Webcasts


On Demand

Strengthen Your Data Protection Security - Detect and respond to Malware attacks

Security is a journey, and adopting a Zero Trust approach is one of your best defenses against attackers. See how Veeam Data Platform can help you move closer to radical resilience and meet your compliance goals. Identifying risks and acting fast are critical when it comes to overcoming a cyberattack. Veeam’s Malware Detection Engine empowers administrators to uncover threats at the time of backup. Powered by AI and machine learning, data is scanned for malware, signs of encryption, and a litany of other indicators. When coupled with the Veeam Incident API, third parties can alert Veeam Data Platform about threats found in production and trigger backups for affected machines.


Strengthen Your Data Protection Security - Four Security Tips to Keep Your Backups Safe

Security is a journey, and adopting a Zero Trust approach is one of your best defenses against attackers. See how Veeam Data Platform can help you move closer to radical resilience and meet your compliance goals. Attackers know that backups are your last line of defense and will do whatever they can to destroy them. Fortunately, Veeam provides the tools you need to ensure recoverability. Strengthen your security posture using tools such as the Security & Compliance Analyzer, Multifactor Authentication, and four‑eyes authorization while measuring your security score with the Veeam Threat Center.


Veeam Data Platform 23H2 Update – Radically Resilient

Every day, attackers are infiltrating networks, destroying key systems, and holding data for ransom. With so many attack vectors, strong security and clear communication has never been so important for IT Operations and Security teams alike. Backups are your last line of defense, and Veeam provides the confidence you need to make a stand against cyberattacks. Join us to discover some of the many key technical capabilities in Veeam Data Platform 23H2. As we walk through and highlight these industry-leading features, we’ll cover the technology behind them as well as what the real-world impact and value is for customers.


Journey to Scale: Overcoming the Challenges of Managing AKS Infrastructure as You Scale

In this podcast, veteran technology journalist John K. Waters talks with two subject matter experts, Shon Harris of Spot by NetApp and Ayo Ayodeji, Senior Program Manager in Microsoft's Azure Technology Strategy group, to clarify the common challenges faced by app dev teams working with AKS—challenges that can lead to overwork and real burnout, even among the members of the most sophisticated teams. And they'll outline the best practices for scaling AKS infrastructure and keeping costs in check.


The Three Pillars of Successful Azure Cloud Operations

Learn how to get started adopting the CloudOps practices, processes, and tooling that will enhance engineering agility in your organization, reduce team burnout. and maximize your ROI from Azure cloud. Join to learn more!


2024 Ransomware Outlook Summit

Is your team ready for the new wave of ransomware attacks? Register for this free, expert-led summit to learn everything you need to know about emerging attack methods, the biggest targets, the most likely culprits, and the tried-and-true ways to reduce your risk and bounce back from an attack if (or when) one happens. Don’t delay – sign up now!


Coffee Talk: The Security Case Against VPNs

While there can be security advantages to using a VPN, VPNs can also be harmful from a security perspective. This webcast examines the true security implications of using a VPN. Register today!


Mastering Security Orchestration: Automating Response and Remediation with Microsoft Sentinel Combined with Azure OpenAI

Join us for the second part of our two-part series for a deep dive into the world of automated and orchestrated response remediation with Microsoft Sentinel and AzureOpenAI.


Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods

Your digital identity is the gateway to your organization's most valuable assets. Watch this webinar now to learn how to keep your fortress secure!


What’s Attacking Your Multicloud Today

Join Ian Thornton-Trump CD, CISO for Cyjax Ltd. as he ponders strategic level threats and tactical threats based on what has manifested in 2023. Don't miss it!


Q4 Multicloud Security Check Summit: The Top Threats to Your Multicloud Right Now

Don’t let down your guard down! Register for this free, expert-led summit to hear top independent experts share the biggest security trends affecting the multicloud today, the quickest ways to secure your cloud data against attacks, real-world multicloud best practices, and the newest tools available to ensure your multicloud environment doesn’t get compromised.


Maximize Your Cloud Security

Join Insight for a webinar and hear experts share information about Managed Security Services (MSS) available to help you fight the battle to keep data secure. You’ll learn about how to manage security without sacrificing productivity, governance or compliance.


Optimize your IT Environment with Red Hat and AWS

This webinar describes how setting a foundation on Red Hat Enterprise Linux for both on-site datacenter and AWS environments can help you improve productivity, security, and operations as you move to the cloud and adapt to an increasingly digital world. Join in to learn more!


How to Guard Your Microsoft 365 Investment: Email Security Strategies

Join our cybersecurity experts Mark Harris and Brette Petersen for practical guidance on enhancing native Microsoft 365 email security to learn how to assess existing gaps in your current email security posture, when your organization should consider implementing additional security controls, and more.


Safeguarding Microsoft 365 Summit: Modern Security Best Practices for 2024 and Beyond

Join this three-hour, expert-led summit where you’ll learn the most common Microsoft 365 weak spots, the newest emerging attack vectors and methods, the best ways to mitigate these threats, and much more. Don’t wait – register today!