash-to-Cloud (F2F2C), a solution designed for the scale and use cases of modern data backup and protection. Together, with Pure Storage and Veeam® Backup & Replication™, this architecture provides significant improvements in recovery times.
Veeam Availability for Nutanix AHV is an easy to use prism-like interface that gives you a possibility to look at snapshot jobs, do restores and recoveries, see job errors and more. Watch this video, which will walk you through the menu and interface, and get acquainted with all the functions and features of it.
In this episode Shawn Lieu, Jason Leiva, Ronn Martin and a special guest from Nutanix have discussed the NEW Veeam Availability for Nutanix AHV software solution that provides Nutanix AHV integration with Veeam Backup & Replication. This customer requested solution combines agentless AHV backups with Prism like management interface to deliver the world-class ease-of-use, reliability and Availability, that Veeam customers currently enjoy for VMware and Hyper-V environments.
As more businesses look to move workloads to the cloud, they can encounter challenges and constraints with their current data management solutions. In fact, 47% of IT leaders are concerned that their cloud workloads are not as portable as intended. It is your mission as an IT guru to obtain workload portability in the cloud.
One thing is certain about data today — it’s growing exponentially. With this rapid increase of data created by organizations, it’s no surprise that challenges such as storage capacity and cost are starting to take hold. In addition, compliance requirements are requiring businesses to hold onto data for longer and longer. It is your mission to manage data growth, while also addressing compliance requirements.
Nearly all commerce, communications, and data traffic going over the web is encrypted. As organizations transform operations, leverage more of the cloud, expanding locations, and utilizing remote workforces, IT’s lack of visibility into encrypted traffic puts the organization at risk for a cyberattack, data breach and compliance failures. Learn more.
Join us at this webcast as we discuss two early stage attack activities: LDAP reconnaissance and Password Spraying – that allow attackers to map out the target infrastructure to plan out their attack and begin to take over accounts. Detection strategies and mitigation steps will also be explained. Sign up.
Duration: 1 hour
Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, as he explores techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. Roger won't just cover one angle. He'll come at it from all angles! Read on.
In this webinar, MVP Derek Melber will guide you through how you can configure your SIEM to detect direct attacks and also improve your SIEM with technologies such as user behavior analytics. Find out more.
Don't let Active Directory fall victim to a cyber attack! When it comes to protecting your Active Directory, there is no room for error. In this On Demand Webcast , join Dale Meredith, cyber security expert as he explores ways to protect AD from cyber criminals. Watch now!
In this discussion, Dave Russell Vice President of Enterprise Strategy of Veeam reviews the considerations for adopting cloud-based object storage and how to leverage cloud object storage for the best outcome. Learn more.
In this webinar, we'll offer you best practices and key trends to help you maximize the return on your Azure cloud investment and gain control of your scaling cloud infrastructure. Learn more.
Duration: 1 hour
In today’s competitive world, using new technology to set your business apart can make the difference between getting ahead or falling behind. But staying in control of the growing complexity is tough. Learn more.
It's been said that North America has some of the wildest weather on Earth. With the summer months approaching, it's the season for thunderstorms, tornados, hurricanes, wildfires and floods. Is your business data prepared to weather any approaching storms? Learn more.
The shift to the cloud always seems to focus on enhanced productivity for an organization overall. But cloud adoption also means IT must figure out how to integrate “all-things-cloud” with on-prem Active Directory. Learn more.
Duration: 1 hour
When attempting to protect your organization, you’re being pulled in a million directions, trying to secure every possible attack vector. Learn more.
Duration: 1 hour
If there's one silver lining to the emergence of ransomware in the last few years, it's this -- it's brought into sharp relief how interrelated security, backup and recovery, disaster recovery, business continuity, training and organizational policies are in a solid defense strategy. Learn more.
Duration: 1 hour
When it comes to end-user security, hard-drive encryption is a key pillar to consider for your security strategy. Yet while it adds a layer of security and can be required for compliance, it also adds some challenges and creates risks of accidental data loss on individual PCs. Learn more.
Duration: 1 hour
Using your Veeam solution for backup and replication to the Microsoft Azure cloud is a great start, but did you know it’s possible to make it better and faster? Learn more.
Duration: 1 hour
Using your Veeam solution for backup and replication to the Microsoft Azure cloud is a great start, but did you know it’s possible to make it better and faster? Read on.
Duration: 1 hour
Many organizations need to provide network access to their extended enterprise -- contractors, temp workers, partners, vendors, and others -- to effectively run their business. However, these users create unique challenges and introduce new cybersecurity risks. Join us to learn the top five questions IT must address to successfully manage the extended enterprise. Learn more.
Active Directory is the living heart of most IT organizations. No matter if your organization is on-premises, in the cloud, or in some hybrid situation somewhere in-between your on-premises Active Directory is most likely the most important part of your IT infrastructure. Read on.
Duration: 1 hour
The data estate that organizations have to protect in 2019 is more complicated than ever. The old concept of a network perimeter is gone, bulldozed by cloud storage, Software as a Service applications, bring your own device practices, data on mobile phones and many employees who never really go off the clock no matter where they are. Learn more.
Duration: 1 hour
While Hybrid messaging and collaboration with MS Office 365 offers compelling benefits to larger organizations and the enterprises, it comes with new security and compliance risks. Learn More.
Data privacy and data security have been among the hottest topics of 2018, mainly due to the GDPR, which came in force on May 25. However, 2018 also saw the signing of another important law, the California Consumer Privacy Act (CCPA). Although it has gotten a lot less press than the GDPR, it is nearly as sweeping, since it applies to all organizations that store the personal information of California residents. Learn more.
Duration: 1 hour
As your environment grows more diverse—more clouds, more devices, more types of apps—you need a more efficient and secure approach to management. At this technical online event for hands-on IT leaders, we’ll discuss the building blocks of a modern digital workspace. Register now!
Duration: 1 Hour
Many organizations purchase and implement software solutions based on factors like a rich feature set, a low price and an appealing user interface. Unfortunately, security issues are often pushed to the side or forgotten altogether. Consider SharePoint, Microsoft’s flagship collaboration platform. Learn more.
Duration: 1 Hour
Many organizations purchase and implement software solutions based on factors like a rich feature set, a low price and an appealing user interface. Unfortunately, security issues are often pushed to the side or forgotten altogether. Consider SharePoint, Microsoft’s flagship collaboration platform. Learn more.
Duration: 1 Hour
In this session, Threat Stack Security Engineer, Mark Moore, and CFO, Kevin Durkin, will discuss the current state of security processes and investments as organizations shift to the cloud. Learn how to build a scalable security program that fits your organization’s budget. Join us on November 8th at 1pm ET! Sign up today!
Duration: 1 Hour
There’s no doubt about it, Windows 10 upgrades have caused disruption across IT departments. Our team of Windows 10 specialists will share stories from the field and tips for successful management of Windows 10 in this technical discussion. We’ll highlight the latest best practices that every company should follow and explore the usability of unified endpoint management toolsets from VMware, Citrix, and Microsoft asking, “Do they really solve the need?”
Duration: 30 mIN
One reason companies continue to get breached is that they are too focused on the wrong things. You lose sleep over the “shock and awe” security headlines in the news — while your executives and directors use a password of monkey123 without 2-factor authentication for their email. The good news is you can greatly increase the security of your network without spending thousands of dollars on shiny new boxes with pretty blinking lights!
Duration: 1 Hour
Join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Matthew Vinton from Quest Software as they discuss migrating to, management of, and securing of Office 365. Learn more.
Duration: 30 minutes
In this live webcast, Quest experts Shawn Barker and Ghazwan Khairi will be introducing our brand new product Change Auditor Threat Detection — a powerful solution for proactively detecting anomalous behavior based on user activity. You will discover ways to minimize your insider threat risk. Learn more.
Duration: 1 Hour
Breaches resulting from insider misdeeds are front-page news on a regular basis. Unfortunately, the average employee misses a critical common thread across many these stories. It’s up to IT pros to understand the techniques attackers use, educate their users to avoid common traps, and take the necessary steps to avoid breaches. Learn more.
Duration: 1 Hour
To minimize security and compliance risks, as well as reduce costs on under-utilized hardware and software, IT pros need to inventory all IT assets their organization has and track changes to them. If done manually, these tasks require hours of tedious work, so many organizations seek tools that streamline the process. Learn more.
Duration: 1 Hour
Growing companies onboard 30 new employees, on average, each month. This is no small challenge for the HR and IT teams. Now is the time for onboarding processes that are automatic, efficient and secure. Learn more.
Duration: 1 Hour
Enterprises are saddled with an IT architecture that has evolved organically over time. With the adoption of cloud and a drive to a more distributed workforce, IT is tasked with securely managing more users, on more devices, in more locations, and accessing more applications. The demands on IT are compounding quickly. And, limited staffing and budgets mean IT is constantly being asked to do more with less. Learn more.
Duration: 1 Hour
Meet the brand-new Netwrix Auditor – Data Discovery and Classification Edition, which provides complete visibility into where sensitive files are, what content is inside them, who can access the files and who actually uses them. Learn more!
Duration: 1 Hour
Office 365 has become the platform of choice for document collaboration and sharing. If you’re using Office 365 or planning to migrate there, understanding the types of security attacks you can expect is imperative. Microsoft provides tools for testing your end users by simulating some of the most common attacks, so you can educate them as part of your broader defense strategy. Learn more.
Duration: 1 Hour
Join us on this webinar to learn how both on premises infrastructure and public cloud can play a role giving enterprise IT the freedom to leverage the best attributes of both by creating a hybrid cloud environment making the deployment and transition between environments simple and seamless. Learn more.
Regulatory compliance is one of the biggest challenges that IT pros face today, regardless of their organization’s location, size or industry. Although GDPR, PCI DSS, HIPAA, GLBA, CJIS and other compliance regulations focus on different things, the underlying objective is the same — securing the data. Register now!
Duration: 1 Hour
See what the new Netwrix Auditor 9.6 has to offer, including how you can now classify and secure your data. Register today!
Duration: 1 Hour
See what the new Netwrix Auditor 9.6 has to offer, including how you can now classify and secure your data. Register today!
Duration: 1 Hour
Learn how Oracle and Equinix help organizations to transform their business by integrating hybrid and multicloud environments to increase operational efficiency, enhance system processes, improve customer experiences and grow revenues. Learn more.
Duration: 1 Hour
Learn how Oracle and Equinix help organizations to transform their business by integrating hybrid and multicloud environments to increase operational efficiency, enhance system processes, improve customer experiences and grow revenues. Learn more.
Duration: 1 Hour
Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.
Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.
In this technical webinar, we will guide you through the key functionality of Netwrix Auditor 9.5. You’ll learn how to use Netwrix Auditor more effectively to audit critical systems such as Active Directory, Windows file servers, Microsoft SQL Server and many more.
Duration: 1 Hour
Are you looking to find out more about avoiding downtime and data loss quickly and easily for Windows-based physical or public-cloud workloads? How can you bring more Availability to these workloads? Learn more.
Duration: 1 Hour
Learn from Mike Jones on what modern approaches exist to do what you want with your data in the cloud. Whether you are starting your cloud journey, already underway or not sure how to meet your technical and business requirements in a cloud-ready world, there is something for everyone on this webinar. Watch it now.
Duration: 1 Hour
Whether you have completely migrated to Microsoft Office 365, or have a hybrid exchange and Office 365 deployment, your business objectives remain the same. You must remain in control of your data and be able to backup and recover Microsoft Office 365 items at all times. Veeam® Backup for Microsoft Office 365 enables you to mitigate the risk of losing access to Office 365 email data and ensure Availability for users. Learn more.
Duration: 1 Hour
Take a deep dive into how Veeam® Agents deliver Availability for Windows-based physical servers and Linux-based server instances. We’ll discuss how to meet RPOs and reduce the risk of data loss for laptops and tablets outside the corporate network. We will also discuss how you can solve key challenges like managing remote offices, offering Backup as a Service and Disaster Recovery as a Service, and more.
Duration: 1 Hour
Data is to this century what oil was to the last century – a driver of massive growth and change. This is not just about technology, but also new ways of doing business. And yet, Availability and data protection are among the biggest challenges facing IT leaders today, particularly with the recent increases in cyberattacks, such as ransomware, which have affected companies of all sizes. Learn more.
Duration: 1 Hour
Watch this interactive, demo-filled webinar that will provide all of the details on the largest announcements within Hyper-V 2016. Join Microsoft Cloud and Datacenter Management MVP, Clint Wyckoff, as he illustrates the pieces of Hyper-V 2016! Learn more.
Duration: 1 Hour
In this webinar, we’ll talk about some of the things you should be looking at when it comes to security configuration management. We’ll talk about some best practices, default tools used, as well as some very common misconfigurations that are seen in the “wild”, possibly even ones that you’ve configured!
Active Directory (AD) is the personnel file of Microsoft Windows—the library that manages password policy and access to enterprise resources like applications or devices. Learn more.