Webcasts


On Demand

Why Machine Identity Management is Essential to Establish Zero Trust

In this webinar, we'll discuss why machine identity management is a crucial component in establishing a robust Zero Trust architecture, and how you can successfully gain better visibility over machine identities and automate the process of managing them.


Microsoft 365 Security: Top Installation, Configuration and Management Mistakes and "Gotchas"

During this 60-minute session, Nathan O’Bryan (Microsoft Certified Solutions Master: Messaging/5x Microsoft Most Valuable Professional) will dive into the EM+S E5 suite and the features it brings to help secure your Microsoft 365 deployment. Learn more.


Top 10 Microsoft 365 Security Best Practices Every Organization Must Implement

In this session, we will look at the top 10 things you should consider right away to make your Microsoft 365 environment as secure as possible! Learn more.


Microsoft Office 365 Security Summit

Join the editors of Redmondmag along with Microsoft 365 experts for this informative and free half-day summit on Microsoft 365 Security: Top Installation, Configuration and Management Mistakes and "Gotchas" and the top 10 Microsoft 365 Security Best Practices Every Organization Must Implement. Learn more.


Hybrid Clouds/Multi-Clouds in 2022 and Beyond Summit

It's a hybrid-cloud/multi-cloud world. Find out the best tips, tools and best practices to support your new infrastructure.


The Silent Scream of Every Network: The Horror that is Active Directory Security

Join us and let Derek Melber, 17X Microsoft MVP show you how to operate on the beast, making it capable of withstanding the constant attacks. Learn more.


How to prepare for the upcoming Microsoft 365 price increase

Starting March 1, 2022, Microsoft will raise the fees of three products. For an organization with 20,000 employees, this M365 E3 uplift would cost an additional $960,000 per year. And, not actively measuring and managing these licenses often results in two costly challenges.


Administrative Delegation and Policy Control in Microsoft 365

With security breaches on the rise, it is more important than ever for an organization to minimize its risk by separating administrative responsibilities. Even so, the Microsoft 365 native tools make it difficult to delegate administrative tasks at a granular level. This becomes far more challenging in multi-tenant environments.


What's Ahead for Your Remote Workforce in 2022 Summit

Join the editors of Redmondmag.com and Virtualization & Cloud Review have pulled together this free half-day summit promoting what you need to know heading into the new year -- top trends and best practices that will keep your new remote workforce infrastructure not only secure and compliant but functional and cost-efficient into 2022 and beyond. Learn more.


Modern Ransomware Defense & Remediation Summit

Find out the best way to get your defense plan in place with this free half-day summit brought to you by the editors of Virtualization & Cloud Review, AWSInsider.net and Redmondmag.com. Learn more.


Evolving Digital Operations: People, Process & Technology Summit

Using automation as part of your digital transformation strategy is key for every IT manager in 2022 -- but do you know where to start? Or how to be successful? Do you have the tools to get you where you need to go?


Enterprise Cloud Backup & Recovery in 2022 Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSInsider.net for this free half-day summit along with independent experts who will help get you up to speed with real-world tools and techniques you need to know about Cloud Backup and Recovery in 2022. Learn more.


Top Best Practices for Windows Enterprise Security Heading Into 2022

Join Ian Thornton-Trump CD for a look at all the security goodness built into the Windows Operating system to thwart malicious attacks and dive into the Windows security ecosystem and discuss his top security tips and system hardening ideas.


Microsoft Security in 2022 Summit

The editors of Redmondmag.com have created this half-day summit to get you up to speed on exactly what's happening with Microsoft's Security Roadmap plus give you tips, advice and best practices you can use right away to secure your Windows-based ecosystem. Learn more.


Understanding and Protecting Kerberos – The Soft Underbelly of Cybersecurity

With the advent of Active Directory more than 20 years ago, the Kerberos protocol was a game-changer in terms of security, unification, and moving AD into the realm of identity management. Learn more.