Webcasts


On Demand

Managing a Hybrid Cloud Environment: Key Technologies and Tactics to Corral Your Complex Cloud Environment

The hybrid cloud is the reality for many organizations as they balance legacy applications, modern applications with high performance requirements, various public cloud services and cloud backup solutions. Attend this session to learn about key technologies and smart tactics to keep all those disparate applications and all that widespread data under control. Register now.


Public vs. Private vs. Hybrid: What Cloud to Use When and Why (or Why Not)

In this detail-rich session, our cloud architecture expert lays out some of the basic considerations and other concerns that organizations must account for in order to make the right decision about putting data and applications in the public cloud, in a private cloud or in a hybrid cloud. Learn more.


Enterprise Hybrid Cloud Virtual Summit

Join us for this free three-hour virtual event to introduce you to the state of the art and best practices for making the most of a hybrid cloud infrastructure. Key takeaways will include strategies and tactics for addressing top management issues and a framework for understanding the pros and cons of various configuration options. Learn more!


TLS and the Zero Trust Paradigm

Modern cyberattacks are not limited to just network intrusion from the outside. Learn more.


Why Office 365 Backup is Essential

Microsoft provides excellent uptime and availability for Office 365 applications, allowing organizations to stay productive anywhere and at any time. Learn more.


OnDemand Webcast - IT Decision Maker’s Guide To Office 365 Backup

Whether they have completely migrated to Office 365, or have a hybrid exchange and Office 365 deployment, a business’s objectives remain the same. Organizations must remain in control of their data, and with Veeam Backup for Microsoft Office 365 from NewCloud Networks, businesses can take control of their data instantly.


The MITRE ATT&CK Framework and Its Implications on Security Teams

The MITRE ATT&CK™ framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. Learn more.


Office 365 Adoption: The “Dale Carnegie” Approach

Moving to Office 365 introduces a world of collaborative workloads - such as Teams, SharePoint Online, and OneDrive for Business - but driving user adoption of these new platforms can be a huge challenge, especially for larger organizations. Learn more.


Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim?

There is a reason more than half of today’s ransomware victims end up paying the ransom. Learn more.


How Nutanix IT Uses Software-Defined Storage for Simplicity and Flexibility

Nutanix doesn’t just develop next-generation storage solutions for its customers; we actively use them in our internal system. Learn more.


CES 2020: Lenovo’s Latest Innovation Milestone

This webinar will focus on the history of the Lenovo PC as well as introduce the next generation of groundbreaking devices launched at CES 2020. Learn more.


Immediate Steps to Take (or Not Take) When Ransomware Strikes

It usually happens in the middle of the night. Not necessarily because “It must be the Russians!” but because cybercriminals have fully reconnoitered your network and will initiate the encryption of your files when someone is least likely to sound the alarm. Learn more.


Always On. Always Protected. HPE + Veeam: Learn About NEW VAS V10 + HPE Integrations!

For over 10 years, HPE and Veeam® have helped you safeguard your data to ensure it’s always on, protected and your enterprise is able to rapidly and easily recover should a situation arise — from human error to a malicious attack. Learn more.


How Do You Manage External Users in Your Tenant?

Office 365 is an amazing productivity platform for your company. Learn more.


Securing a Hybrid On-Premises/Cloud Directory: Guard Against Common Mistakes

Join this detail-rich session for expert advice on common mistakes, pitfalls, misconfigurations and misunderstandings that can lead to credential or system compromise and other serious security and compliance problems. Learn more!