On Demand
Join us for this webcast as we discuss Attack Surface Reduction, creating valuable Identity Protection Policies, and managing your end user’s experience in the process. Learn more.
Join this webcast and learn about the infrastructure components, and how simple it is to use Veeam Backup for Microsoft Office 365 — from the early planning stage all the way to performing restores. Learn more.
Get the details you need to know now to protect your organization from phishing and social engineering attacks. Learn more.
Join this session of summit to learn about networking, authentication, security, and monitoring concerns, and techniques for resolving them. Learn more!
To help guide you the editors of Virtualization & Cloud Review, AWSinsider.net and Redmondmag.com have teamed up with independent cloud experts to show you how architecture, best practices, security protocols, new tools and much more can make your job managing these systems so much easier. Learn more!
Join us as Howard M. Cohen examines how to approach data management and protection in today’s hybrid environments. Learn more.
This informative presentation provides practical tips that administrators can use to make sure that they deploy Microsoft 365 in a way that truly meets the organization’s needs. Learn more.
This half-day summit brings together the editors of Redmondmag.com plus independent experts to show IT pros how they can maximize Microsoft Office 365 in their enterprise environment. Learn more.
This session will provide expert advice and insight on optimizing and securing your organization’s Office 365 infrastructure today and preparing and upgrading it for tomorrow. Learn more.
Join us as we take a deep dive into the process of these Proxylogon attacks and use this information to establish steps you can take to keep your organization secure from similar zero-day attacks using a strong SIEM framework. Learn more.
Join us for this session of summit to learn how others are evaluating and planning how and where work will be happening going forward. Learn more.
The editors of Redmondmag.com and Virtualization & Cloud Review, along with independent experts, will provide expert advice and insight on optimizing and securing your prospect's infrastructure today and preparing and upgrading it for tomorrow. Learn more.
Over the past 18 months, it’s likely you’ve forgotten about potential risks that existed when expanding to the cloud. Learn more.
Join us for this webcast from IAM Security analyst experts to hear the top considerations and pitfalls to avoid when determining your IAM Active Directory (AD) security and management strategy. Learn more.
For this session Tom Fenton reached out to his friends in the industry to get their insights and he will go over what they and he has learned over the last year: the good, the bad and, of course, the ugly of enabling remote workers. Get the useful details.