Webcasts


On Demand

Top Microsoft Teams Remote Workforce Best Practices

To learn various best practices that you can implement as a way of helping your users to work more efficiently in Microsoft Teams.


Remote Workforce & Microsoft Teams Summit

Join the editors of Redmondmag.com will bring together independent experts to walk you through what's new in Microsoft Teams for remote workforce management plus best practices you need to know surrounding management, security and recovery.


Coffee Talk: Digital Transformation & AIOps: The Future of IT

In this session, we’ll examine the growth of AIOps, discussing not only how it can be applied to accelerate improvement to networks, but also how cautious humans can assure that it remains under control and positively productive.


The Future is XDR: How to Conquer the SOC Transformation

Organizations are quickly catching on to the value of XDR as a must-have solution for successful SOC transformations. Embrace a secure future and stay ahead of malicious threats with SentinelOne Singularity XDR.


Coffee Talk: The Future of Unified Communications & Teams

In this session, Senior Resultant Howard M. Cohen takes on this excellent challenge and talks about the future UC developments he sees as most likely. Stimulate your imagination to inform your future planning. Join use for a look at the Future of United Communications & Teams.


Turning to Technology to Respond to a Huge Rise in High Profile Breaches

This invitation-only event is designed to facilitate an open discussion among industry peers focusing on the events and responses surrounding some of Australia’s most prominent breaches in 2022, establishing an effective framework following the Australian government's substantial increase in data breach fines, and more.


7 Ransomware Mistakes Enterprises Make Before, During and After an Attack

Join this session and we’ll share a mix of ransomware related business, organizational, procedural, and technical decision we wish enterprises just wouldn’t make.


Coffee Talk: Threat Alert: Monthly Top Attack Overview

Armed with the latest cyber threat intelligence from Cyjax, Ian Thornton-Trump CD, will outline what he sees as a resurgence in Russian state sponsored or state condoned cyber-attacks and why there may be very turbulent times ahead as we head into Spring 2023.


Best Practices for AWS Monitoring

In this webinar, you will learn observability best practices that can help you best leverage your AWS data. Learn more!


The Road to Digital Resilience: Right-Sizing Hybrid Cloud Application Deployments

This phase of the hybrid cloud evolution demands is a strategic approach to the tools and services that provide a critical level of digital resilience. In this Tech Talk, Paul Nicholson, Sr. Director of Product Marketing at A10 Networks, breaks down the increasingly complex challenge of providing digital resilience for modern hybrid cloud application deployments. Don't miss it!


How ITDR Helps Battle Identity Theft

This webinar will help you understand how to leverage ITDR to detect and mitigate identity-based cybercrime. Don't miss it!


Disaster Recovery: Your New Ticket to Cyber Insurability

This webinar will help attendees understand today’s newly exclusive cyber insurance market, the current universe of cyber threats, and the basics of constructing a DR plan: practical advice you can use to ensure you qualify for cyberinsurance and protect your business against cyberthreats to your uptime and sensitive data.


Enterprise Buyer's Guide for Data Protection

Join this webcast where Dave Russell, Veeam’s Vice President of Enterprise Strategy, and Misha Rangel, Veeam's Director of Enterprise Product Marketing will help you navigate through different questions that as decision maker you should ask yourself and your team when evaluating company’s specific data needs.


Endpoint Credential Theft: How to Prevent and Tackle the Adversary Head On

Endpoint Credentials remain High-Value Targets for cybercriminals. The 2022 Verizon Data Breach Investigations Report found that nearly 50% of all data breaches are caused by stolen credentials and cost an average 4M dollars per attack. Regardless of the credential type or stored location, A myriad of tools make it possible to access these high-value targets, providing cybercriminals with a potentially clear path for exposure.


Security Readiness Best Practices with Veeam Data Platform

Join this session, to discuss how new features like Direct-to-object storage and the expanded options for application-consistent cloud backups will provide even more security protection.