Webcasts


On Demand

Reducing Cybersecurity Debt with IGA

Join us to learn from Debs Ghosh, Technical Evangelist at ManageEngine, as she explains the reasons for the increase in cybersecurity debt and how companies must focus on establishing an identity-based security strategy, which can be done with the help of IGA. You don't want to miss this!


Remote Workforce & Microsoft Teams Summit

Join the editors of Redmondmag.com to learn tips, tricks and best practice for using Microsoft Teams to support, manage, secure and recover your remote workforce. and more! Don't miss it!


VDI & Remote End-User Computing in 2023 Summit

Join from the editors of Virtualization & Cloud Review as well as independent experts who will take a deep-dive into the current status of end user computing technology, review best practices for securing your remote workforce and share real-world knowledge for configuring, maintaining and improving your VDI and other end user computing technology.


Enterprise Cybersecurity - The Business of Keeping Business Safe

In today’s high‑stakes world of enterprise data security, you need to think like a hacker and act like a Chief Information Security Officer (CISO). Join two seasoned security experts, who once stood on opposites sides of the data‑security wall, as they discuss the vital role of data protection in the battle against cyberthreats and the strategies you need to keep your data safe.


Best Practices for Ransomware Defense and Recovery Summit

Find out the best way to get your defense plan in place from independent experts who've done it before with this free half-day summit brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com. Don't miss it!


Zero Trust for Enterprises Summit

Join the editors of Redmondmag.com and Virtualization & Cloud review along with independent experts who work with implementing zero trust day-in and day-out and can walk you through what they've seen work, what hasn't, and what steps you can take to make sure your zero trust implementation gives your organization the level of security you're looking for.


Hacking the Hacker: Assessing and Addressing Your Organization’s Cyber Defense Weaknesses

Cybercriminals are out there, watching and waiting for the perfect opportunity. They are gathering information about your organization and users, devising the perfect plan to infiltrate your defenses. But with a strategic approach to cyber defense you can hack the hacker before they strike! In this session, we'll share insights into their strategies and their motivations. Don't miss it!


Top Cloud Backup & Recovery Best Practices Summit

With this heavy weight on your shoulders, you need expert advice. That's why the editors of Virtualization & Cloud Review, AWSInsight and Redmondmag.com have brought together independent experts to give you the real-word advice, best practices and insights you need to make sure that if/when the worst happens you can come back quickly, hopefully with the click of a button or two. Don't miss it!


Enterprise Data & Cloud Data Strategy Summit

The editors of Virtualization & Cloud Review, Remdondmag.com and AWSinsider.net are bringing together independent experts for this free, half-day summit offering top tips, expert insight and best practices that will help you develop an enterprise data and cloud data strategy to take you into 2023 and beyond.


5 IGA Essentials to Foolproof your Enterprise Security

In this webinar, we'll discuss what you should look for in an IGA solution to secure your organization from identity-based cyberattacks and meet regulatory requirements. Learn more!


Ransomware Defense & Remediation Summit

Find out the best way to protect your organization against Ransomware and get your defense and recovery plans in place with this free half-day summit. Don't miss it!


Coffee Talk: The Connected, Collaborative Contact Center: Key to Extraordinary Customer Experience

For those who want to assure the best of service even during the worst of times, this session is a tour de force of how to best construct a completely connected collaborative customer contact center. Don't miss it!


Podcast: Ransomware: A Race Against Time: How Cyber Deception Stalls Advanced Attacks

Ransomware has evolved into an advanced attack that achieves lateral movement, exfiltrates data, and disables backups long before the victims know what hit them. Watch this webcast to learn the state of ransomware today, and why you can't let your guard down, how cyber deception techniques work, and why they're essential to a proactive data protection strategy, and more!


Busting Common Myths Around Backup as a Service Solutions

HYCU will help you determine whether BaaS’s simple-to-deploy, scalable backup and recovery is the right match for your organization and why some of the things you’ve heard about BaaS already are not actually true.


Microsoft Teams & IT: Top Concerns, Use Cases, and The Future of Teams

Find out how other IT teams are utilizing Microsoft Teams, top concerns and plans for the future in this Webinar brought to you by the editors of Redmondmag.com!