Webcasts


On Demand

Why Identity Threat Detection and Response Completes XDR

Identity misuse is involved in virtually every successful cybersecurity incident. Because of this, Identity Threat Detection and Response (ITDR) has emerged to encompass the tools and processes that protect identity infrastructures. When combined with XDR (eXtended Detection and Response), this joint solution is the most modern, effective, and efficient approach to protect against cyber adversaries. Join SentinelOne and Gartner for a webinar as we address current adversary techniques driving the need for combined XDR and ITDR, and best practices for implementation.


Building a Better Hybrid Cloud Operating Model for Effective App Delivery

In this Tech Talk, industry expert Paul Nicholson talks with veteran technology journalist John K. Waters about meeting this vexing challenge and the conversation will cover building a better hybrid cloud operating model. Learn more!


5 Considerations for Architecting Across Hybrid Cloud Environments

Join this session to learn different considerations on how to best keep large organizations aligned on a hybrid cloud strategy and best practices for working with multicloud environments.


Modern Application Architecture: Top Dos, Don'ts and Gotchas

Please join us in this session as we discuss several best practices and patterns that will make your application ready for the cloud and ready for DevOps. We'll discuss CI/CD, Microservices, Security Vulnerability checks, and more!


Modern Application Architecture Best Practices Summit

Join this this free, half-day summit covering what's new in application architecture best practices and learn some real-word advice for implementing these best practices. Make sure you're caught up and your apps can be everything they should be -- sign up today!


Application Architecture Best Practices

In this session we’ll explore some of the available architectures and talk about how applying best practices in building software benefits everyone across the enterprise.


Taking a Zero Trust Approach: Key Takeaways from the DoD's Latest Roadmap

Join our webinar for an in-depth look at what this strategy entails and its key objectives. We'll also explore how you can create a Zero Trust environment in your organization to keep threats at bay.


Best Practices for Cloud Security with Microsoft Sentinel: Achieving Real-Time Event Monitoring, Triaging, and Incident Response

In this webinar, we will discuss the challenges of continuous event monitoring, triaging, and incident response in the Microsoft Sentinel service offering. We will cover best practices for configuring Microsoft Sentinel services to exceed industry standards and provide strategies for 24/7 incident response services. Learn more!


Coffee Talk: Top E-mail Security Threats in 2023: What You Need To Know

Register for this Coffee Talk to learn the biggest threats hitting enterprises right now, the latest developments in AI-powered threat detection, and the steps you need to take to make sure your data is kept safe from attackers. Sign up today!


Modern Hybrid Cloud Security & Management Summit

Don't miss this free half-day summit, where the editors of Redmondmag.com, Virtualization & Cloud review and AWSinsider.net will bring together independent cloud management and security experts that will cover modern best practices for managing and securing your modern hybrid cloud infrastructure in 2023.


NIST SP 800-171 for Protecting Controlled Unclassified Information in Non Federal Systems and Organizations

In this webinar, we'll share how ManageEngine AD360 helps you be compliant. Learn how NIST has evolved to keep up with the changing cybersecurity landscape, the cost of non-compliance while dealing with federal data, and more.


Coffee Talk: Digital Transformation & Enterprise Security: Why Managed Detection Response Is the Future

Don't let the security of your enterprise become collateral damage! Register for this free Coffee Talk to learn from top experts how a managed security model can be the best method for locking down your data, protecting your infrastructure from potential attacks, and growing your business worry-free. Sign up today!


MoneyTree Achieves Compliance and Speeds Innovation with AWS and Sumo Logic

Learn how MoneyTree uses AWS and Sumo Logic to help financial institutions better connect with consumers through real-time machine data analytics for operational and security insights.


Best Practices for AWS Monitoring

For many organizations, AWS is central to their ability to compete effectively in today’s digital world. Ensuring the reliability of the applications that power their business can be an important competitive differentiator that requires a robust observability strategy. Learn more.


Group Policy Objects: Active Directory’s Hidden Security Trap

In this Webcast, you will learn various strategies for keeping your group policy objects secure and for adopting a change management system for group policy. Join in to learn more!