Webcasts


On Demand

Meeting Enterprise Telephony Needs for Microsoft Teams via Direct Routing

Join this webinar on how to navigate Direct Routing and unleash the full potential of enterprise-grade communications to your Microsoft Teams users. Learn more.


Microsoft Sentinel & Managed SIEM Responsibilities in the Enterprise World

Join BlueVoyant’s Director of Microsoft Security Solutions, Micah Heaton, as he discusses the potential application of Azure Sentinel in your Microsoft cloud environments. He will explore how to accelerate internal adoption timelines for protecting user identity, devices, and data, and demonstrate a strategy for integration Azure Sentinel into your security posture. Read on.


Overcoming Your Top SharePoint Challenges

Join this webcast for a conversation about migrating content to Modern SharePoint from many different sources and the challenges they’ve helped organizations like yours overcome.


Data Protection Across Datacenters, Edges, and the Cloud

Join this webcast for a deep dive into five scenarios around protecting various parts of the Microsoft ecosystem.


Office 365 Security Review Summit

Join the editors of Redmondmag.com and independent security experts to guide you through exactly what you need to know to keep your enterprise installation of Office365 secure and compliant into 2021. Read on.


Office 365 Security Checklist: Quick Steps You Can Take Now to Improve Your Security Posture

Join the editors of Redmondmag.com and independent security experts to guide you through exactly what you need to know to keep your enterprise installation of Office365 secure and compliant into 2021. Read on.


Deep Office 365 Insecurity: An Overview of Big Problems, Complex Threats and Dangerous Trends

Many administrators think Office 365 is totally self-securing, but that's not even close. Find out how to protect against even the biggest, most complex threats to an Office 365 environment. Learn more.


Top Tips for Protecting Active Directory Against Hackers

In this webcast, we will discuss common attack methods used to attain elevated privileges via Active Directory and ways to thwart malicious efforts using a live simulation of a Pass the Hash attack as an example. Learn more.


How HR/HCM Systems Play a Critical Role in IT Security

Join us for this live webcast to learn how HR/HCM systems play a key role in Identity and Access Management (IAM). Learn more.


Using Microsoft Teams To Transition Your Remote Workforce

Join this webcast and learn how to prepare for the next phase of “normalcy” by evaluating your return-to-office preparedness, enabling your conference rooms with Microsoft Teams and discovering the benefits of Microsoft Certified Cloud Video Interop. Learn more.


10 Best Practices for VM Backup

Proper protection and off-site solutions are essential for data availability. Learn more.


Improving Operations is Critical to Multi-Cloud Performance

Join this session as our experts discuss several best practices for improving operational performance across multiple private, public, and hybrid cloud platforms. Read on.


Scaling Efficiently in Multi-Cloud: A Half-day Virtual Summit

Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Join us for this half-day virtual summit to learn what you need to know now about efficiently scaling your multi-cloud environment. Find out more!


Thinking Ahead in Multi-Cloud Implementations to Ensure Security and Compliance

Join the editors of Virtualization & Cloud Review plus an independent cloud architecture expert to find out what exactly you need to do to make sure your multi-cloud, public/private, AWS/Azure/GCP installations are up to snuff.


How the New Normal Puts New Strains on Azure Active Directory

Join us as we discuss the recent stresses placed on Azure Active Directory with its many dependencies on 20-year-old Active Directory technology. You'll get a sense of what Azure AD is doing well, and how Microsoft's technologies can be supplemented for maximum security and IT agility! Learn more.