On Demand
Join us for this session, where we explore why you should care about ransomware, how to take control of your data and what ransomware can do to businesses. Learn more.
Join Roger as he discusses the good, the bad, and the ugly lessons he learned from his research. He’ll share with you what works, what doesn’t, and what you should absolutely avoid. Learn more.
Mergers, acquisitions, and divestitures are common business activities that can have a huge impact on your Microsoft 365 tenant. Learn more.
Join us to learn how the cyberattack chain model can help IT security teams put in place strategies to “kill” or contain the attack at various stages, and how to better protect their IT ecosystem.
Join Microsoft identity experts as they walk through the most common weak spots in Active Directory configurations—and how to fix them. Learn more.
In the era of distance learning, education institutions have been forced to quickly adapt how their students learn as well as how their educators teach into a completely digital experience. Learn more.
Join this webcast for a discussion on how AD engineers and architects can expand their roles and add value to the company by focusing on developing and implementing a strategy to ensure that AD is secure from malicious intruders. Learn more.
Join us for a discussion about why we think PSTs are an obsolete and potentially dangerous storage location for email. Learn more.
There can be many reasons why your organization might need to do an Active Directory migration. No matter the reason, you are going to have to make a decision about what tools to use. Learn more.
Join this webinar as our cybersecurity expert explains how you can implement the FBI's recommendations to mitigate BEC scams. Learn more.
In this webinar, we'll share the latest tips for beating ransomware by assessing the threatscape and steps you can take to protect your data. Learn more.
Company exposure today can appear in many sizes and forms. As a business ecosystem expands so do the risks, whatever the size of the company. By using the latest thinking from Microsoft, BlueVoyant is helping customers optimize their Microsoft 365 E5 license. By working with an expert to unite the security tools from one manufacturer, you can not only save money, time and resources but concentrate on managing those risks that actually have the potential to disrupt your business. Learn more.
In this practical, hands-on session, Microsoft MVP Tim Warner reviews the most important proven practices in hybrid cloud computing. Learn more.
Join Greg Schulz of Server StorageIO as he looks at various cloud options and scenarios including pro’s, con’s and scenarios for Public vs. Private vs. Hybrid, from core to edge and other points in between. Learn more.
This free three-hour virtual event brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com will make sure you have what you need to know about best practices for making the most of a hybrid cloud infrastructure. Learn more.