Webcasts


On Demand

Hybrid Cloud Security Summit

A hybrid cloud infrastructure just makes sense for many organizations. Most enterprises use a variety of cloud types and services -- and rightly so -- but unfortunately, that’s going to complicate your security strategy. Learn the tips, tricks, do's, don'ts and modern best practices of experts who secure (and recover) these systems on a daily basis. If you're responsible for your organization's cloud infrastructure in any way, this is the summit you don't want to miss!


Best Practices to Understand and Fight Ransomware with Nutanix

Ransomware is today’s number one threat affecting businesses of all sizes. During this session you’ll learn and understand about The current state of ransomware and how it’s evolved, including the new threat landscape, Industry best practices around planning and preparing for a ransomware incident, and more!


Azure & Your Digital Transformation Summit

Microsoft's Azure cloud technology has so much to offer enterprises, but most IT leaders can't keep up with all the relevant changes. And Azure can be the key to your digital transformation strategy, but only if you understand how it can lead your efforts toward application modernization, reducing technical debt, and more. That's why the editors of Redmondmag.com have joined with independent experts and MVPs, plus leaders from Microsoft and SoftwareONE, to walk you through what's new in Azure and how it can truly be the linchpin for your organization's digital transformation strategy. You don't want to miss this free, half-day summit -- register now!


Securing, Managing and Recovering Microsoft Teams Summit

The editors of Redmondmag.com have joined with independent experts to create this this free half-day summit that will walk you through current best practices for managing, securing and recovering Microsoft Teams, offering real-word advice, top tips and solutions.You don't want to miss it!


Microsoft Teams Management Best Practices

In this session, Nathan O’Bryan (MCSM: Messaging, MVPr Office 365) will explore Best Practices for Securing, Managing and Recovering Microsoft Teams to ensure security, and compliance while maintaining the appropriate levels of access for end-users.


Microsoft Teams Security & Recovery Best Practices

Since the onset of the pandemic over two years ago, Microsoft Teams has become one of the world’s most indispensable applications. This session discusses various Microsoft best practices as they relate to Teams security, data protection, and recovery.


Zero Trust 101 Summit

Join the editors of Virtualization & Cloud Review and Redmondmag.com for this free, half-day virtual summit bringing together independent experts who will walk you through what zero trust is and the best ways to implement it in your enterprise.


Hybrid Cloud Data Backup & Recovery Summit

With all the threats attacking your hybrid cloud infrastructure, you know how important reliable data backup and disaster recovery is -- and with the shared responsibility model, it's really up to you to make sure you can get things right (and quickly!) Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSInsider.net for this free half-day summit along with independent experts who will help get you up to speed with real-world best practices for hybrid cloud enterprise backup and disaster recovery in 2022 and beyond.


Expert Hands-On Disaster Recovery Best Practices for Hybrid Infrastructures

Disasters take many forms when they strike IT systems. Are you ready to spring into action with a concise plan, restoring your company's systems quickly and safely? Join this session to learn DR best practices proven in the field by seasoned IT veterans. Understanding what works and what doesn’t could make all the difference when disaster strikes, and time is of the essence.


Top Infrastructure Tips for Hybrid Cloud Backup & Disaster Recovery Data

In this session, you will learn about the types of disaster recovery options that are available, how they protect your data, and some strategies for providing good data protection at several different price points.


Modern Hybrid Cloud Security Summit

The editors of Redmondmag.com, Virtualization & Cloud Review, and AWSInsider.net have brought together independent security experts for this free, half-day summit that will walk you through the security threats you can expect to face in the new year plus the real-world best practice advice you can implement right way. Don't miss out!


Build Your Cloud Business Case Backed by Data Insights

Running your workload in the cloud provides an opportunity to take advantage of new technical and financial opportunities. When considering a cloud migration and building a cloud business case, it is important to understand the vast number of options that are available for you. It is also critical to find effective solutions to manage and optimize your cloud spend once you are in the cloud. View this on-demand session to learn how cloud economics and FinOps can help you understand the opportunities the cloud provides and mechanisms to manage spend in a new environment.


What is Your 12-Month ITAM Roadmap? Building Your Program Around SaaS and Cloud

The shift to SaaS and cloud technologies has been a top discussion in ITAM circles for years. In 2022, ITAM teams without a plan to manage SaaS or cloud within their program will get left behind and miss delivering significant value to their organization. A new approach is needed in ITAM to get more teams to manage SaaS and cloud technologies. So, what's the next step to preparing your organization?


Unintended Consequences of Transitioning to the Cloud

Organizations struggle to maximize the value of their IT investments. But surprisingly few CIOs are prepared for the optimization challenges magnified by hybrid IT as more software, SaaS, containers, and cloud are introduced into the environment. This on-demand session examines where the market is going (hint, subscription models are the future) and explore the impacts on the traditional roles of asset management, procurement, and cloud teams.


Is Your Zero Trust Evaluating the Right Identity?

Authentication, despite forming the basis of every security strategy, cannot be overlooked as a minor cog in the wheel. With hybrid model of working being the norm, it is imperative for authentication to be context-aware, and sensitive to all unique userrelated cases. Learn more!