On Demand
Join us as we examine the components Gartner originally identified when they first defined Zero Trust, and some that have evolved. We'll also examine how to approach it from a broad encompassing level down to as many areas of detail as we can fit into one session.
Join the editors of Redmodmag.com with independent security experts for this free half-day summit that will walk you through real-world best practices, practical advice and new tools you might have missed.
Come join us to learn how to implement best practices for enterprise hybrid multicloud management, such as creating a consistent view across the cloud environments with a unified layer of abstraction and governance and securing managed cloud infrastructure resources across multiple functional areas.
We'll give you the first thing NOT to do right here from the outset: Don't think multi-cloud is too complex to manage, and don't think it's simple. Join this session to learn what's the differences, why choose one cloud over another, and apply DevOps to Multi-Cloud Management to achieve continuous improvement through continuous deployment.
Multicloud is no longer a matter of “if”, it is a matter of “when” and “how”. But how will organizations operationalize and manage Multicloud? In this session, we share best practices and lessons learned from the trenches to help you successfully adopt Multicloud.
Attend this half-day virtual summit to learn what you need to know now about performance and best practices for getting Azure, AWS and GCP to work better together. As always, our summit session content is from the editors of Redmondmag, plus independent experts who offer real-world insight and advice that attendees can use right away!
Join the editors of Virtualization & Cloud Review and Redmondmag.com along with independent data and infosec experts who do this work day-in and day out who will walk you through all the modern tips, tricks and best practices you need to know to truly keep your data secure, no matter your cloud setup.
In this session, you will learn about the basics of protecting your data while gaining the flexibility and speed that the cloud delivers. Learn more!
In this session you will learn about patterns and practices for network security, protecting those pesky storage accounts, and how to plan for effective and secure access for your company and even for third parties who may need to access your data. Learn more!
Time to stop thinking WFH. When people work remotely, they may not be home. Your remote work policies and procedures must include public places too. Join Senior Resultant Howard M. Cohen for a hot cup of info and insight about keeping everyone and everything secure and productive from afar!
It may not be clear exactly what the “next normal” looks like for your organization, but with renewed focus on transformation for nearly every business there is opportunity to rebuild and gain a competitive advantage. Join Harsha Kotikela of Nutanix as he discusses how to implement EUC in the modern era and avoid the mis-steps of the past and how a Citrix on Nutanix solution can help you.
The editors of Virtualization & Cloud Review and Redmondmag.com as well as independent experts who will take a deep-dive into the current status of end user computing technology, review best practices for securing your remote workforce and share real-world knowledge for configuring, maintaining and improving your VDI and other end user computing technology. You won't want to miss it!
Over the past few years, we have seen an unprecedented adoption of remote work. With this in mind, now is a great time to reflect on what we have learned during this time about rapid, large-scale deployments of VDI environments and the best practices around it. People who are new to, or are investigating, VDI will gain insights into how to make their transition from physical to virtual desktops smoother while those who already have a VDI environment in place will pick up tips to help optimize it and provide a better experience for their users.
In this webinar, we'll discuss how a UEBA solution fits into a Zero Trust architecture and how you can implement the same. Learn more!
Ransomware and other cyberthreats are changing business’s needs for data protection across their on-premise, private cloud, SaaS and public cloud environments. Discover the benefits of multi-layered data protection for your Hybrid IT environments.