Webcasts


On Demand

Why You Need End User Ransomware Training (and How To Do It So They Listen) Summit

Join some of the industry's top security experts for this three-hour crash course on how to foster a culture of cybersecurity vigilance in your organization.


Microsoft 365 Backup & Recovery 101: What To Avoid, What To Do and How To Manage It Summit

Join us for this free, half-day summit where some of the industry’s top independent experts will share their tried-and-true methods for designing, implementing and managing a disaster-proof Microsoft 365 backup and recovery plan. Make sure your Microsoft 365 data doesn’t get lost to the ether if (or when) disaster strikes – register today!


Top 7 Microsoft 365 Backup & Recovery Challenges (and How To Overcome Them)

If you are an IT professional or a business leader, and you use Exchange, SharePoint, Teams, or other Microsoft 365 applications, you will benefit from this session. This session will help you ensure the security and availability of your Microsoft 365 data and services.


Modern Microsoft 365 Backup & Recovery Best Practices for Modern Disasters

Microsoft 365 creates a far more granular environment in which users and their resources are often far more isolated than before, potentially creating far greater resilience than ever if managed properly. In this session, Senior Resultant Howard M. Cohen looks forward to suggest how we can better prepare our networks, our data, our devices, and our people to survive and successfully recover from all these modern disasters and more.


Open-Source Intelligence (OSINT): Learn the Methods Bad Actors Use to Hack Your Organization

Join Rosa Smothers, former CIA Cyber Threat Analyst and Technical Intelligence Officer, now KnowBe4’s SVP of Cyber Operations, as she reveals the OSINT techniques employed by cybercriminals that can help you protect your organization before disaster strikes.


Coffee Talk: End User Experience Monitoring 101

Are you struggling to understand user complaints about application performance? Register Now to learn how monitoring end user experience can help you better optimize your applications and more! thank you


Prisma SASE: Your branch has changed. Your SD-WAN should, too.

In today’s fast-changing technology landscape, businesses across all industries are reimagining the architecture for their branches, allowing them to be agile and better serve their customers. Join SDxCentral and Palo Alto Networks for this exclusive online event and see how next-gen SD-WAN and SASE can help you modernize and secure your branches.


Azure Virtual Desktop Summit: Build a Better Virtual Desktop & Identity Migration Strategy to the Cloud

Our panel of experts and industry insiders will help you determine the best ways to plan, configure, migrate and manage your most critical infrastructure solutions for the cloud era. Whether you’re looking to learn more about cloud-based identity management with Entra or cloud-based VDI with Azure Virtual Desktop (or both!), we’ll guide you through the intricacies of building a more secure, scalable and cost-effective environment. Register today!


Moving Workstations to the Cloud: You Can Get There From Here

Join Scott Lilly, Quest Product Manager & Joe Sharmer, Quest Principal Strategic Systems Architect as they discuss options that don’t require a complete reimage of your devices.


Zero Trust-Focused End User Training Tips, Tricks and Pitfalls

Join Greg Schulz, Author and senior analyst at Server StorageIO and Microsoft MVP Cloud Data Center Management, as he discusses moving beyond the what and why to zero trust-focused end-user training, tips, best practices, and what to watch out for.


Trust No One Summit: Why You Should Modernize Your Security Posture with Zero Trust (and How To Do It)

Join this free, three-hour summit to get the expert guidance and insight you need to start modernizing your organization’s security infrastructure. Learn more!


Hybrid Cloud Backup All Demo Session: From Deployment to Day 2 Operations

In this All Demo webinar, two technologists from the Product Strategy team will point and click you through the critical setup steps, showing users of Veeam Backup & Replication™ and Veeam ONE™ just how easy it is to pivot your installation to natively protecting cloud hosted workloads in AWS, Microsoft Azure and Google Cloud.


Standardizing Backups Across Hybrid Cloud

In this webinar Veeam cloud subject matter experts share hybrid cloud data protection best practices, reference architectures and demos as a how-to for lowering costs, bettering security and standardizing backups across your hybrid cloud.


Strengthen Your Data Protection Security - Detect and respond to Malware attacks

Security is a journey, and adopting a Zero Trust approach is one of your best defenses against attackers. See how Veeam Data Platform can help you move closer to radical resilience and meet your compliance goals. Identifying risks and acting fast are critical when it comes to overcoming a cyberattack. Veeam’s Malware Detection Engine empowers administrators to uncover threats at the time of backup. Powered by AI and machine learning, data is scanned for malware, signs of encryption, and a litany of other indicators. When coupled with the Veeam Incident API, third parties can alert Veeam Data Platform about threats found in production and trigger backups for affected machines.


Strengthen Your Data Protection Security - Four Security Tips to Keep Your Backups Safe

Security is a journey, and adopting a Zero Trust approach is one of your best defenses against attackers. See how Veeam Data Platform can help you move closer to radical resilience and meet your compliance goals. Attackers know that backups are your last line of defense and will do whatever they can to destroy them. Fortunately, Veeam provides the tools you need to ensure recoverability. Strengthen your security posture using tools such as the Security & Compliance Analyzer, Multifactor Authentication, and four‑eyes authorization while measuring your security score with the Veeam Threat Center.