Webcasts


On Demand

Why Healthcare Organizations Need Modern IAM Solutions

Sophisticated IAM solutions that can cater to current requirements such as remote access, and hybrid cloud environments are the need of the hour. In this webinar, we'll discuss the need for healthcare organizations to adopt modern IAM solutions. Learn more!


The Current Ransomware Landscape: A 50-Minute Overview

This presentation will go over the new ransomware landscape and talk about ways organizations can protect themselves from the new threats.


Enterprise Ransomware & Recovery Summit

In this free, half-day summit, the editors of Virtualization & Cloud Review and Redmondmag.com, as well as top infosec and IT experts, will come together to offer you their insights and advice on the current ransomware landscape and what to do if you're attacked. Learn more.


Coffee & the Cloud - Part One: Cloud Acceleration

It’s no secret that more and more organizations are accelerating their adoption of public cloud platforms like AWS, Azure and Google Cloud. While the benefits of innovation, agility and cost savings are often touted, it’s never really that straight forward.


Best Practices for Implementing Zero Trust in Your Organization

Implementing such a major change of becoming a zero trust organization requires strict adherence to best practices. In this session, we discuss the best practices to be successful. Don't miss it!


Getting Started with Zero Trust Security Summit

The editors of Redmondmag.com have put together this free, half-day summit that will walk you through not only the best ways to articulate why zero trust is so important for your organization but also the new best practices as well as top of market tools and solutions that can help you get there.


Top Active Directory Attacks and How to Prevent Them

In this session, Alexandra Weaver, Semperis Solutions Architect, discusses the most common AD security vulnerabilities she encounters in her work with customers, how attackers take advantage of those gaps with examples from recent attacks, and how you can harden your AD security posture to prevent attacks.


Calculating the True Economic Cost and Value of Cloud Environments

Join this session to learn how to measure the true Total Cost of Operations (TCO) in any Cloud environment, steps for faster and more cost-effective application migration to the Cloud, and enable a hybrid multicloud approach to IT operations to help maintain – and grow – business value, revenue, and profits.


Digital Transformation & the Modern Cloud Enterprise

The advantages of "Modern Cloud Enterprise" are available to any company that recognizes the possibilities and comes to trust the technologies. In this session, Senior Resultant Howard M. Cohen illuminates these opportunities and provides a framework for making your own cloud decisions.


Digital Transformation & the Enterprise Cloud Summit

Don't miss this free half-day summit created by the editors of Virtualization & Cloud Review and Redmondmag.com to walk you through how the cloud can transform your enterprise plus practical, real-world tips to get you started on your digital transformation journey. From modernizing your architecture to securing your data, saving money to moving your organization forward, this is the summit you don't want to miss.


Hybrid Cloud Chaos? DMaaS to the Rescue.

Today’s companies face hyper-accelerated cloud transformation, while the pressures are rising: data sprawl across environments, increased threat of cyberattack, and the constant drive to do more with less. The right Data Management as a Service (DMaaS) solution can be a powerful asset for today’s IT orgs – helping them stay ransomware ready, efficient, and prepared to safeguard their data - whatever digital transformation initiative is around the next bend. In this webinar, Metallic CTO David Ngo shares how our technologies help you meet these pressures head-on, paving your way to the future of secure cloud data management.


1,000 Cyber Attacks: New Ransomware Trends Report Insights

There is no better teacher than one’s enemies and no better way to learn than by studying their attacks. Join us to hear the results of one of the largest independent research studies on ransomware preparedness and response, based on 1,000 unbiased organizations across nine countries around the world ― all of whom survived a cyber‑attack. Learn how those organizations persisted through ransomware events and how backup fits within their remediation strategies so you can improve your disaster recovery process.


Ransomware: Secure Backup is your last line of Defense

Veeam® Software is secure by design. Having a reliable backup can be the difference between downtime, data loss and paying a costly ransom. Veeam Software includes instant recovery at scale in case of a massive outage. Plus, our software‑defined approach means there is no lock‑in into proprietary hardware and it works with your existing architecture, both on‑premises and in the cloud.


Veeam Backup & Replication v11 Demo Video – Ransomware Protection

Stop ransomware in its tracks, ensure backup compliance and safeguard your recoverability with immutability for your backup copies.


Microsoft 365 Backup: Myth‑Busting Session

There’s many opinions on whether to protect Microsoft 365 data — but what are the hard facts? Watch this myth‑busting session with Associate Research Director at IDC, Archana Venkatraman, as she shares her latest research and insights.