Webcasts


Upcoming

Making Remote IT Infrastructure Management a Breeze from Anywhere

Many organizations find themselves in the throes of delivering business continuity due to the coronavirus. Learn more.

Date: 07/14/2020

Time: 11:00am


Simple, Yet Powerful NAS Backup for Every Business!

NAS devices today are widely used for applications, large unstructured data sets, and virtualization. Learn more.

Date: 07/15/2020

Time: 11:00am


Artificial Intelligence, Machine Learning and Cybersecurity

Join Wayne Chung, Chief Analytics Officer at BlueVoyant, former Research Scientist at NSA’s think tank and CTO for the FBI in this informative webinar on Artificial Intelligence and Machine Learning and its application in cybersecurity. Wayne will discuss the use of AI/ML analytics for malware identification, account takeover, insider threats, web exploitation attempts and more. Read on.

Date: 07/15/2020

Time: 11:00 am


Windows Group Policy: Powerful Configuration Tool or Hacker’s Best Friend?

In this webinar, Darren Mar-Elia (aka the “GPOGuy”) will share some of the tactics he’s discovered attackers are using to exploit Group Policy, and show you easy ways that you can prevent and shut down its abuse. Learn more.

Date: 07/16/2020

Time: 11:00am


Cost Shootout: Comparing the List Prices, Hidden Costs and Other IT Savings of the Major Public Cloud Platforms

Join us for part two of this free three-part event to understand how best to evaluate costs, capabililities and performance as major considerations when moving to the cloud. Register today.

Date: 07/17/2020

Time: 10:00AM


What Will it Take to Get You Into This Cloud? Examining Which of the Public Clouds is Easiest to Get Started With

When you make a decision to commit to a cloud, you bring legacy technologies, current professional experience and existing development models to the equation. Not every cloud is a cultural fit for every organization. What will it take to get you into this cloud? Learn more.

Date: 07/17/2020

Time: 11:00AM


Tech Showdown: Azure, AWS or GCP? Which Cloud Platform Works Best for Your Enterprise Services?

Join us for this webcast to gain a sense of the conventional wisdom on the various strengths of Azure, AWS and GCP, as well as some insights into a few areas where that conventional wisdom is running slightly behind reality. Learn more.

Date: 07/17/2020

Time: 9:00am


Enterprise Cloud Wars Virtual Summit

Join independent industry experts from Virtualization & Cloud Review as they give you unvarnished insights on the pros and cons of all the top cloud platforms. We'll give you frameworks for evaluating your choices on everything from momentum to performance and technical considerations to critical questions of cost to deep insights about the cultural fit of certain cloud platforms to particular corporate or organizational cultures. Learn more.

Date: 07/17/2020

Time: 9:00am


SDN & SD-WAN: Why You Don't Want To Be Left Behind

Join us and hear from top independent experts on the true benefits that SDN and SD-WANs bring plus their top tips and insights for organizations still determining their software-defined strategy. Read on.

Date: 07/23/2020

Time: 11:00am


Hyperconvergence and Why It's Mandatory for 2021

Join us and learn from our independent experts who implement HCI on a daily basis on what the real benefits of HCI are, the limitations, plus best practices for getting started. Read on.

Date: 07/23/2020

Time: 10:00am


Hybrid Cloud Planning - Answers to the Most Important Questions

Find out why more and more enterprises are choosing to mix public and private clouds (as well as public cloud vendors). Get expert tips and best practices for implementation plus "gotchas" (including cost!) you need to watch out for. Read on!

Date: 07/23/2020

Time: 9:00am


The Future of IT Infrastructure Summit

From cloud to hyperconvergence, storage to software-defined networking, this one summit will cover what you need to know NOW about the future of infrastructure heading into 2021 and beyond. Learn more.

Date: 07/23/2020

Time: 9:00am


Getting Multi-Cloud Under Control: A Half-Day Summit

Usage and spending on multi-cloud was surging already when the pandemic, and its work-from-home imperatives, poured gasoline on the fire. Attend this half-day virtual summit to learn what you need to know now about getting multi-cloud under control. Learn more.

Date: 08/07/2020

Time: 9:00am


Containers 103: How to Think about Costs with Containerized Apps

Attend this session and to gain a framework for thinking about overall enterprise container costs in various scenarios. Get all the details.

Date: 08/14/2020

Time: 11:00am


Containers 102: Managing Containers with Kubernetes and Other Tools

This session helps attendees understand what their enterprise container framework -- both software and hardware -- needs to look like to ensure maximum performance and minimal problems. Learn more!

Date: 08/14/2020

Time: 10:00am


Containers 101: What Are Containers and What Applications Are They Right (and Wrong) For?

This webcast provides attendees with a better understanding about which of their enterprise applications would benefit the most from a containerized approach. Learn more.

Date: 08/14/2020

Time: 9:00am


Virtual Summit: Guide to Getting Started with Enterprise Containers

Join us for the "Guide to Getting Started with Enterprise Containers," a half-day virtual event in which attendees will get a complete walk-through of everything they need to know about working with containers presented by true industry experts. Learn more.

Date: 08/14/2020

Time: 9:00am


On Demand

Business Continuity for Remote Workers

Learn how to correctly configure site-to-site or point-to-site VPN tunnels with Veeam free products to allow for safe data transmission between corporate sites and employees.


All You Need to Know About National Institute of Standards and Technology's Password Policy Recommendations

In this webinar, ManageEngine's IT security expert will decode the NIST's recommendations for password security, and explain how you can easily implement them in your organization to bolster password security. Besides bolstering password security, the guidelines also help organizations meet regulatory compliance requirements such as HIPAA, and SOX.


Protecting Group Policy: Under Attack and Under the Radar

Cyberattacks are increasing in frequency and sophistication at an alarming rate, with attackers looking for ways to advance their infiltration within your network by living off the land. Learn more.


5 Ways to Improve O365 Email Security: Reduce Costs and IT Complexity While Preemptively Blocking Cyberattacks

Join us to receive a deep, practical understanding of the methods cyber criminals use to skirt O365 layers like ATP and DMARC, as well as the immediate actions you can take to fortify O365 email security, while reducing IT complexity. Register now.


Defining a Serverless Printing Infrastructure

This webinar will give IT decision-makers clarity around a modern printing infrastructure. By defining a serverless printing infrastructure IT professionals can architect future-proof printing. Learn more.


Take Two Steps to Obtain Endpoint Compliance and Data Protection

Join us in this information-packed session in which industry expert Tim Warner and Quest Software's Jillian Salamon walk you through practical steps to achieve endpoint compliance and cure your IT management teams' headaches. Learn more.


Best Practices for a Successful Cloud Center of Excellence

This session will walk through a framework to help you benchmark your cloud management processes, identify areas for improvement, and maintain cross-functional alignment across cloud financial management, operations, and security and compliance. Learn more.


Sector-17: The State of Cybersecurity in the Legal Sector

This webinar will review the findings of the global analysis and provide helpful insight to law firms in specific and concerned organizations in general. Find out more.


10 Incredible Ways to Hack Email & How to Stop the Bad Guys

Join us as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. We will also share a special treat - a (pre-recorded) hacking demo by Kevin Mitnick. Learn more!


How to Consolidate Multiple Office 365 Tenants

Office 365 tenant to tenant migrations present a host of challenges that can impact end-users, but these can be mitigated against with smart planning and execution. Join us to learn how! Find out more here.


How to choose the right Privileged Access Management solution for your needs

Privileged Access Management (PAM) is essential to meeting compliance and security requirements. Choosing the ideal PAM solution for your organization’s needs can be a challenge. There’s a wide range of choices available. So how do you choose?


10 Things I Hate About Storage Silos

Join us to hear the top 10 most common problems your peers and colleagues have with storage silos, and how you can solve them. Learn more.


Best Practices for Maximizing Your Hyperconvergence Implementation

Join this session packed with expert advice about hyperconvergence infrastructure and the most important do’s, don’ts and gotcha’s. You’ll leave with a solid understanding of the top things do (and not to do) when implementing HCI. Learn more.


Top 7 Benefits of Hyperconvergence

Get an expert walk-through of the top seven benefits, including ease of deployment, cost savings and management benefits. Learn more.


Going All-In with Hyperconvergence: Why You Don't Want To Do HCI "Lite"

In this session, find out about what Hyperconvergence really is and why so many enterprises are moving to this new way of architecting their systems. Learn more.


Inside Hyperconvergence: Maximizing Your Enterprise

Join us for this free half-day seminar and hear from independent industry experts on why hyperconvergence is the future, the top benefits that HCI provides and learn best practices from those who’ve gone before. Learn more.


Going Remote: Architecting Cybersecurity for the Short Term AND the Long Term

In this webinar, you will hear how a leading cybersecurity services company shifted to an all-remote delivery model and how their experience can be used to inform decisions for your own organization. Learn more.


5-min demo: Data Security

Veeam Availability Suite 5-min Demo on Data Security. In mid-2018, the average ransomware payment was $41,198. By late-2019, that price more than doubled to $84,166. With modernized data protection, however, 96% of organizations cut their average ransomware recovery cost down to $5,000, with 76% of companies not paying anything at all. How? This demo shows how to protect your data with immutability from Veeam®.


5-min demo: Hybrid Cloud Acceleration

Veeam Availability Suite 5-min Demo on Hybrid Cloud Acceleration. The adoption of modern backup systems is driving rapid cloud adoption through the unification of tools — ensuring over 49% savings in hybrid cloud protection. This demo shows how to use native backup and recovery services straight from the cloud, reducing time, cost and resources.


5-min demo: Modernizing Backup

Veeam Availability Suite 5-min Demo on Backup Modernization. Through Cloud Data Management™, organizations are achieving substantial results, including 50% lower cost of data protection and backup, and higher productivity across development, backup and recovery teams. This demo shows how to re-use your backup data to drive rapid application development through virtual sandboxes.


10 Best Practices for VM Backup

When backing up virtual machines, one should consider applications running on the machine, how critical the machine is for business operations and how fast you can get back up running when a disaster occurs. Proper protection for critical applications and implementing off‑site solutions are essential to keeping VM data available while minimizing data loss. Every business should have a backup strategy to guarantee virtual machines are properly protected and recoverable.


Remote Employees' Password Self-Service and Productivity Tracking

Jay Reddy our IAM strategist, hands-out must-haves and must-dos for effective password management and productivity tracking for remote working use cases. Learn more.


Maximizing the Return on Your Office 365 Licenses

In this webinar, we cover how your Office 365 licensing can perfectly align with the needs of your organization via a combination of continuous measurement, automation and delegation. Learn more.


Improving IT Cost Efficiency in Private and Multi-Clouds

Cloud admins and architects are increasingly being tasked to manage applications across multiple clouds while on a tighter budget than ever. Learn more.


The Dos and Don’ts of Recovering Active Directory from a Scorched Earth Disaster

In this technical workshop, you’ll learn the dos and don’ts of recovering AD from a cyber disaster, including recovering AD even if domain controllers are infected or wiped, restoring AD to alternate hardware and eliminating reinfection of malware from system state backups. Learn more.


Re-think Your Refresh! Your Applications Deserve Better

Join this session about modern applications and the need for modern infrastructure and data protection. Learn more.


Choosing the Appropriate Cybersecurity Assessment for Your Organization

This webinar aims to empower decision makers on cybersecurity assessment selection with simplified analogies to home inspection that are then developed into in-depth comparisons of external and internal vulnerability assessments, penetration tests, red teaming and specialized types of assessments including CMMC. Learn more.


Reduce Costs and Increase IT Agility with Self-Service

In almost every industry, IT is under tremendous strain as they enable remote work at scale, keep systems up, and strive to reduce costs in this challenging business environment. Learn more.


Endpoint Backups: Now More Important than Ever

In the work-from-home era; it is now time to consider the need to backup endpoints when they are out of the data center. Learn more.


Cloud-Based Disaster Recovery Virtual Summit: Taking a Coronavirus Lens to Your Enterprise Transition

Join this virtual summit to see how the Covid-19 virus has caused a rapid and massive shift in the way IT is done accelerating the industry transition to cloud-based approaches to learn concrete ideas for filling newly opened gaps and the cloud's role in business continuity in the post-pandemic future.. Learn more.


In a Pandemic, Will That Old Plan for Hurricanes, Tornadoes and Ransomware Still Work?

Join our experts as the explore concrete guidance on shoring up your existing business continuity plans for the mid-pandemic enterprise. Learn what a comprehensive cloud disaster recovery plan should include now that it might not have required before COVID-19. Read on!


10 Ways that Coronavirus, Sadly, Makes Cloud Disaster Recovery Shine

In this special webcast, our expert explores some of the ways both incremental and comprehensive cloud approaches, such as cloud backup, cloud disaster recovery and disaster recovery as a service (DRaaS), are proving their value in these extremely challenging times. Learn more!


Cloud DR for the Long Haul: The Many Possible COVID-19 Futures to Take Into Account

We're hearing a lot about how things will never be the same after COVID-19. Maybe. As someone responsible for your organization's business continuity, your job is to keep multiple possible scenarios in your head at once. Join us as our experts look at three potential scenarios. Learn more.


Top 5 Ways to Prepare for your next Microsoft 365 (Office 365) Tenant Migration

The moving of data in Office 365 (now Microsoft 365) between tenants, in some ways, is the easy part. Learn more.


A Proactive Approach to Securing Active Directory

Active Directory is seen as a legacy application implemented without security in mind. Attackers are fully aware of this and are using this to attack many organisations today.


Nutanix Business Continuity Solutions Protect your Apps and Data From IT Downtime Due to Disasters

The Nutanix Private Cloud takes all the guesswork out of deploying scalable, resilient, pay-as you grow software defined infrastructure, providing self-healing, highly available, resilient infrastructure that ensures application and data availability in the event of both planned and unplanned disasters. Learn more.


The Business Impact of Data Protection

Data protection has now become the heart and soul of many organizations. It’s not just simply about backing up and restoring data but extending your capabilities to reuse and get the most from that data. Learn more.


Many Ways to Defeat Multi-Factor Authentication and How To Stop the Bad Guys

Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years of experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite MFA solution Learn more.


What Enterprises Don’t Know About M365 Data Protection

Email is the #1 SaaS application, yet 6 out of 10 organizations don’t have adequate data protection. Join Chadd Kenney, Clumio Chief Technologist, and guest speaker, Archana Venkataraman, Associate Research Director, Cloud Data Management, IDC Europe, to discover the M365 data protection challenges and how you can overcome them. Learn more. *IDC- Why a Backup Strategy for Microsoft 365 is Essential for Security, Compliance, and Business Continuity


Unleash the Power of NAS Backup

With the NEW Veeam® Backup & Replication™ v10, we bring the most powerful, reliable and easy-to-use file-level backup capabilities aimed at protecting your file shares.


Veeam Availability Suite v10 - Backup and Recovery capabilities you didn't know about

Your business is likely protecting data from and in any environment, including cloud, virtual and physical — but are you using the key capabilities needed to achieve your recovery and business agility goals? What about unstructured NAS data that is rapidly growing unchecked? When moving data off site — are your copies protected from things like ransomware?


Best Practices in Planning On-Prem and Cloud Backup

In this engaging, interactive webinar, we’ll look at the trends, issues and challenges of protecting a hybrid data center and provide best practices for what you can do to address them today. You’ll learn how to simplify your data protection strategy in the cloud and in the data center without compromise, all while removing complexity and cost.


Maximizing Your Hybrid Cloud Investment

The cloud has evolved from being a thorn in the side to IT to becoming a clear enabler of business. This on-demand webcast explores how IT professionals feel about using the cloud, both public and private. Don’t miss this opportunity for valuable, insightful data about cloud use from a broad spectrum of over 300 IT pros ― so you can see how your organization's use of cloud compares.


Protecting Microsoft Office 365 with NetVault

If you think your Office 365 data is automatically protected, think again. Sure, Microsoft may host the infrastructure, but it doesn’t offer the levels of data protection needed to satisfy your demanding data protection, disaster recovery and compliance goals. Watch this on-demand demo to see how NetVault delivers comprehensive Office 365 data protection.


Cloud Management Made Easy: Best Practices for Your Data-Driven Business

Adoption of the cloud continues to grow, yet despite its enormous advantages, the cloud also creates new challenges and pain points. For example, the more you explore and embrace different cloud services, the more costs increase. In addition, it becomes more difficult to keep track of workloads and services. And as you seek to modernize your applications via cloud-based containers, new management complexities arise.


Why Managing Containers Changes the Game for Cloud Applications

In this webcast, Peter Varhol of Technology Strategy Research, and Quest Foglight product designer Mike Condy, explore why teams are increasingly using containers, and what effect these decisions have on their operational strategies. They examine the uptake of containers as a development and deployment environment in the cloud, and how containers using Dockers and Kubernetes change application architectures for new applications.


Leave Nothing Behind: Cloud Migration Done Right

If you’re thinking about migrating workloads to AWS or Azure, do you know exactly what you’ll migrate, what you’ll leave on premises and what it’ll cost, now and in the future? Get full visibility into your cloud migrations and how migrations will affect your environment by listening Microsoft MVP Tim Warner, and Quest Software.


Best Practices in Office 365 Data Protection

Attend this webinar and learn about the gaps left by Microsoft’s Office 365 protection, the risks posed and how to overcome them all with a comprehensive 3rd-party data protection solution. Learn how to get the Office 365 backup and recovery strategy you need and want.


Making Veeam Backup & Replication Better

Join Greg Schulz, IT expert and founder of StorageIO, and Adrian Moir, Senior Consultant at Quest Data Protection, for an insightful and dynamic conversation about your evolving storage and backup requirements.


More Effective Cybersecurity: The Practical Application of The MITRE ATT&CK Framework

In this webinar, Mike Scutt delves deeply into the MITRE ATT&CK framework, discusses its implications for Security Teams and shares how to implement it. Learn more.


Ransomware vs. Active Directory Backups: What Can Throw a Wrench into Your Disaster Recovery Process?

In a cyber disaster, you must recover Active Directory before you can recover your business. But only one in five organizations have a tested plan in place for recovering AD after a cyberattack. This is alarming given the spike of ransomware attacks and the widespread impact of an AD outage. Learn more!


OnDemand Webcast - Securing Active Directory: Proactively Detecting Attacks & Attack Pathways

Let 15-time Microsoft MVP, Derek Melber, show you how to detect hidden misconfigurations, attacks, and even do threat hunting. Don’t miss this opportunity to secure your most essential identity and access control: AD.


Private vs. Public vs. Hybrid vs. Multi-Cloud: Understanding Security Liabilities and Strengths

How does picking a public vs. private vs. hybrid cloud set up affect your security risk? Is private-only really the most secure option -- or one that most enterprises need? What do secure hybrid cloud setups look like? Join this session to find out! Learn more.


Cloud Security Architecture for AWS & Azure: Expert Advice

In this live roundtable, the editors of Redmondmag.com and Virtualization and Cloud Review have brought together AWS and Azure architecture experts to talk about the real-world architecture concerns that can significantly affect your systems’ security. Learn more.


Top Cloud Security Threats to Watch for in 2020

In this session, we'll discuss why the cloud is your enterprise’s No. 1 attack vector! You can’t afford to miss a possible vulnerability. Stay on top of the hackers


2020 Enterprise Cloud Security Summit

Join us for this free half-day seminar and find out the top 10 threats you're facing, get real-world architecture advice and find out the pros and cons of public, private and hybrid cloud platforms. Learn more.


Optimizing the Office 365 Experience When Everyone’s at Home

As more and more individuals are working from home, IT organizations need to learn how to address bandwidth constraints, lack of corporate security safeguards, and cybercriminals looking to take advantage of the situation while still looking to deliver a fast, consistent, and secure Office 365 experience. Learn more.


Next-Generation Databases Don’t Sit in Silos

Legacy database solutions have had their place, but it’s high time for a new competitor to out-rank the silos, complexity, and lag of multi-tiered architecture. Learn more.


Database Migration to Azure: Which Option to Choose, and Why

Join Microsoft MVP Tim Warner and SolarWinds to understand how Microsoft Azure supports the infrastructure-as-a-service (IaaS) and Database-as-a-service (DBaaS) deployment models, and what questions you need to answer before you undertake your database migration journey. Learn more!


Converge or Hyperconverge: That is the Question

Like a real-life "choose your own adventure" book, IT Organizations are constantly forced to make critical decision about which path to take. Learn more.


Reducing Reliance on AD as You Move to the Cloud

While on-prem AD infrastructure ages, many companies are looking to reduce their AD footprint as they are moving to more and more cloud services. Learn more.


Securing Active Directory: Proactively Detecting Attacks & Attack Pathways

Active Directory is seasoned and well known. Unfortunately, the security set at install, 15 years ago, is still weak. However, the attackers are using these attack pathways to move laterally and gain privileged access in AD. Let 15-time Microsoft MVP, Derek Melber, show you how to detect hidden misconfigurations, attacks, and even do threat hunting. Don’t miss this opportunity to secure your most essential identity and access control: AD. Learn more.


Securing Privileged Remote Access When Everything’s Insecure

We’ve quickly shifted to a world where even the most privileged IT admins need to connect using devices and network connections that may be anything but secure. Learn more.


Controlling the Cost of Office 365: The Viability in Visibility

Licensing Office 365 seems straightforward enough: have a user, buy a license. Learn more.


Cyber CSI: Learn How to Forensically Examine Phishing Emails to Better Protect Your Organization Today

In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will show you how to become a digital private investigator and get inside the mind of the hacker, learn their techniques, and how to spot phishing attempts before it’s too late! Learn more.


Leveraging IT & Enterprise Service Management for Cloud Automation & Governance

According to most credible CIO sources, Cloud makes the top 3 in the priority for 2020. Increasingly leading organizations are looking for ways to streamline and automate cloud services and management while retaining real-time governance to maximize the impact cloud can have on innovation in the business. ​ Learn more.


Active Directory: Best Practices for Administration and Backup

Microsoft Active Directory is the basis for every Microsoft‑oriented networking environment. However, it’s not always a solid basis. With thousands of network environments under their belts, Sander Berkouwer (Microsoft MVP) and Veeam’s® Andrey Zhelezko know their Active Directory. Watch this webinar to benefit from their best practices.


3 Ultimate Strategies for Ransomware Prevention

Ransomware is here to stay. As much as no one likes to hear that, we have to admit that it’s no longer a question of ‘if’ but rather ‘when’ and ‘to what’ extent your business might be affected. Rather than hope it won’t get you, let’s explore all the options that exist to prevent, locate, disarm and mitigate ransomware risks. We’ll go over some essential strategies you can implement today and also review what a comprehensive backup software can offer you.


Attacking & Defending Active Directory Workshop

In this workshop, we’ll demonstrate real-world attacks used against Active Directory, including credential theft, Kerberos-based attacks, Group Policy-based attacks, and ACL attacks. This is a red vs. blue standoff, so don’t expect a bunch of slideware. Read on!


Modernize Your BC/DR on a Back-to-School Budget

Unitrends has long empowered SLED institutions to achieve robust data protection without unnecessary complexity. Join a Unitrends specialist as we discuss how SLED organizations leverage their platform to break down silos and deliver rapid ROI. Learn more!


Public vs. Private vs. Hybrid: What Cloud to Use When and Why (or Why Not)

In this detail-rich session, our cloud architecture expert lays out some of the basic considerations and other concerns that organizations must account for in order to make the right decision about putting data and applications in the public cloud, in a private cloud or in a hybrid cloud. Learn more.


[COVID-19] WFH Essentials for IAM Administrators. Must-Haves and Must-Dos.

Learn from our IAM experts, how we at Zoho Corporation successfully implemented WFH for our 10,000 strong workforce. You'll also learn how you can simplify identity and access management for teleworkers to ensure business continuity. Read on.


TLS and the Zero Trust Paradigm

Modern cyberattacks are not limited to just network intrusion from the outside. Learn more.


OnDemand Webcast - IT Decision Maker’s Guide To Office 365 Backup

Whether they have completely migrated to Office 365, or have a hybrid exchange and Office 365 deployment, a business’s objectives remain the same. Organizations must remain in control of their data, and with Veeam Backup for Microsoft Office 365 from NewCloud Networks, businesses can take control of their data instantly.


Achieve Endpoint Compliance in 2 Easy Steps

Today’s IT professionals face enormous challenges in securing and meeting compliance regulations. Learn more.


How to Succeed in Rapidly Expanding and Evolving Infrastructure & Operations World

The increasing complexity and scale of today’s clouds make automation tools a necessity—not just “nice-to-have”s. Learn more.


Office 365 Adoption: The “Dale Carnegie” Approach

Moving to Office 365 introduces a world of collaborative workloads - such as Teams, SharePoint Online, and OneDrive for Business - but driving user adoption of these new platforms can be a huge challenge, especially for larger organizations. Learn more.


How Nutanix IT Uses Software-Defined Storage for Simplicity and Flexibility

Nutanix doesn’t just develop next-generation storage solutions for its customers; we actively use them in our internal system. Learn more.


IT Management Strategies to Optimize Productivity with Windows 10

The modern workplace puts pressure on IT management in unprecedented ways. People expect to be connected and productive anywhere, at any time, and from their preferred device. Learn how one IT Director efficiently manages 40 hardware models with one Windows 10 image. Watch now!


Securing a Hybrid On-Premises/Cloud Directory: Guard Against Common Mistakes

Join this detail-rich session for expert advice on common mistakes, pitfalls, misconfigurations and misunderstandings that can lead to credential or system compromise and other serious security and compliance problems. Learn more!


Should Active Directory Go in the Cloud, Stay On-Premises or Both? What to Put Where, When and Why

Join us for this in-depth session, as our experts explore the advantages and disadvantages of having different parts of your identity and authentication infrastructure in different places -- on-premises, in the cloud or in both places at once. Learn more!


What's New in Active Directory and Azure AD: New Feature Round-Up

Join us for an expert view of which GA, public preview and private preview features are the ones to watch and implement. Learn more!


Active Directory & Azure AD Summit

Join us for this free three-hour virtual event to introduce you to the state of the art and best practices surrounding the use of Microsoft's power duo of directory technologies. Learn more!


The essential guide for physical and cloud data protection

Organizations have data in many different places that all must be made available and resilient. Physical systems and the cloud aren't exceptions from this requirement. Despite obvious differences, these types of environments are still much alike in terms of data protection and they demand a proper backup strategy. Luckily, Veeam has an answer to this challenge. Join this session where Andrew is going to showcase how Veeam Agents can play a major role in physical and cloud environments’ data Availability.


7 expert tips for multi-Cloud Data Management

Join Veeam®, Cisco and LinxDataCenter for a discussion on working in a multi-cloud environment and the challenges that go along this journey.


The Biggest IT challenge in 2020 is coming from the board room

Three out of four organizations have a “reality gap” between what business leaders expect from IT and what IT is geared to deliver. This session will examine the industry trends that are causing the gap, how those expectations are driving 2020 challenges and strategy, and give some ideas on how to close the gap from both a technical and an operational perspective. Watch now.


Intro - Veeam Predictions 2020

VeeamON Virtual provides the latest insights and predictions for Cloud Data Management. Veeam will highlight predictions that will remain top of mind for 2020, including ones that will affect the backup and Availability markets. Understanding these predictions and preparing for them ahead of time will allow organizations to enhance and optimize their Cloud Data Management practice. Watch now.


Flash-enabled Availability: Evolving beyond the backup

Introducing Flash-to-Flash-to-Cloud (F2F2C), a solution designed for the scale and use cases of modern data backup and protection. Together, with Pure Storage and Veeam® Backup & Replication™, this architecture provides significant improvements in recovery times.


Modernize your Data Center with Veeam Availability for Nutanix AHV

Veeam Availability for Nutanix AHV is an easy to use prism-like interface that gives you a possibility to look at snapshot jobs, do restores and recoveries, see job errors and more. Watch this video, which will walk you through the menu and interface, and get acquainted with all the functions and features of it.


AHV VeeamLive - The New Availability Standard for Nutanix AHV

In this episode Shawn Lieu, Jason Leiva, Ronn Martin and a special guest from Nutanix have discussed the NEW Veeam Availability for Nutanix AHV software solution that provides Nutanix AHV integration with Veeam Backup & Replication. This customer requested solution combines agentless AHV backups with Prism like management interface to deliver the world-class ease-of-use, reliability and Availability, that Veeam customers currently enjoy for VMware and Hyper-V environments.


Mission Availability: Restore to Azure and Azure stack in 2 steps

As more businesses look to move workloads to the cloud, they can encounter challenges and constraints with their current data management solutions. In fact, 47% of IT leaders are concerned that their cloud workloads are not as portable as intended. It is your mission as an IT guru to obtain workload portability in the cloud.


Hyperconvergence 103: Expert Tips for Successful Implementations and Avoiding 'Gotchas'

During this session, you’ll hear detailed descriptions of the top five tips for ensuring a smooth and streamlined hyperconvergence deployment. You’ll also learn how to avoid some of the most common mistakes or missteps. Learn more.


The Security Risk in SSL/TLS Traffic: Architecting Visibility and Security Through Decryption

Nearly all commerce, communications, and data traffic going over the web is encrypted. As organizations transform operations, leverage more of the cloud, expanding locations, and utilizing remote workforces, IT’s lack of visibility into encrypted traffic puts the organization at risk for a cyberattack, data breach and compliance failures. Learn more.


Active Directory Deep-Dive: Top Issues, Tips and Gotchas from the Experts

Active Directory (AD) is the personnel file of Microsoft Windows—the library that manages password policy and access to enterprise resources like applications or devices. Learn more.