Webcasts


On Demand

Defending Against Active Directory Attacks That Leave No Trace

In this session, an identity and access management expert will walk you through some attack techniques that bypass traditional monitoring solutions. Learn more.


AWS Cloud Security Summit

Are you prepared to manage your entire AWS cloud ecosystem securely? Make sure you're truly secure with this free half-day summit. Learn more.


AWS Security, Backup and Recovery Best Practices

Join us to learn how to protect yourself against ransomware and the latest security threats as we discuss AWS Architectures designed for data protection, backups, and disaster recovery. Learn more.


Threat Detection Thursday — Life of a Zero-Day in the BlueVoyant SOC

Join this panel Q&A commenting on the lessons learned from the angles of Improved Detection, Threat Hunting, and Accelerated Response. 


Ransomware: All About the Benjamins

2021 has been a weird one for ransomware. We've seen more ransomware groups than ever either taken down by law enforcement or decide to "retire" but ransomware attacks have not slowed down at all. Learn more.


Best Practices for Cloud Storage, Backup & Recovery Summit

Don't miss this half-day summit where you will learn best practices and insights you need to make sure, should the worst happen (and it very well could), you can come back up with the click of a button. Learn more.


Fuel Digital Transformation: Changing Document Productivity Challenges into Opportunities

The shift to a hybrid workforce and digital workspaces has caused many organizations to heavily rely on PDF documents, e-signatures and workflows to replace manual in-office processes that no longer meet current business needs. Learn more.


Challenges and Best Practices for Protecting Azure Kubernetes Services

Enterprises all over the world are seeing more mission-critical cloud-native applications deployed on Kubernetes. Learn more.


Transforming Cloud Security with SASE

SASE is a security framework designed to counter threats that thrive in an environment which is invisible and distributed. Learn more.


Modernizing Privileged Access Management: Stopping Cyberattacks in Their Tracks

How can you implement privileged access management where both flexibility and effectiveness are achieved? Learn more.


Best Practices for Managing & Optimizing Microsoft 365

Join us for this session to learn a number of best practices that can enhance SharePoint’s performance. Learn more.


Microsoft 365 and SharePoint Online Best Practices Summit

Don’t miss this summit that will keep you ahead of those changes and give you real-world insights you can use the same day to improve your Microsoft 365 and SharePoint Online installations. Learn more.


Top 10 Security & Backup Tips for Microsoft Office 365 and SharePoint Online

Join us for this session to learn a number of best practices that can enhance SharePoint’s performance. Learn more.


Why it’s Time to Revisit Your Teams Strategy

This Webcast explains why it’s time to take a step back and take a critical look at your organization’s unified communications strategy, especially as it relates to Teams. Learn more.


How You Can Extend the Cloud Perimeter Beyond the Microsoft Cloud

During this webinar, we'll be unpacking some of the deeper integration potential around MCAS and your 3rd party SaaS and PaaS apps. Learn more.