On Demand
In this Tech Talk, Kirsten Stoner, technologist at Veeam Software, talks with veteran technology journalist John K. Waters about current cybersecurity challenges in the enterprise, and strategies for protecting your company's most vulnerable assets. Register Now!
In this session, Senior Resultant Howard M. Cohen joined by experts from VMware will discuss the challenges and the best practices to be applied to resolve them. Get ready to have those cloud management headaches go away. Join us!
Find out all of the bases you need to cover to keep your Microsoft 365 resilient and recoverable at all times. In this free Coffee Talk, you’ll learn all the common pitfalls that organizations run into when it comes to Microsoft 365 data recovery, and how to bolster those weaknesses before the worst happens. Don’t wait – register today!
Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4. Join Roger for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware.
Unified endpoint management is critical for the security of your organization and the efficiency of your IT team. Let our experts show you how – register today!
The editors of Redmondmag.com have put together this free half-day summit by bringing you independent Azure AD/Active Directory experts to walk you through the new best practices for wielding Azure AD/Active Directory to your best advantage. Don't miss out!
In this session, we will be looking at how you can properly secure and manage and secure your AD and Entra environments, so your systems, services, and data remain safe and secure. Join in to learn more!
During this 60-minute session, Nathan O’Bryan (Microsoft Certified Solutions Master: Messaging/5x Microsoft Most Valuable Professional) will share his top identity management considerations and explain how these choices can have a lasting impact on your Microsoft 365 deployment.
Join Greg Schulz and Adrian Moir for an interactive discussion on reducing backup and data protection storage costs from on-prem to cloud. They will discuss industry trends, customer pain points, techniques, and best practices to reduce your data footprint impact and how to support exponential data growth without busting your data protection storage budget.
Deception technology has been around since the 1960s, well before Lance Spitzer created The Honeynet Project. Security professionals are very familiar with early forms of deception technology (honeypots, honeynets, honeytokens) and while the techniques are the same, modern deception has moved well beyond these early technologies. Join SentinelOne as we discuss deception technology for a modern defense.
In this expert-led session, we’ll discuss Insight’s wide portfolio of managed services. Learn strategies you can implement for a hands-off approach that will transform operations and innovate your cloud environment.
In this session, Senior Resultant Howard M. Cohen and the Red Canary team will discuss the most prevalent threats and how to develop your protective strategies. Learn more!
Active Directory (AD) is pivotal for user details, network logons, and threat detection. AD Auditing is imperative due to compliance penalties and escalating cyber risks. The webinar explores AD event auditing, breach detection, user tracking, troubleshooting, and seamless compliance fulfilment.
IT and SOC teams should devote a major share of their efforts towards high-end operations such as implementing incident response plans, advanced threat detection, and mitigation strategies. Join in yo learn why and how manual processes harm IT and SOC operations, and more.
Join this webinar, Semperis Senior Solutions Architect Mike Carlson will draw from his years of hands-on experience and use Semperis free community tools to illustrate how to determine whether your organization could pass an identity security assessment.