Webcasts


On Demand

Achieving Zero Trust When Active Directory is In the Way

Zero Trust’s foundational “never trust, always verify” mantra is needed in today’s world filled with daily cyberattacks, successful breaches, increasingly costly ransomware attacks, and mounting compliance pressures. Learn more.


The 4 Pillars of Active Directory Security

In this session, 16X MVP Derek Melber will give you his view of how we need to address AD security, so that we are secure from point "A" to point "B". His four pillars of security approach will give you more than enough to think about, plus immediate action items that you can do when you get back to the office. Learn more.


Put Together a Ransomware Plan for 2021

Attend this special editorial webcast for an after-action report on what happened with ransomware in 2020, as well as best practices for defending against the most likely methods of attack in 2021. Come away from this session with a solid plan for ransomware remediation this year! Learn more.


Hottest Third-Party Cloud Data Products

Join Vice President of Web Becky Nagel as she walks you through a showcase of hot products and the chance to win a pair of high-end BOSE Noise Cancelling Headphones. Learn more.


AWS and Azure Backup and Recovery Best Practices

Join the editors of Virtualization & Cloud Review as well as architect, author, speaker and highly sought after cloud data and data expert Joey D'Antoni as he walks you through how to quickly recover your data in the cloud. Learn more.


Cloud Data in 2021: 10 Things You Need To Know

Join the editors of Virtualization & Cloud Review as well as world-renowned enterprise data architect, speaker and author Karen Lopez for this highly informative session where you'll get caught up to speed on the real-world best practices you need for your enterprise cloud data headed into 2021 (and beyond). Learn more.


Cloud Data Summit

Join the editors of Virtualization & Cloud review plus independent experts who will walk you through the best practices for you to manage, store, secure and restore your cloud-based data, whatever the service or configuration. Learn more.


How to Add the Cloud Into Your Backups

This engaging Webinar explores ways that organizations can incorporate the cloud into their backups, but without implementing radical changes to their data protection infrastructure, policies and operations. Learn more.


How to Secure Your Remote Workforce with a Microsoft-Powered Solution

Keeping your remote workforce and the company data they’re using secure can be an expensive and complicated undertaking. In this webinar you will learn how Microsoft is addressing the issue. Learn more.


Tackling Your Top IT Security Challenges (and Convincing Your C-Suite To Go Along!)

Cyber-security is a "top-down" approach, and with the speed at which technology is advancing, we need to make sure that our security profile is on the cutting edge and everyone is adhering to all the changes and challenges that appear daily. Learn more.


Demo Video: NAS Backup and Recovery

Watch this short demo of the seriously powerful NAS backup capabilities of Veeam® Backup & Replication™. You will see how it’s simple, yet flexible and advanced functionality can allow you to reliably scale protection of massive amounts of data.


Pharma and Healthcare Needs Increased Active Directory Security

The increased attacks on Pharma and Healthcare has caused significant damage to the Covid research and even caused deaths. Core network security needs to be enhanced to reduce the successful attacks. Learn more.


Microsoft Security: Securing Financial Data in the Microsoft Cloud

Join BlueVoyant as we shine a spotlight on the unsung capabilities of Data Leakage Protection, discuss how to apply templatized protection schemes and examine why you no longer need to deploy an expensive classification and protection system for your on-prem and cloud-file repositories. Read on.


The Pesky Password Problem: Policies That Help You Gain the Upper Hand on the Bad Guys

Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, to find out what your password policy should be and learn about the common mistakes organizations make when creating password policy. Learn more


Understanding & Justifying Cloud Costs & Return

Join us to gain an understanding of different IT infrastructure approaches and their respective financial considerations, and learn how to use financial analysis as a framework to optimize IT decision-making. Learn more.