Webcasts


On Demand

Microsoft Teams Best Practices Summit

Join this free half-day summit to walk you through current best practices for Microsoft Teams, offering real-word advice, top tips and solutions for managing, securing and communicating with Microsoft Teams. You don't want to miss it!


Microsoft Teams Security Best Practices

In this session, we're going to cover best practices you can implement today when it comes to securing Microsoft Teams. We'll take a look at three areas of security you should be thinking about, including some of the brand-new Teams Premium features!


Microsoft Teams Management & Communications Best Practices

The pandemic and the eventual transition to a hybrid work environment have caused Microsoft Teams to become an indispensable tool for many organizations. Join this session to learn practical tips for keeping your Microsoft Teams environment well organized and running smoothly.


Speaking to the Board about Cloud Security

Whilst security leaders naturally know cloud security very well, the board and other senior leadership may not. According to the 2021 Global CISO Survey 90% of CISO’s present directly to the board. Therefore, the ability to articulate business risk to decision-makers is paramount to securing the appropriate investment in the right cybersecurity tool.


Cloud-Native Defense in Depth

Practically every organization is increasing their use of cloud infrastructure. Despite the proliferation of image scanning solutions, security remains the #1 concern. Cloud security is made difficult because it doesn’t fit into the more common perimeter-focused security model. In today’s cloud-enabled world, the perimeter of the network is an increasingly blurry line, making cloud defense in depth key to keeping your organization safe and secure from cyber threats.


Amazon S3: The Anatomy of Ransomware Events

Principal Security Solutions Architect for AWS, Megan O’Neil and Senior TDIR Solution Architect for AWS, Kyle Dickinson educate on what to expect if your organization encounters a security event targeting data residing in a customer’s S3 buckets. The duo explore common event patterns, leading to step-by-step guidance on how to respond to a ransomware event and best practices for recovering your data.


Extend Veeam-powered BaaS to Microsoft 365

Watch now as we explore the benefits of adding a Veeam‑powered Backup as a Service (BaaS) offering for Microsoft 365 to your stack.


The Top Ransomware Threats Your Enterprise Is Facing Right Now

This talk will cover all the ways that ransomware groups are focusing on initial access to your network and what you need to do to defend your organization from attack. Don't miss out!


Modern Cloud Data Protection Best Practices

In this session you will learn about how to protect your data, the importance of air gaps and immutability, how to manage your costs, and finally the best ways to secure your data.


Ransomware & Cloud Data Protection Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSInsider.net for this half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practical advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Don't miss out!


Enterprise Storage, Backup & Recovery Heading into 2023 Summit

Join the editors of Redmondmag.com, AWSinsider.net and Virtualization & Cloud Review have put together this free, half-day summit walking you through what you need to know to put together a comprehensive and real-world storage, backup and recovery plan for 2023. You won't want to miss it!


Expert Advice on Enterprise Storage, Backup & Recovery for 2023

The solution is to be prepared heading into 2023. Join Greg Schulz, Author, Sr. Analyst at Server StorageIO, Microsoft CDM MVP, and ten-time VMware vExpert, for this session discussion. Greg will discuss the above, your questions, industry trends, technologies, techniques, architectures, and related topics for your Enterprise Storage, Backup & Recovery Heading Into 2023.


How to spot attackers in your Active Directory

Cyberattackers of today have numerous sophisticated ways to attack an organization's Active Directory (AD) infrastructure. Once they get in, they can wreak some serious havoc. And then there is the continuous threat of trusted insiders who can compromise your AD. In this webinar, we will explore how you can proactively spot attackers in your AD.


Securing Digital Identities with IGA Solutions

In this webinar, we'll discuss how you can evaluate IGA solutions efficiently to secure your organization from identity-based cyberattacks and meet regulatory requirements. Learn more!


Digital Transformation for Enterprises in 2023: Top Strategies & Getting Started Summit

Don't miss this half-day summit aimed at CIOs, CIOs, IT managers, development managers and architects focused on what digital transformation really means in 2023 plus real-world advice for getting your digital transformation underway.