Webcasts


On Demand

Evolving Digital Operations: People, Process & Technology Summit

Using automation as part of your digital transformation strategy is key for every IT manager in 2022 -- but do you know where to start? Or how to be successful? Do you have the tools to get you where you need to go?


Enterprise Cloud Backup & Recovery in 2022 Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSInsider.net for this free half-day summit along with independent experts who will help get you up to speed with real-world tools and techniques you need to know about Cloud Backup and Recovery in 2022. Learn more.


Top Best Practices for Windows Enterprise Security Heading Into 2022

Join Ian Thornton-Trump CD for a look at all the security goodness built into the Windows Operating system to thwart malicious attacks and dive into the Windows security ecosystem and discuss his top security tips and system hardening ideas.


Microsoft Security in 2022 Summit

The editors of Redmondmag.com have created this half-day summit to get you up to speed on exactly what's happening with Microsoft's Security Roadmap plus give you tips, advice and best practices you can use right away to secure your Windows-based ecosystem. Learn more.


Understanding and Protecting Kerberos – The Soft Underbelly of Cybersecurity

With the advent of Active Directory more than 20 years ago, the Kerberos protocol was a game-changer in terms of security, unification, and moving AD into the realm of identity management. Learn more.


2022 State of IT & Digital Transformation Leadership Summit

Don't miss this expert-packed, two-hour summit created for CTOs, CIOs, IT directors, and IT professionals looking for technology trends that will impact them and their market in the new year. Learn more.


Identity & Access Pain Points: Top Issues from AD Integration to SaaS Control to Compliance

During this 60-minute session, Nathan O’Bryan (Microsoft Certified Solutions Master: Messaging/5x Microsoft Most Valuable Professional) will share his top identity management considerations and explain how these choices can have a lasting impact on your Microsoft 365 deployment. Learn more.


Identity & Access Management Summit

In this virtual summit, we look at top issues surrounding IAM, supplementing Active Directory and Azure AD, including SaaS authentication, changing compliance requirements and emerging approaches such as CARTA, continuous and adaptive risk and trust assessment. Learn more.


Identity & Access Management Best Practices: What IT Pros Need to Know Now

Join us to learn the best practices for establishing an IAM architecture that will work with your existing infrastructure and across clouds. Learn more.


Real-World HCI Best Practices

In this session, you will learn essential information about keeping your HCI infrastructure running and looking at future-proofing your designs. Tune into this session for expert industry advice for two of the worlds leading experts in HyperConverged Infrastructure.


Mastering Hyperconvergence Summit

Don't miss this free half-day summit brought to you by the editorial staff of Virtualization & Cloud Review and Redmondmag.com who will bring together independent HCI experts for to walk you through tips, advice, best practices and more that will help you master hyperconvergence. Learn more.


Top Hyperconvergence Infrastructure Tips

In this session, you will hear from two industry experts regarding best practices on managing and maintaining HyperConverged Infrastructure. Learn more.


DevSecOps: Securely Navigating a Shifting Threat Landscape

In this live Tech Talk, veteran technology journalist John K. Waters talks with DevSecOps expert Stephen Walters, solution architect at xMatters, a subsidiary of critical event management company Everbridge, about DevSecOps best practices. Learn more.


Incredible Email Hacks You'd Never Expect

In this webinar Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, explores many ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Learn more.


Part II: Optimizing and Securing Communications in the Hybrid Workplace

This is the secont of a two-part podcast featuring experts from unified communications platform provider RingCentral.