Webcasts


On Demand

#1 Office 365 Backup: Technical Deep Dive

Join this webcast and learn about the infrastructure components, and how simple it is to use Veeam Backup for Microsoft Office 365 — from the early planning stage all the way to performing restores. Learn more.


Implement DMARC the Right Way to Keep Phishing Attacks Out of Your Inbox

​​​​​​​Get the details you need to know now to protect your organization from phishing and social engineering attacks. Learn more.


Top Hybrid Cloud Data Dos and Don'ts

Join this session of summit to learn about networking, authentication, security, and monitoring concerns, and techniques for resolving them. Learn more!


Hybrid Cloud Data Summit

To help guide you the editors of Virtualization & Cloud Review, AWSinsider.net and Redmondmag.com have teamed up with independent cloud experts to show you how architecture, best practices, security protocols, new tools and much more can make your job managing these systems so much easier. Learn more!


Expert Hybrid Cloud Data Tips & Infrastructure Best Practices

Join us as Howard M. Cohen examines how to approach data management and protection in today’s hybrid environments. Learn more.


Best Practices for Implementing, Managing and Optimizing Office 365/Microsoft 365

This informative presentation provides practical tips that administrators can use to make sure that they deploy Microsoft 365 in a way that truly meets the organization’s needs. Learn more.


Microsoft Office 365 for Enterprises Summit

This half-day summit brings together the editors of Redmondmag.com plus independent experts to show IT pros how they can maximize Microsoft Office 365 in their enterprise environment. Learn more.


Top Security Concerns Every Enterprise Must Know for Office 365/Microsoft 365

This session will provide expert advice and insight on optimizing and securing your organization’s Office 365 infrastructure today and preparing and upgrading it for tomorrow. Learn more.


Protecting Your Organization Against Zero-Day Vulnerabilities

Join us as we take a deep dive into the process of these Proxylogon attacks and use this information to establish steps you can take to keep your organization secure from similar zero-day attacks using a strong SIEM framework. Learn more.


The New Reality: How Covid-19 Changed Everything

Join us for this session of summit to learn how others are evaluating and planning how and where work will be happening going forward.  Learn more.


Transforming Your Remote Workforce Summit

The editors of Redmondmag.com and Virtualization & Cloud Review, along with independent experts, will provide expert advice and insight on optimizing and securing your prospect's infrastructure today and preparing and upgrading it for tomorrow.  Learn more.


4 Hybrid Identity Security Pitfalls You Probably Already Forgot About

Over the past 18 months, it’s likely you’ve forgotten about potential risks that existed when expanding to the cloud. Learn more.


Secure and Extend Your AD Environments: Starling CertAccess + Active Roles

Join us for this webcast from IAM Security analyst experts to hear the top considerations and pitfalls to avoid when determining your IAM Active Directory (AD) security and management strategy. Learn more.


The Good, Bad, and the Ugly of the Rush to Remote Work

For this session Tom Fenton reached out to his friends in the industry to get their insights and he will go over what they and he has learned over the last year: the good, the bad and, of course, the ugly of enabling remote workers. Get the useful details.


Next-generation Approaches to End-User Computing in 2021

Join us for this session as we discuss how the pandemic began to grip the world in early 2020 and kicked off a forced march to remote work. Learn more.