Webcasts


On Demand

Managing and Securing the User Identity Lifecycle with ADManager Plus

This webinar can help you deploy an effective identity governance and administration (IGA) solution that will improve your organization's security posture and also increase operational efficiency. Learn more!


Coffee Talk: Preparing for the Continuing Remote Workforce

In this session, Senior Resultant Howard M. Cohen will explore what needs to be done to thoroughly prepare an organization for ongoing work-from-home. Learn more!


Ransomware & Cloud Data Protection Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSInsider.net for this half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practical advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Don't miss out!


Modern Cloud Data Protection Best Practices

In this session, you will hear from two industry experts on Modern Cloud Data Protection Strategies and Best Practices. This will give you the knowledge required to help improve your security posture in 2023 and beyond. Learn more!


Powerful Phone for Microsoft Teams

During this session, industry experts will share insights and guidance on how to support your hybrid workforce by through flexible telephony capabilities, empowering you to choose what's best for your organization. Don't miss it!


Unified Communications Outlook for 2023

Join Senior Resultant Howard M. Cohen as he kicks off this exciting Summit. You think you know what’s possible with UCaaS? You may want to think again!!! Don't miss it!


Unified Communications in 2023 Summit

Top enterprise unified communications trends and best practices, including Microsoft Teams integration, heading into 2023, brought to you by the editors of Redmondmag.com.


Coffee Talk: Hybrid Cloud Data Protection 101

In this session, we'll look at the current state of hybrid and multi-cloud and where we are in the advancement of security and network performance management. It's all about the data, as always, so our focus will be on how data moves among clouds and how we keep it safe as it does. Don't miss it!


Real Life IR: Hunting Through the Incident Lifecycle

Most enterprises face significant financial, reputational, intellectual property, and legal risks from data breaches. In 2021, the average number of cyberattacks and data breaches increased by 30%*. With this in mind, organizations must treat cyber incident preparedness and response as more than just a checkbox in today’s businesses. Access the webcast with Dave Wagner, Associate Managing Director, Head of Response Operations, at Kroll.


Azure AD/Active Directory Security Best Practices for 2023

Learn where your Active Directory priorities should be for the coming year. Don't miss it!


Azure AD & Active Directory: What's Hot in 50 Minutes

In this session, Nathan O’Bryan (MCSM: Messaging, MVPr Office 365) will explore Best Practices for configuring your Azure Active Directory to ensure security, and compliance while maintaining the appropriate levels of access for end-users. Learn more!


Managing & Securing Active Directory & Azure AD Summit

The editors of Redmondmag.com have put together this free half-day summit by bringing you independent Azure AD/Active Directory experts to walk you through the new best practices for wielding Azure AD/Active Directory to your best advantage. Don't miss out!


Microsoft Ignite 2022 Round-Up

Catch up on everything that happens at Microsoft Ignite 2022 with the editors of Redmondmag.com.


Hot Trends in Cloud Data & Databases for Enterprises Summit

Top tips and best practices for cloud data heading into the new year. Make sure you're ready for all things data & cloud with this free half-day summit from the editors of Virtualization & Cloud Review, Redmondmag.com & AWSInsider.net.


Reducing Cybersecurity Debt with IGA

Join us to learn from Debs Ghosh, Technical Evangelist at ManageEngine, as she explains the reasons for the increase in cybersecurity debt and how companies must focus on establishing an identity-based security strategy, which can be done with the help of IGA. You don't want to miss this!