Webcasts


On Demand

Addressing Endpoint and Data Insecurity in a Post-COVID World

The shifts that have occurred in the last 12 months in the way your organization operates have resulted in a drastically different working environment than what previously existed. Learn how you should go about addressing post-COVID insecurity? Register now.


Active Directory Hybrid Cloud Management: Top Security Risks to Watch For

In this webinar, we'll will discuss the top three security considerations when shifting to a hybrid identity model. Learn more.


Microsoft Teams Summit

It's time for your IT department to become your company's Microsoft Teams hero! Join the editors of Redmondmag.com plus independent experts in this half-day summit that will walk you through what you need to know about configuration, optimization, security, tips and tricks plus more. Learn more.


Simplifying Microsoft 365 Tenant Migrations When M&A Makes it Complicated

The pandemic has created opportunity for plenty of M&A/Divestiture activity. Learn more.


Don’t Do This With Your VM, Physical or NAS Backups: Worst Practices Gallery

So, you think you’ve seen it all? Think again. Join this webcast and learn more.


Hybrid Cloud 101 Summit

Do you know the best practices for setup and configuration? What about the tools that can help? Join the editors of Virtualization & Cloud Review along with independent experts for this information-packed half-day seminar. Learn more.


Hybrid Cloud 102: Best Practices for Hybrid Cloud Enterprise Configuration

Join us for session two of this summit as we look at best practices for Enterprise Hybrid Cloud Configuration and associated topics. Learn more.


Digital Transformation & The Cloud: Expert Best Practices for Transforming Your Enterprise

In this special editorial webcast, experts from Redmondmag.com will walk you through basic steps for considering a major Digital Transformation project. We'll look at everything from identifying stakeholders, rallying organizational support, to determining and securing budget and executing the project. Learn more.


How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches

Active Directory Exploitation Is the Common Thread in Recent High-Profile Attacks. Colonial Pipeline, SolarWinds, Hafnium - every day we hear about a new attack, a new vulnerability, and devastating consequences. Learn more.


Calculating the Impact of Cloud PBX for Microsoft Teams

Join us for this informative webinar to understand the critical nature and impact of selecting the right telephony partner for your Microsoft Teams direct routing deployment. Learn more.


Threat Detection Thursday

Based on methodologies developed though BlueVoyant's continuous research into attacker TTPs and real-world experience in countering espionage and financial crimes, our Threat Hunters will expose expert perspectives on human-driven defense. Learn more.


Enterprise Cloud Wars 2021 Summit

Join for this fun and fast-paced half-day summit where the editors of Redmondmag.com and Virtualization & Cloud Review bring together independent experts to discuss the pros and cons of many of today's top cloud solutions as well as what's working for organizations like yours.  Learn more.


AWS vs. Azure vs. GCP: Public Cloud Smackdown

In this tongue-in-cheek but informative roundtable session, public cloud experts will review what makes different public cloud systems great but also the weaknesses of each and what you might want to watch out for.  Learn more.


Best Practices for Making AWS and Azure Work Together

Join the second session of our Enterprise Cloud Wars 2021 Summit and get insights on what you need to do in your enterprise to make them work well together. Learn more.


Top 5 Identity and Access Management Challenges of 2021 and How to Overcome Them

In this webinar, we'll discuss top five identity and access management challenges IT admins will likely face in 2021 and how to overcome these challenges. Learn more.