On Demand
Are you looking to effectively protect your data in Azure environments? Join our upcoming webinar where we will dive into the complexities of Azure-native backup and how to optimize for key factors. Our expert speakers will lead an interactive architectural discussion and demo to help you understand how to best implement backup solutions in your Azure environment. Plus, we'll also be discussing what's coming with the latest release of Veeam® Backup for Microsoft Azure v5.
Watch this interactive session to learn more about how NEW Veeam Backup for Microsoft Azure delivers enterprise-ready Azure-native backup and recovery that is both cost effective and secure.
Join us for this free, one-hour Tech Talk where you’ll learn the answers to all of these questions and more. The ransomware threat isn’t going away, and it’s only getting more effective, damaging and expensive to mitigate. Stay prepared – register today!
Managed Detection and Response services are the next level and perhaps even the apex of endpoint and network security with the goal of containing and eradicating a contagion before the damage is done. Join Cyjax’s CISO Ian Thornton-Trump CD who will address the key challenges of deployment, operation, and extension of MDR capabilities to remote endpoints in this rapid-fire Coffee Talk.
Today, every technology choice links your organization to a partner ecosystem that could affect your business in unexpected ways, both beneficial and detrimental. In this Podcast, industry expert Sebastian Hartmann talks with veteran technology journalist John K. Waters about the importance of evaluating partner ecosystems.
Join the editors of Redmondmag.com, Virtualization & Cloud review and AWSinsider.net will bring together independent cloud and security experts that will cover best practices for managing and securing your modern hybrid cloud infrastructure. Register today!
Are you facing challenges with managing your hybrid cloud? Join this session to learn about the tools and best practice for building, managing, and monitoring your systems.
According to the 2023 Data Protection Trends Report, 85% of organizations suffered at least one cyberattack in the previous 12 months – an increase from 76% the year before. To better understand the preparedness and recoverability of cyberattacks, join us to hear the results of one of the largest independent studies based on 1,200 unbiased organizations across 14 countries around the world, all of whom survived a cyberattack. We’ll discuss how those organizations persisted through ransomware events and how backup fits within their remediation strategies so you can improve your own disaster recovery (DR) process.
Join this session to learn about Veeam Backup for Google Cloud, designed to protect cloud-hosted workloads such as compute, databases, and file shares. The new v4 release offers numerous additional features to power up your cloud journey. Reserve your spot today!
Cloud is a key enabler to business growth, however, migrating existing applications and data from traditional datacenters to the public cloud is more complex, time consuming and costly than organizations expect. In this Tech Talk you will learn Why Nutanix believes in the value of a consistent hybrid multicloud operating model, Why organizations are turning to Nutanix to help them simplify cloud adoption, etc.
The public's fascination with this particular generative AI application notwithstanding, the most significant impact of this category of technologies is likely to occur behind the scenes in both industrial and edge applications. Learn more.
From supplementing Azure AD/Active directory to new approaches with Zero Trust and Continuous Adaptive Risk and Trust Assessment (CARTA) to compliance issues, you'll get real-world advice and best practices you can implement right away to get your enterprise secure with IAM. Don't miss it!
Yesterday’s directory services are becoming increasingly obsolete and cloud based Identity management seems to be the way forward. If not managed properly however, these systems can quickly become unwieldy. Join this session to learn best practices strategies for managing identities in the cloud and keeping things from getting out of hand.
Disaster recovery readiness, the ways in which organizations anticipate downtime and prepare to re-establish critical infrastructure caused by technology-related disasters, is the topic of this must-attend Tech Talk with technology journalist John K. Waters and data protection expert Scott Hetrick.
Identity misuse is involved in virtually every successful cybersecurity incident. Because of this, Identity Threat Detection and Response (ITDR) has emerged to encompass the tools and processes that protect identity infrastructures. When combined with XDR (eXtended Detection and Response), this joint solution is the most modern, effective, and efficient approach to protect against cyber adversaries. Join SentinelOne and Gartner for a webinar as we address current adversary techniques driving the need for combined XDR and ITDR, and best practices for implementation.