On Demand
In this session, we'll discuss ransomware attacks in the context of a comprehensive program leveraging recovery strategies against attacks you can’t always prevent. Keep the data safe and keep the users working. Attend to learn how.
In today’s technological landscape, Active Directory (AD) is a constant attack point for attackers. A common vector of attack against Active Directory is via group policy. Group policy can be used as a very effective direct or indirect method of executing remote code, modifying security settings, changing user permissions, and much more.
In this 45-minute, on-demand webinar, learn how to (safely) manage and secure licenses and user access. Learn more!
Most enterprise ITOps organizations desire a state of self-healing systems capable of identifying and resolving issues without human intervention. While the allure of eliminating known, repeatable incident response workflows offers immense promise, these initiatives often fail to get off the ground. Learn how IT operations can jumpstart automation programs that tie together BigPanda Incident Intelligence with Red Hat® Ansible® Automation Platform – so you can go from knowledge to automated response.
Join some of the industry's top security experts for this three-hour crash course on how to foster a culture of cybersecurity vigilance in your organization.
Join this webinar for a new approach to building cyber resilience for the employees on the front lines of your organization.
Join some of the industry's top security experts for this three-hour crash course on how to foster a culture of cybersecurity vigilance in your organization.
Join us for this free, half-day summit where some of the industry’s top independent experts will share their tried-and-true methods for designing, implementing and managing a disaster-proof Microsoft 365 backup and recovery plan. Make sure your Microsoft 365 data doesn’t get lost to the ether if (or when) disaster strikes – register today!
Join Rosa Smothers, former CIA Cyber Threat Analyst and Technical Intelligence Officer, now KnowBe4’s SVP of Cyber Operations, as she reveals the OSINT techniques employed by cybercriminals that can help you protect your organization before disaster strikes.
Are you struggling to understand user complaints about application performance? Register Now to learn how monitoring end user experience can help you better optimize your applications and more! thank you
Our panel of experts and industry insiders will help you determine the best ways to plan, configure, migrate and manage your most critical infrastructure solutions for the cloud era. Whether you’re looking to learn more about cloud-based identity management with Entra or cloud-based VDI with Azure Virtual Desktop (or both!), we’ll guide you through the intricacies of building a more secure, scalable and cost-effective environment. Register today!
Join Greg Schulz, Author and senior analyst at Server StorageIO and Microsoft MVP Cloud Data Center Management, as he discusses moving beyond the what and why to zero trust-focused end-user training, tips, best practices, and what to watch out for.
Join this free, three-hour summit to get the expert guidance and insight you need to start modernizing your organization’s security infrastructure. Learn more!
In this All Demo webinar, two technologists from the Product Strategy team will point and click you through the critical setup steps, showing users of Veeam Backup & Replication™ and Veeam ONE™ just how easy it is to pivot your installation to natively protecting cloud hosted workloads in AWS, Microsoft Azure and Google Cloud.
In this webinar Veeam cloud subject matter experts share hybrid cloud data protection best practices, reference architectures and demos as a how-to for lowering costs, bettering security and standardizing backups across your hybrid cloud.