On Demand
There can be many reasons why your organization might need to do an Active Directory migration. No matter the reason, you are going to have to make a decision about what tools to use. Learn more.
Join this webinar as our cybersecurity expert explains how you can implement the FBI's recommendations to mitigate BEC scams. Learn more.
In this webinar, we'll share the latest tips for beating ransomware by assessing the threatscape and steps you can take to protect your data. Learn more.
Company exposure today can appear in many sizes and forms. As a business ecosystem expands so do the risks, whatever the size of the company. By using the latest thinking from Microsoft, BlueVoyant is helping customers optimize their Microsoft 365 E5 license. By working with an expert to unite the security tools from one manufacturer, you can not only save money, time and resources but concentrate on managing those risks that actually have the potential to disrupt your business. Learn more.
In this practical, hands-on session, Microsoft MVP Tim Warner reviews the most important proven practices in hybrid cloud computing. Learn more.
Join Greg Schulz of Server StorageIO as he looks at various cloud options and scenarios including pro’s, con’s and scenarios for Public vs. Private vs. Hybrid, from core to edge and other points in between. Learn more.
This free three-hour virtual event brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com will make sure you have what you need to know about best practices for making the most of a hybrid cloud infrastructure. Learn more.
Join BlueVoyant’s Director of Microsoft Security Solutions, Micah Heaton, as he recaps their M365 E5 license bundle conversation from last October and shares insights on announcements made at Microsoft Ignite around Endpoint Management, Information Protection, and Identity and Access Management. Learn more.
Join the editors of Redmondmag.com along with independent experts who will share their insights on what you need to do NOW to make sure your remote workforce and digital workplace is protected for the future. Learn more.
Hear from independent infosec experts and the editors of Redmondmag.com on the top security concerns you need to be concerned about now and the best practices you can implement to mitigate them. Learn more.
Join the editors of Redmondmag.com plus independent technology experts as they share their insights to guide you through the top tips you need to know when considering your infrastructure of a remote future. Learn more.
Join us for this webcast to learn how can educational institutions better manage the security of their remote workforce. Learn more.
Join this webcast for an in-depth discussion about the SolarWinds attack, and learn best practices and strategies to strengthen your defenses. Learn more.
Attend this session of our Modern Cloud Data Protection Summit and walk away with top tips and best practices around cloud data protection. Learn more.
In this timely session, Editorial Director Scott Bekker and security expert Ian Thornton-Trump will have a conversation about what cloud data protection requires in light of the revelations. Learn more.