Webcasts


On Demand

Disaster Recovery Readiness in 2023: It's Not a Matter of "If" but "When"

Disaster recovery readiness, the ways in which organizations anticipate downtime and prepare to re-establish critical infrastructure caused by technology-related disasters, is the topic of this must-attend Tech Talk with technology journalist John K. Waters and data protection expert Scott Hetrick.


Why Identity Threat Detection and Response Completes XDR

Identity misuse is involved in virtually every successful cybersecurity incident. Because of this, Identity Threat Detection and Response (ITDR) has emerged to encompass the tools and processes that protect identity infrastructures. When combined with XDR (eXtended Detection and Response), this joint solution is the most modern, effective, and efficient approach to protect against cyber adversaries. Join SentinelOne and Gartner for a webinar as we address current adversary techniques driving the need for combined XDR and ITDR, and best practices for implementation.


Top Ransomware Attacks & Prevention Strategies Summit

Join the editors of Virtualization & Cloud Review for this free half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practice advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Don't miss out!


Building a Better Hybrid Cloud Operating Model for Effective App Delivery

In this Tech Talk, industry expert Paul Nicholson talks with veteran technology journalist John K. Waters about meeting this vexing challenge and the conversation will cover building a better hybrid cloud operating model. Learn more!


5 Considerations for Architecting Across Hybrid Cloud Environments

Join this session to learn different considerations on how to best keep large organizations aligned on a hybrid cloud strategy and best practices for working with multicloud environments.


Modern Application Architecture Best Practices Summit

Join this this free, half-day summit covering what's new in application architecture best practices and learn some real-word advice for implementing these best practices. Make sure you're caught up and your apps can be everything they should be -- sign up today!


Application Architecture Best Practices

In this session we’ll explore some of the available architectures and talk about how applying best practices in building software benefits everyone across the enterprise.


Modern Application Architecture: Top Dos, Don'ts and Gotchas

Please join us in this session as we discuss several best practices and patterns that will make your application ready for the cloud and ready for DevOps. We'll discuss CI/CD, Microservices, Security Vulnerability checks, and more!


AEC Data Insights

In Egnyte's 2022 Data Insights Report, we analyzed trends in data growth and usage across a broad selection of AEC customers who are storing, securing, and sharing petabytes of data on Egnyte's platform. Explore this on-demand webinar to hear AEC industry expert panelists discuss the results and provide insights on how the industry is adapting to the rapid digitization of its day-to-day operations.


Taking a Zero Trust Approach: Key Takeaways from the DoD's Latest Roadmap

Join our webinar for an in-depth look at what this strategy entails and its key objectives. We'll also explore how you can create a Zero Trust environment in your organization to keep threats at bay.


Best Practices for Cloud Security with Microsoft Sentinel: Achieving Real-Time Event Monitoring, Triaging, and Incident Response

In this webinar, we will discuss the challenges of continuous event monitoring, triaging, and incident response in the Microsoft Sentinel service offering. We will cover best practices for configuring Microsoft Sentinel services to exceed industry standards and provide strategies for 24/7 incident response services. Learn more!


Coffee Talk: Top E-mail Security Threats in 2023: What You Need To Know

Register for this Coffee Talk to learn the biggest threats hitting enterprises right now, the latest developments in AI-powered threat detection, and the steps you need to take to make sure your data is kept safe from attackers. Sign up today!


Coffee Talk: Why Unified Endpoint Management & Why Now

Cyjax’s CISO Ian Thornton-Trump CD will discuss the new sense of urgency due to a change in corporate attack surfaces and weaponization of exploitations by Threat Actors to take hold of devices and leverage them as initial access vectors and/or platforms for credential compromise. With the extraordinary diversity in the software supply chain providing the means to ensure your 3rd parties follow end-point protection polices has never been so important. This will be a rapid-fire Coffee talk on a topic which ranks high on enterprise risk and data protection efforts.


Modern Hybrid Cloud Security & Management Summit

Don't miss this free half-day summit, where the editors of Redmondmag.com, Virtualization & Cloud review and AWSinsider.net will bring together independent cloud management and security experts that will cover modern best practices for managing and securing your modern hybrid cloud infrastructure in 2023.


Coffee Talk: Object Storage for Backup & Disaster Recovery 101

Join Greg Schulz, founder, and IT analyst with Server StorageIO, for this expert-led coffee-talk event featuring real-world tips and tricks on object storage for backup & disaster recovery success. Don't miss it!