Webcasts


On Demand

How to Fight Long-Game Social Engineering Attacks

Don’t get caught in the trap of long-game social engineering! Learn how to spot these attacks before they happen. Join us!


8 Reasons Teams Fall Short on AD Forest and Ransomware Recovery

Join our upcoming webinar to address the critical need for a robust Active Directory (AD) Forest recovery solution. Experts will cover the latest threats, common pitfalls, and effective recovery strategies. Don’t miss this chance to fortify your organization’s AD resilience—register now!


Ask Us Anything: Key Pillars to Harnessing the Power of Enterprise AI

Join our webcast to uncover the key elements of a successful Enterprise AI platform, control costs, and deploy AI apps in a cloud-native format. Our experts will help you understand AI integration, agile app deployment, and data security enhancement. Sign up now to transform your AI strategy


Achieving Cyber Resilience for Hybrid Workloads: Deep Dive Demo and Panel Discussion

Join experts from ESG, Microsoft, and Commvault for a discussion and deep-dive demo into data resilience and recoverability for hybrid workloads.


How to Keep Data Safe and Recoverable with Cleanroom Recovery

Check out this webinar to learn how to empower your organization against the relentless tide of cyber threats and fortify your data recovery processes with proven, innovative techniques.


Ransomware Recovery: Prepare for Ransomware by Implementing a Cyber Resilience Strategy

Check out this on-demand webinar where Commvault delves into the intricacies of ransomware recover and the shifting landscape of cyber security.


Embrace the Breach: Business Continuity with Cleanroom Recovery

Watch now to discover how Commvault Cleanroom Recovery enables continuous testing and rapid resilience to combat cyber threats within hybrid enterprises.


Leaders in Tech Series | Mid-Year Cybersecurity Trends Review: Top Threats To Know

Join our free virtual event to learn the latest strategies that attackers are using today, and the most useful tools and best practices you can implement to stop them. Get expert insights from some of the top experts in cybersecurity on how to identify and fix the most exploitable weaknesses in your organization. Don't let down your guard -- register today!


Microsoft 365 Data Protection Insights

Join us to as we reveal the highly anticipated findings of the 2024 Cloud Protection Trends Report, which surveyed 1,600 IT leaders on their data protection strategy. We’ll explore the latest insights into Microsoft 365 cloud-powered protection mechanisms for production data located both on and off-site — including BaaS and DRaaS.


Coffee Talk | AI-ready Datacenter Network Strategies

Learn how to make AI/ML work for your datacenter network operations in our free 30-minute Coffee Talk. Get expert insights into latest trends and best practices for building AI-ready networks today to maximize the value of AI applications tomorrow.


Mastering Telemetry Pipelines: Driving Compliance and Data Optimization

Join our webcast to unlock the full potential of telemetry pipelines! Learn how to optimize data for log reduction, enhance compliance, and leverage real-time data actions. Don't miss this chance to transform your enterprise's observability and compliance strategies.


Fireside Chat: Navigating Cyber Security with Microsoft Sentinel & Security Co-Pilot

Don't miss this chance to gain actionable insights and strategic guidance from industry leaders. Join us for an enlightening Fireside Chat to empower your cyber security strategy!


Top Threat Monitoring Implementation Strategies

Join Greg Schulz, Author, founder, and Sr. Analyst of Server StorageIO and Microsoft MVP (CDM), as he discusses top threat monitoring implementation strategies. Greg will discuss industry trends, technologies and techniques, best practices, and implementation strategies.


Detect Early and Detect Often: The Case for Threat Monitoring

In an era when cyber threats evolve at an unprecedented rate, proactive threat monitoring has never been more critical. This webinar will equip IT professionals, IT managers, and business professionals with knowledge and strategies to enhance their organizations' cybersecurity posture. Join us!


Threat Monitoring for SMBs and Enterprises Summit: The Hows, Whys and Gotchas

Get the answers straight from the experts in this free, three-hour summit, where you'll learn the ins and outs of threat monitoring, how to do it right, and the biggest traps to avoid. Register today!