Webcasts


On Demand

Cloud Data Protection & Disaster Recovery Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSinsider.net have created this free, half-day virtual event pulling together independent experts who will walk you through real-life techniques, best practices and more for helping you keep your cloud data protected and truly recoverable in 2022 and beyond. Learn more.


Expert Cloud Data Backup & Recovery Best Practices

In this session, Karen Lopez covers best practices for modern data recovery and shares stories of worst practices just to keep it real. Learn more.


Microsoft 365 & Teams Heading into 2022 Summit

You won't want to miss this free, half-day summit brought to you by the editors of Redmondmag.com to catch you up on what you need to know about Microsoft 365 & Teams heading into the New Year. Learn more.


Key Digital Transformation Best Practices

In this session, Senior Resultant Howard M. Cohen will take you through some smaller digital transformations, finding new ways to make small but meaningful process improvements through more innovative applications of available technologies. Learn more.


The Digital Transformation Landscape in 2022

In this session, we will discuss strategies that IT professionals can use to properly define digital transformation and develop an action plan to implement it. Learn more.


Digital Transformation in 2022 Summit

Don't miss this half-day summit brought to you by the editors of Virtualization & Cloud Review, Redmondmag.com, PureAI.com, AWSInsider.net, MCPmag.com and ADTmag.com where you'll learn about how digital transformation has transformed for 2022 and how you can take steps now to take advantage of it in the coming year and beyond. Don't miss out!


Managing & Securing End User Computing Summit

Come watch the editors of Redmondmag.com and Virtualization & Cloud Review at this half-day event featuring independent experts to review best practices for securing your remote workforce.


Securing the Remote Workplace

There is a new security threat being exploited. In addition, there are various regulatory requirements that need to be met to ensure successful implementations.


Top Multi-Cloud Trends Impacting Enterprise IT

In this session we’ll explore why companies are becoming so much more deliberate in their approach to multi-cloud, including: Enjoying the best of all clouds, The importance of avoiding vendor lock-in and more! Learn more.


Multi-Cloud Trends to Watch in 2022 Summit

Join us for this half-day summit that will walk you through the security threats you can expect to face in the new year plus the real-world best practice advice you can implement right way. Learn more.


Multi-Cloud Best Practices Heading into 2022

As cloud adoption has grown over time, many companies have solutions spread across different cloud vendors and on-premises. Multi-cloud can be very effective, enabling you to leverage the best of all options, however it must be implemented correctly to prevent issues.


Cloud Security 101: Top Enterprise Cloud Setup & Configuration Best Practices

Join us as a Cloud Security Architect covers the fundamental practices every enterprise must consider for comprehensive cloud management and security. Learn more.


Getting Started with Cloud Security Summit

What are the current best practices for the modern IT enterprise? Find out in this half-day summit from the editors of Virtualization & Cloud Review.


Ransomware: Top Threats and Best Practices Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSinsider.net for this half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practice advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Learn more.


Why Machine Identity Management is Essential to Establish Zero Trust

In this webinar, we'll discuss why machine identity management is a crucial component in establishing a robust Zero Trust architecture, and how you can successfully gain better visibility over machine identities and automate the process of managing them.