Webcasts


Upcoming

Coffee Talk: Expert Top 10 Active Directory/Azure AD Security Best Practices

Join us for a Coffee Talk on in-depth Azure AD/Active Directory security real-world tips, tricks and advice and get a $5 Starbucks gift card on us! Don't miss out!

Date: 06/27/2022

Time: 11:00 am


Increase ROI with Automation Using a Digital Operations Platform

In this webinar, xMatters, an Everbridge Company, will sit down with industry experts from GigaOm and Dynatrace to discuss leading trends, an automation first mindset, and how you can increase ROI across your organization by automating your incident management.

Date: 06/28/2022

Time: 11:00am


Top Data Best Practices for Hybrid/Multi-Cloud

In this session we will talk about what’s the same, what’s different, and what’s “it depends”. This session will also address the costs and risks of bringing on-Prem design patterns to the cloud. Don't miss it!

Date: 06/29/2022

Time: 9:00 am


Multi-Cloud & Hybrid Cloud Data Summit

Join this free, half-day summit brought to you by the editors of Virtualization & Cloud Review as they bring together data and infosec experts and cloud architects who will walk you through the topic of modern cloud data techniques and best practices that every IT manager needs to maximize their hybrid/multi-cloud environment and keep it secure. Don't miss it!

Date: 06/29/2022

Time: 9:00 am


Top Data Security Best Practices for Hybrid/Multi-Cloud

In this session you will learn about how to protect your data in these complex environments, and secure your environment, and overcome common configuration mistakes that many organizations make. Learn more!

Date: 06/29/2022

Time: 10:00 am


7 IAM Must-Haves for Reducing Cyber Insurance Premium

This webinar will tell you what you should look for in an IAM solution to obtain higher cyber insurance coverage at a lower premium cost. Don't miss it!

Date: 06/30/2022

Time: 11:00 am


Securing, Managing & Recovering Microsoft 365 Summit

You won't want to miss this free half-day summit from the editors of Redmondmag.com that will keep you ahead of those changes and give you real-world insights you can use the same day to improve your Microsoft 365 installation and make sure it's secure and recoverable in the year ahead. Don't miss it!

Date: 07/08/2022

Time: 9:00 am


Top Enterprise Best Practices for Securing, Administering & Recovering M365

In this session, Nathan O’Bryan (MCSM: Messaging, MVPr Office 365) will explore Best Practices for Securing, Administering & Recovering M365 to ensure security, and compliance while maintaining the appropriate levels of access for end-users. Learn more!

Date: 07/08/2022

Time: 10:00 am


Digital Transformation & the Enterprise Cloud Summit

Don't miss this free half-day summit created by the editors of Virtualization & Cloud Review and Redmondmag.com to walk you through how the cloud can transform your enterprise plus practical, real-world tips to get you started on your digital transformation journey. From modernizing your architecture to securing your data, saving money to moving your organization forward, this is the summit you don't want to miss.

Date: 07/12/2022

Time: 9:00am


Top Active Directory Attacks and How to Prevent Them

In this session, Alexandra Weaver, Semperis Solutions Architect, discusses the most common AD security vulnerabilities she encounters in her work with customers, how attackers take advantage of those gaps with examples from recent attacks, and how you can harden your AD security posture to prevent attacks.

Date: 07/19/2022

Time: 11:00am


Enterprise Ransomware & Recovery Summit

In this free, half-day summit, the editors of Virtualization & Cloud Review and Redmondmag.com, as well as top infosec and IT experts, will come together to offer you their insights and advice on the current ransomware landscape and what to do if you're attacked. Learn more.

Date: 07/22/2022

Time: 9:00 am


Active Directory & Azure AD: What’s New & What’s Hot Summit

Join us for this free half-day summit where the editors of Redmondmag.com will bring together Azure AD and AD experts to walk you through the newest features plus share their tips, advice and best practices so you can walk away with a real catch-up of exactly what Azure AD/AD can do for your organization right now.

Date: 08/17/2022

Time: 9:00 am


Microsoft Teams: Security Best Practices Summit

Join the editors of Redmondmag.com as well as independent security and Microsoft Teams experts for this can't-miss, free half-day summit that will give you real-world advice you can use today to secure your Teams installation and harden it for the future. Don't miss it!

Date: 08/26/2022

Time: 9:00am


Enterprise Cloud Security Summit

In this free half-day seminar, brought to you by the editors of Redmondmag.com and Virtualization & Cloud Review, find out the top 10 threats you're facing, get real-world architecture advice and find out the pros and cons of public, private and hybrid cloud platforms.

Date: 08/31/2022

Time: 9:00am


Microsoft 365 Security Best Practices Summit

Join the editors of Redmondmag.com for this free half-day summit where they'll bring you together with independent experts who work with Microsoft 365 security day-in and day-out. They'll share their inside tips, best practices and everyday advice you can use that same day to improve your Microsoft 365 security and recoverability. Be sure to join us!

Date: 09/14/2022

Time: 9:00 am


Top Cloud Backup & Recovery Best Practices Summit

With this heavy weight on your shoulders, you need expert advice. That's why the editors of Virtualization & Cloud Review, AWSInsight and Redmondmag.com have brought together independent experts to give you the real-word advice, best practices and insights you need to make sure that if/when the worst happens you can come back quickly, hopefully with the click of a button or two. Don't miss it!

Date: 10/05/2022

Time: 9:00am


Best Practices for Ransomware Defense and Recovery Summit

Find out the best way to get your defense plan in place from independent experts who've done it before with this free half-day summit brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com. Don't miss it!

Date: 10/14/2022

Time: 9:00am


Managing & Securing Active Directory & Azure AD Summit

The editors of Redmondmag.com have put together this free half-day summit by bringing you independent Azure AD/Active Directory experts to walk you through the new best practices for wielding Azure AD/Active Directory to your best advantage. Don't miss out!

Date: 11/04/2022

Time: 9:00 am


On Demand

Hybrid Cloud Security Summit

A hybrid cloud infrastructure just makes sense for many organizations. Most enterprises use a variety of cloud types and services -- and rightly so -- but unfortunately, that’s going to complicate your security strategy. Learn the tips, tricks, do's, don'ts and modern best practices of experts who secure (and recover) these systems on a daily basis. If you're responsible for your organization's cloud infrastructure in any way, this is the summit you don't want to miss!


Best Practices to Understand and Fight Ransomware with Nutanix

Ransomware is today’s number one threat affecting businesses of all sizes. During this session you’ll learn and understand about The current state of ransomware and how it’s evolved, including the new threat landscape, Industry best practices around planning and preparing for a ransomware incident, and more!


Azure & Your Digital Transformation Summit

Microsoft's Azure cloud technology has so much to offer enterprises, but most IT leaders can't keep up with all the relevant changes. And Azure can be the key to your digital transformation strategy, but only if you understand how it can lead your efforts toward application modernization, reducing technical debt, and more. That's why the editors of Redmondmag.com have joined with independent experts and MVPs, plus leaders from Microsoft and SoftwareONE, to walk you through what's new in Azure and how it can truly be the linchpin for your organization's digital transformation strategy. You don't want to miss this free, half-day summit -- register now!


Securing, Managing and Recovering Microsoft Teams Summit

The editors of Redmondmag.com have joined with independent experts to create this this free half-day summit that will walk you through current best practices for managing, securing and recovering Microsoft Teams, offering real-word advice, top tips and solutions.You don't want to miss it!


Microsoft Teams Management Best Practices

In this session, Nathan O’Bryan (MCSM: Messaging, MVPr Office 365) will explore Best Practices for Securing, Managing and Recovering Microsoft Teams to ensure security, and compliance while maintaining the appropriate levels of access for end-users.


Microsoft Teams Security & Recovery Best Practices

Since the onset of the pandemic over two years ago, Microsoft Teams has become one of the world’s most indispensable applications. This session discusses various Microsoft best practices as they relate to Teams security, data protection, and recovery.


How to Easily Backup and Recover SAP HANA Environments in Azure

Today, many customers are choosing to run their production SAP infrastructure in Microsoft Azure to optimize costs, increase agility and take advantage of the many Azure native services. Join our industry experts as they discuss the latest tips and tricks for protecting SAP HANA in Microsoft Azure.


Coffee Talk: Why Hybrid Cloud and Why Now?

Competitiveness requires agility, the ability to pivot instantly and effortlessly whenever business opportunity presents itself. Nothing supports agility better than hybrid environments. In this Coffee Talk session, Senior Resultant Howard M. Cohen discusses what a natural development hybrid cloud solutions really are, and how to strategically design best solutions with logical combinations.


What's NEW in Veeam Backup for Microsoft 365 v6

Now the #1 provider of Microsoft 365 backup has added more control and effortless recovery in NEW Veeam® Backup for Microsoft 365 v6!


Zero Trust 101 Summit

Join the editors of Virtualization & Cloud Review and Redmondmag.com for this free, half-day virtual summit bringing together independent experts who will walk you through what zero trust is and the best ways to implement it in your enterprise.


Hybrid Cloud Data Backup & Recovery Summit

With all the threats attacking your hybrid cloud infrastructure, you know how important reliable data backup and disaster recovery is -- and with the shared responsibility model, it's really up to you to make sure you can get things right (and quickly!) Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSInsider.net for this free half-day summit along with independent experts who will help get you up to speed with real-world best practices for hybrid cloud enterprise backup and disaster recovery in 2022 and beyond.


Expert Hands-On Disaster Recovery Best Practices for Hybrid Infrastructures

Disasters take many forms when they strike IT systems. Are you ready to spring into action with a concise plan, restoring your company's systems quickly and safely? Join this session to learn DR best practices proven in the field by seasoned IT veterans. Understanding what works and what doesn’t could make all the difference when disaster strikes, and time is of the essence.


Top Infrastructure Tips for Hybrid Cloud Backup & Disaster Recovery Data

In this session, you will learn about the types of disaster recovery options that are available, how they protect your data, and some strategies for providing good data protection at several different price points.


Ransomware Recovery Best Practices

Ransomware should not stop your backup or restore capabilities when you need it most. Join our webcast to learn more about the latest research on ransomware's impact on IT environments, how to use the Veeam 3-2-1-1-0 rule, and a demo of Veeam's powerful capabilities.


Modern Hybrid Cloud Security Summit

The editors of Redmondmag.com, Virtualization & Cloud Review, and AWSInsider.net have brought together independent security experts for this free, half-day summit that will walk you through the security threats you can expect to face in the new year plus the real-world best practice advice you can implement right way. Don't miss out!


Build Your Cloud Business Case Backed by Data Insights

Running your workload in the cloud provides an opportunity to take advantage of new technical and financial opportunities. When considering a cloud migration and building a cloud business case, it is important to understand the vast number of options that are available for you. It is also critical to find effective solutions to manage and optimize your cloud spend once you are in the cloud. View this on-demand session to learn how cloud economics and FinOps can help you understand the opportunities the cloud provides and mechanisms to manage spend in a new environment.


What is Your 12-Month ITAM Roadmap? Building Your Program Around SaaS and Cloud

The shift to SaaS and cloud technologies has been a top discussion in ITAM circles for years. In 2022, ITAM teams without a plan to manage SaaS or cloud within their program will get left behind and miss delivering significant value to their organization. A new approach is needed in ITAM to get more teams to manage SaaS and cloud technologies. So, what's the next step to preparing your organization?


Unintended Consequences of Transitioning to the Cloud

Organizations struggle to maximize the value of their IT investments. But surprisingly few CIOs are prepared for the optimization challenges magnified by hybrid IT as more software, SaaS, containers, and cloud are introduced into the environment. This on-demand session examines where the market is going (hint, subscription models are the future) and explore the impacts on the traditional roles of asset management, procurement, and cloud teams.


Is Your Zero Trust Evaluating the Right Identity?

Authentication, despite forming the basis of every security strategy, cannot be overlooked as a minor cog in the wheel. With hybrid model of working being the norm, it is imperative for authentication to be context-aware, and sensitive to all unique userrelated cases. Learn more!


Leveraging AIOps in your ITSM Operations

It’s been about five years since AIOps emerged as an identifiable enterprise practice, and yet this application of analytics and machine learning to big data to automate and improve IT operations is already a table stakes capability in a growing number of highly competitive markets. In this webcast, you’ll learn how AIOps-driven ITSM operations can enable DevOps teams to be more productive, align DevOps and Product teams for rapid innovation, and apply analytics for rapid iteration that drives better customer experiences.


3 Microsoft 365 Backup Keys to Success

This panel session will cover best practices Microsoft 365 administrators and their stakeholders need to be aware of, how Microsoft 365 technologies complement each other for holistic protection, and debunked myths on Microsoft 365 data ownership and management.


The Dangers of Hidden Email Data

Where is your unstructured data lurking? Between the record number of cyberattacks happening every day, and the introduction of robust compliance laws, such as GDPR and CPRA, it's time to reduce any weak spots in your data. In this on-demand webcast, we focus on the dangers of de-centralized email storage, offer practical solutions so you can identify where vulnerable files reside, and give advice on how to get executive buy-in allowing you to take action now. Join us to learn how to minimize millions of dollars of risk.


How to Transfer PST Files to Office 365

PST Files haven’t been necessary for over a decade. Even with overwhelming evidence of security & compliance risks piling up against PSTs, many enterprises continue to use them. The need to migrate PST data to Office 365 to improve security and upgrade the user experience has never been greater, with hybrid environments leaving data increasingly vulnerable.


What about the email archive? Modern strategies for migration

Is it time to modernize your legacy email archive? Every SaaS email platform has archiving capabilities, but you should know what all of your options are before you begin planning an archive migration.


Remote Mobile Collections for Corporate Investigations

When gathering crucial data from employees’ mobile phones, are you having to ship equipment or struggling with lengthy support sessions with custodians to guide them through the process?


eDiscovery Investigations in the Age of Remote Work

With remote mobile collection, you can gather insights from across a variety of data sources and collect only the data you need to protect employee privacy during eDiscovery investigations.


Getting the Most Out of Your Microsoft Security Investment With MDR

Join Greg Schulz, Sr. Analyst & Microsoft MVP at Server StorageIO, and Jerry Carlson, Microsoft Alliance Manager at Critical Start, for an interactive discussion. Jerry and Greg will discuss trends, customer pain points, techniques, and best practices for Operationalizing and maximizing your Microsoft Security investment with MDR. Learn more!


Enterprise Best Practices for Azure AD/ Active Directory Summit

Azure Active Directory (Azure AD)/ Active Directory are extremely powerful tools for your enterprise, but are you using Active Directory to its top potential. Do you know the current best practices? Are there new features you might have missed out on? With everything IT managers need to fully grasp when it comes to Azure AD/Active Directory, the editors of Redmondmag.com have pulled together this half-day summit to walk you through the new best practices for wielding Azure AD/Active Directory to your best advantage. Don't miss out!


Modern Azure AD/Active Directory Security Best Practices

Maintaining good security is one of the most important tasks for any Active Directory environment. In this session, you will learn why a previously secure Active Directory might no longer be secure, things that you should be doing today to harden your Active Directory environment, and Microsoft’s current best practices for Active Directory security.


Top 10 Azure AD/Active Directory Best Practices for 2022 and Beyond

Although some Active Directory deployments are simplistic, even a basic Active Directory deployment can eventually become unwieldy and difficult to manage. This session will discuss things that organizations large and small can do to tame their Active Directory environments, making them more efficient and easier to manage.


Coffee Talk: Creating the Perfect Contact Center System

Join us for a Coffee Talk and find out why many organizations are re-defining and re-distributing their contact centers, and what you need to get started/support it. Learn more!


Identity Management & Zero Trust Summit

Join the editors of Redmodmag.com with independent security experts for this free half-day summit that will walk you through real-world best practices, practical advice and new tools you might have missed.


Zero Trust Implementation Tips & Techniques

Join us as we examine the components Gartner originally identified when they first defined Zero Trust, and some that have evolved. We'll also examine how to approach it from a broad encompassing level down to as many areas of detail as we can fit into one session.


Best Practices for Enterprise Multicloud Management

Come join us to learn how to implement best practices for enterprise hybrid multicloud management, such as creating a consistent view across the cloud environments with a unified layer of abstraction and governance and securing managed cloud infrastructure resources across multiple functional areas.


Top 10 Multi-Cloud Management Tips, Tricks and What Not to Do

We'll give you the first thing NOT to do right here from the outset: Don't think multi-cloud is too complex to manage, and don't think it's simple. Join this session to learn what's the differences, why choose one cloud over another, and apply DevOps to Multi-Cloud Management to achieve continuous improvement through continuous deployment.


Expert Best Practices for Multi-Cloud Environments

Multicloud is no longer a matter of “if”, it is a matter of “when” and “how”. But how will organizations operationalize and manage Multicloud? In this session, we share best practices and lessons learned from the trenches to help you successfully adopt Multicloud.


Enterprise Multi-Cloud Management Best Practices Summit

Attend this half-day virtual summit to learn what you need to know now about performance and best practices for getting Azure, AWS and GCP to work better together. As always, our summit session content is from the editors of Redmondmag, plus independent experts who offer real-world insight and advice that attendees can use right away!


Avoid Hybrid Active Directory Outages: Unifying Change Monitoring and Recovery Across On-Premises and Cloud Platforms

To stay on top of rising threats, IT professionals must identify unwanted changes and vulnerabilities across critical Microsoft platforms. Watch now to learn more about the importance of change monitoring in defensive AD security strategies.


Cloud Data Protection 101 Summit

Join the editors of Virtualization & Cloud Review and Redmondmag.com along with independent data and infosec experts who do this work day-in and day out who will walk you through all the modern tips, tricks and best practices you need to know to truly keep your data secure, no matter your cloud setup.


Cloud Data Security Basics

In this session, you will learn about the basics of protecting your data while gaining the flexibility and speed that the cloud delivers. Learn more!


Cloud Architecture & Cloud Data Security: Top Dos and Don'ts

In this session you will learn about patterns and practices for network security, protecting those pesky storage accounts, and how to plan for effective and secure access for your company and even for third parties who may need to access your data. Learn more!


Coffee Talk: Remote Workforce Security & Best Practices

Time to stop thinking WFH. When people work remotely, they may not be home. Your remote work policies and procedures must include public places too. Join Senior Resultant Howard M. Cohen for a hot cup of info and insight about keeping everyone and everything secure and productive from afar!


Active Directory Migration: Go Native or Not

You can’t always predict when you’re about to face a sizable migration. Maybe a merger, acquisition, or divestiture came your way and you got the exciting news that you have a migration in your near future! When you have an Active Directory consolidation looming, how do you know whether Microsoft native tools can do the job, or whether you should consider a tool that’s more tailored for the job? This on demand webcast will help you identify some of the pros and cons you should take into consideration as you make the decision to go native or not.


Simplifying Microsoft 365 Tenant Migrations

The pandemic has created opportunity for plenty of M&A/Divestiture activity. This effectively results in lots of new tenant migration/consolidation projects to ensure users can be productive in their new organization. But M&A activity-based migrations often come with tight deadlines that IT must hit. And to make matters worse, the native tools available for tenant migration are extremely limited, making it difficult for IT teams, and impacting M&A plans and timelines. So, how can you simplify tenant migrations to align IT outcomes with business requirements?


VDI & EUC Best Practices in the New Remote Landscape

Over the past few years, we have seen an unprecedented adoption of remote work. With this in mind, now is a great time to reflect on what we have learned during this time about rapid, large-scale deployments of VDI environments and the best practices around it. People who are new to, or are investigating, VDI will gain insights into how to make their transition from physical to virtual desktops smoother while those who already have a VDI environment in place will pick up tips to help optimize it and provide a better experience for their users.


Best Practices for Enterprise VDI & End User Computing Summit

The editors of Virtualization & Cloud Review and Redmondmag.com as well as independent experts who will take a deep-dive into the current status of end user computing technology, review best practices for securing your remote workforce and share real-world knowledge for configuring, maintaining and improving your VDI and other end user computing technology. You won't want to miss it!


Reinvent the Workplace with End User Computing

It may not be clear exactly what the “next normal” looks like for your organization, but with renewed focus on transformation for nearly every business there is opportunity to rebuild and gain a competitive advantage. Join Harsha Kotikela of Nutanix as he discusses how to implement EUC in the modern era and avoid the mis-steps of the past and how a Citrix on Nutanix solution can help you.


So You've Been Breached -- What Now?

Attacks are inevitable and breaches are probable, particularly where your Active Directory is concerned. Join breach prevention and incident response experts from Semperis as they provide best practices to ensure you recover quickly, completely, and in a more secure state than before.


Enhancing Digital Operations through AIOps

The advent of artificial intelligence (AI), primarily in the form of machine learning, has brought opportunities and challenges to the enterprise. In this Tech Talk technology journalist John K. Waters talks about AIOps with Prashant Darisi, General Manager and Vice President of Customer Experience Management in the Global Solutions group at Everbridge, and Rob Jahn, Sr. Technical Partner Manager at Dynatrace.


How Dedicated Active Directory Backup Simplifies Ransomware Recovery

Active Directory enables businesses to securely grant or restrict access to systems, applications, and environments. It’s also becoming a primary target for ransomware attacks, as bad actors exploit misconfigurations and blind entry points to penetrate, corrupt, and control applications and their data. In this webinar, we’ll explore how dedicated Active Directory Backup mitigates silent cybersecurity threats and simplifies restore operations to get your business back online.


Recovering from Ransomware with Zerto

Expect to learn how the Zerto architectures use continuous data protection, our unique journal, and immutable offsite copies to neutralize a ransomware infection.


Integrating UEBA with Zero Trust — Accounting for The Human Element

In this webinar, we'll discuss how a UEBA solution fits into a Zero Trust architecture and how you can implement the same. Learn more!


THE SAFETY NET: Ransomware Recovery and Disaster Recovery for Hybrid IT Environments

Ransomware and other cyberthreats are changing business’s needs for data protection across their on-premise, private cloud, SaaS and public cloud environments. Discover the benefits of multi-layered data protection for your Hybrid IT environments.


Simplifying Microsoft 365 Tenant Migrations: It’s All in the Planning

In this lively discussion-format webcast, join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Senior Product Manager, Malte Schoch from Quest, as they discuss Microsoft 365 tenant migrations.


When Ransomware Attacks Summit

Make sure you're ready for the biggest threat to your cloud and enterprise. Don't miss out!


Current Ransomware Attacks & Strategies

How are ransomware groups carrying out attacks in 2022 and how are their tactics evolving? This session will answer those questions and offer practical advice for those trying to defend their networks from these accelerated attacks.


Malicious Browser Notifications: The New Phishing Attack Not Blocked by Your Current Cyber Defense

Cybercriminals have added a devious weapon to their attack arsenals - malicious browser notifications. And the worst part is they’re not blocked by any current cyber defense. These innocuous looking pop ups can wreak havoc on your network while remaining completely undetected. Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist to find out what you need to know now about malicious browser attacks and how to stop them.


Migrate your Oracle Workload to Azure with No Risk and Almost Zero Downtime

Join Oracle Ace Director Charles Kim and Oracle experts Kellyn Gorman, Tim Gorman and Clay Jackson for a discussion about how Microsoft and Quest can help you migrate your Oracle workload to Azure Infrastructure with zero risk and near-zero downtime.


The 7 Critical Reasons You Should Backup Your Microsoft 365 Data

Join our webinar, in collaboration with Veeam, so you’re not a part of the 60% of Microsoft 365 users that DO NOT have a data protection solution in place. Learn more.


Top Security and Other Concerns with Teams & Remote Workforce

In this session, Nathan O’Bryan will explore different scenarios for hybrid and work-from-home workers. We’ll cover the best practice strategies your organization should be considering to ensure security, and compliance while maintaining the appropriate levels of access for workers using a mix of company owned and BYOD devices.


Microsoft Teams: Expert Remote Workforce Best Practices Summit

Microsoft Teams has become the backbone for many enterprises; remote workplace strategies. But in the rush to implement it (and Microsoft's rush to add new features and make other changes), knowing the best ways to use (and NOT to use) Microsoft Teams to manage your remote workforce can be hard to pin down.


Microsoft Teams & Remote Workforce Management Best Practices

Remote work and hybrid work have quickly become standard over the last few years. However, what remains the same is the need to manage both the users and the tools they use to perform the work. How you manage in a remote world is far from normal. This session will cover some best practices you can implement, specifically around Teams, to help with remote workforce management.


Why Database-as-a-Service is Crucial for Enterprises

Take a peek under the hood at any given enterprise, and you’ll likely find hundreds to thousands of databases - commercial and open-source, relational and non-relational - running both on-premises and in one or more public clouds. Join Jeff Kelly, Senior Product Marketing Manager at Nutanix, to learn how Database-as-a-Service (DBaaS) can simplify and de-risk database administration, reduce operating costs, and turn databases from a blocker to an accelerator of software-driven innovation.


2022 Data Protection: Best Practices

Based on Veeam’s 2022 Data Protection Trends Report, which surveyed nearly 3,400 IT leaders and implementers of data protection around the world, this session will look at the key scenarios that are driving changes in data protection tools and mechanisms.


Best Practices for Managing and Securing Microsoft 365 Summit

Join the editors of Redmondmag.com plus independent experts in this free half-day summit that will walk you through what you need to know about best practices for managing and securing Microsoft 365. If you have anything to do with Microsoft Office 365, you don't want to miss this summit!


Microsoft 365 Management Best Practices for Enterprises

Due to the critical role Microsoft 365 has taken in most businesses' day-to-day operations, it is more important than ever to ensure that you are managing it properly and effectively. Join this session to learn the best practices for managing Microsoft 365.


Microsoft 365 Security Best Practices for Enterprises

This session examines security best practices that enterprises can use today to better protect their Microsoft 365 data. Learn more.


Incident Response: Opportunities for Automation

DevOps and Agile are commonplace practices in the enterprise today, and the advent of CI/CD pipelines has added monitoring and automation to the process, creating conduits for delivering code changes frequently and reliably. This Tech Talk applies some of the lessons learned from DevOps and Agile practices to the process of automating incident response in your organization.


7 Steps to Better Microsoft 365 Security

Microsoft 365 is the most commonly used cloud office suite in the world, helping users generate, share, and store billions of files. In order to secure those files, many companies leverage M365’s out-of-the-box security capabilities but those capabilities can vary widely by license type, and many require extensive deployment, planning, and configuration.


Coffee Talk: UC as a Service: What Is It and Why Should Enterprises Care?

UCaaS goes far beyond being just another way to communicate, and this session will highlight all the advantages enjoyed by those who have made the switch.


Why AV & EDR are Failing to Stop Ransomware and What You Can Do About it

Ransomware attacks make headlines every week. Formerly proven security tools like next generation antivirus (NGAV) and endpoint detection and response (EDR) solutions don’t stop unknown attacks. Fileless, in-memory malware, and other advanced persistent threats evade NGAV and EDR at an alarmingly high rate. This is in spite of machine learning and behavioral detection.


Protecting Your Hybrid Active Directory Environment

You're moving to Azure Active Directory (AAD) but must maintain on-premises AD for the foreseeable future. Unfortunately, the only similarities between AAD and AD is the name. In this webinar, hybrid AD security experts from Semperis will talk about the difference, the interdependencies, and connections between these two mission critical identity stores. Join us to improve security and resilience for your legacy and Azure ADs, no matter where you are on the journey.


Combating Cyberattacks in 2022: Prepare to Defend Your Active Directory

Cyberattacks and the threat of ransomware reached new heights in 2021. In this webinar, you'll hear strategies to increase your defense capabilities and ways to build greater resiliency for your Microsoft platforms. Watch now on-demand!


Zero Trust Is Hot: Here's What It Is (and What It Is Not)

Join Ian Thornton-Trump for thoughts, feelings, emotions and raw survival instincts of looking at the latest and greatest “Zero Trust” approaches and finding that they may not hold up to “the real” world of IT unless - a lot of work, a lot of effort and money is readily available.


Zero Trust Best Practices: What Enterprise IT Needs to Know About Implementation

During this second session, we will examine some of the critical steps and preparations you’ll need to take to properly implement Zero Trust.


Zero Trust Summit

Join the editors of Virtualization & Cloud Review and Redmond magazines for this free half-day virtual summit bringing together independent experts detailing what you need to know now about zero trust.


5 Key Steps to a Successful Microsoft SQL Server Database Environment and Deployment

Managing SQL Server estates is a daunting task, especially for DBAs and IT teams. In that case, this webinar will walk you through best practices and methods of automating many of these mundane tasks using Nutanix Database Solutions. Learn how these steps can help you minimize the risk of downtime, reduce costs, and ensure a well-run SQL Server deployment.


Metallic Lunch & Learn - DMaaS Tech Demo

See award-winning DMaaS in action! From driving digital transformation to fortifying ransomware response strategies, companies of every size are leaning into Data Management as a Service (DMaaS) to safeguard their critical business data.


Powering the Modern Workplace with Zscaler and Microsoft

Over the next decade, 40% of the S&P 500 companies will cease to exist due to competition. Almost every business is aggressively adopting cloud, increasing their use of SaaS apps and allowing private apps to no longer run solely in the datacenter, but also the public cloud. Join us in helping your people and teams thrive, protect sensitive data, and propel the business forward and take a dive deep into the integrations between Microsoft and Zscaler.


Ransomware: Secure Backup is your last line of Defense

Veeam® Software is secure by design. Having a reliable backup can be the difference between downtime, data loss and paying a costly ransom. Veeam Software includes instant recovery at scale in case of a massive outage. Plus, our software‑defined approach means there is no lock‑in into proprietary hardware and it works with your existing architecture, both on‑premises and in the cloud.


Veeam Backup & Replication v11 Demo Video – Ransomware Protection

Stop ransomware in its tracks, ensure backup compliance and safeguard your recoverability with immutability for your backup copies.


The War on Ransomware Continues: Best Practices with V11

The ransomware threat continues to put data and business reputations at risk. In this webinar, join Rick Vanover from Veeam® to share the latest tips for beating ransomware by assessing the threatscape, evaluating steps you can take to protect your data and learning what's new in Veeam Backup & Replication™ v11 to keep your data protected.


Coffee Talk: Top Hybrid Work Trends for 2022 and Beyond

In this first “Coffee Talk” brought to you by our editors, we’ll discuss the key areas of change and the challenges IT pros can anticipate having to solve as we continue to evolve this new way of work. Join Senior Resultant Howard M. Cohen as we explore this brave new communicative world!


Decoding why SASE is SSE-first

As businesses prepare to open up in the post-pandemic world, they've realized that conventional ideas of corporate perimeters have been altered permanently. Watch this webinar to learn about Cybersecurity challenges in the post-pandemic world, SASE: The long-term solution, and more.


5-min demo: SaaS Data Protection

Gain control over your Office 365 data! Within all SaaS platforms including Office 365, it is your organization’s data — you control it — and it is your responsibility to protect it. Veeam® Backup for Microsoft Office 365 eliminates the risk of losing access and control over your Office 365 data at scale, including Exchange Online, SharePoint Online, OneDrive for Business, and Microsoft Teams — so that your data is always protected and accessible.


Demo Video: Protect Your Data

For most organizations, what hinders data availability is failed backup and recovery. Modern services and cloud acceleration are putting a strain on legacy data protection solutions. We see upwards of a 60% failure rate in data recovery due to failed backup and recovery processes. But even with the most modern data protection, cyberthreats are still one of the biggest security threats for any enterprise organization. In 2020, ransomware attacks grew by 700% alone. However, with modernized protection, 96% of organizations that were affected by ransomware cut their average recovery costs down to $5,000, with 76% of companies not paying anything at all. How? Let’s look at an example of how easy it is to protect your data with Veeam.


Best Practices for Securing Active Directory and Azure AD

In this session, you will learn about things that you can be doing today to improve the security of Active Directory and Azure AD. Learn more.


Securing Azure AD & Active Directory Summit

Join the editorial staff of Redmondmag.com and independent experts who will make sure IT managers have what they need to know to protect their enterprise. Learn more.


Azure AD & Active Directory: Top Security Issues in 2022

Join Ian Thornton-Trump as he looks at the evolution of Windows AD from its earliest days to the security solution, configuration and management tool it has become.


Technical Deep-Dive into #1 Office 365 Backup

Join us for this technically‑focused presentation, and learn about the infrastructure components, and how simple it is to use Veeam® Backup for Microsoft Office 365 — from the early planning stage all the way to performing restores.


VIDEO: Best Practices on Microsoft 365 Backup

Watch this free technical product demo to get an in depth look into the best practices for using Veeam® Backup for Microsoft 365.


DEMO: Microsoft Teams Backup

Although Teams data has its own basic retention, Microsoft doesn’t fully protect against accidental deletion or security threats that lead to data loss, nor does it enable long-term retention for compliance or regulatory purposes. Whether it’s Teams or your entire Office 365 environment, it's your data — you control it — and it is your responsibility to protect it.


Recorded Demo: AWS-native Backup with Veeam

Watch this interactive session to learn more about how NEW Veeam Backup for AWS delivers AWS-native backup and recovery that is both cost-effective and secure.


Identity Management for Attack Prevention

As IT continues to evolve as a result of work from home, digital transformation, cloud adoption, and other trends, identities are a critical element of protecting the organization as a whole. At the same time, identity management is becoming increasingly complex and unified identity security is often elusive.


5 Must-Haves for the Best AWS Backup and Recovery

A robust data protection solution is a vital component in your organization's tool set. Whether you need to restore files or application data, or recover entire workloads, your data protection solution must provide these capabilities with minimal effort and allow you to meet your operational objectives.


Cloud Data Protection & Disaster Recovery Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSinsider.net have created this free, half-day virtual event pulling together independent experts who will walk you through real-life techniques, best practices and more for helping you keep your cloud data protected and truly recoverable in 2022 and beyond. Learn more.


Expert Cloud Data Backup & Recovery Best Practices

In this session, Karen Lopez covers best practices for modern data recovery and shares stories of worst practices just to keep it real. Learn more.


The New Cloud Data Security Best Practices

In this session, you will learn about some of the tools available across public cloud providers and third-party software vendors that can help you identify risks, limit exposure, and help you survive internal and external threat actors. Learn more.


Leveraging AIOps and Service Intelligence for Active Incident Response

Artificial intelligence for IT operations (AIOps) combines big data and machine learning to automate IT operations processes, including event correlation, anomaly detection, and causality determination. In this Tech Talk veteran technology journalist John K. Waters talks with Prashant Darisi, General Manager and Vice President of Customer Experience Management in the Global Solutions group at Everbridge.


Microsoft 365 & Teams Heading into 2022 Summit

You won't want to miss this free, half-day summit brought to you by the editors of Redmondmag.com to catch you up on what you need to know about Microsoft 365 & Teams heading into the New Year. Learn more.


Digital Transformation in 2022 Summit

Don't miss this half-day summit brought to you by the editors of Virtualization & Cloud Review, Redmondmag.com, PureAI.com, AWSInsider.net, MCPmag.com and ADTmag.com where you'll learn about how digital transformation has transformed for 2022 and how you can take steps now to take advantage of it in the coming year and beyond. Don't miss out!


The Digital Transformation Landscape in 2022

In this session, we will discuss strategies that IT professionals can use to properly define digital transformation and develop an action plan to implement it. Learn more.


Key Digital Transformation Best Practices

In this session, Senior Resultant Howard M. Cohen will take you through some smaller digital transformations, finding new ways to make small but meaningful process improvements through more innovative applications of available technologies. Learn more.


Data Protection Strategies in 2022 for a Hybrid Multi Cloud World

In this educational webcast, join industry experts as they discuss the latest research on what is driving data protection strategies in 2022 including tips on how to get started with Microsoft Azure and Veeam®.


How To Turn Your Email Signature Pains Into Business Gains

Managing email signatures across an organization can be complex and cumbersome. Ensuring consistent branding with professional and consistent email signatures for all users and devices is often an ongoing IT task with little return.


Best Practices for using the Cloud for Backup, Disaster Recovery, and Long-term Retention

Adrian and Greg will discuss trends, techniques and best practices in using optimized cloud object storage for backup, disaster recovery, and long-term data retention.


Managing & Securing End User Computing Summit

Come watch the editors of Redmondmag.com and Virtualization & Cloud Review at this half-day event featuring independent experts to review best practices for securing your remote workforce.


Securing the Remote Workplace

There is a new security threat being exploited. In addition, there are various regulatory requirements that need to be met to ensure successful implementations.


Multi-Cloud Trends to Watch in 2022 Summit

Join us for this half-day summit that will walk you through the security threats you can expect to face in the new year plus the real-world best practice advice you can implement right way. Learn more.


Top Multi-Cloud Trends Impacting Enterprise IT

In this session we’ll explore why companies are becoming so much more deliberate in their approach to multi-cloud, including: Enjoying the best of all clouds, The importance of avoiding vendor lock-in and more! Learn more.


Multi-Cloud Best Practices Heading into 2022

As cloud adoption has grown over time, many companies have solutions spread across different cloud vendors and on-premises. Multi-cloud can be very effective, enabling you to leverage the best of all options, however it must be implemented correctly to prevent issues.


Digital Resilience: Is Your Company Ready?

In this live Tech Talk, veteran technology journalist John K. Waters talks with Bart Rys, Director of Business Solutions in the Everbridge Global Center of Excellence, about digital resilience.


Securing Public Sector Data in the Cloud

In this webinar, we’ll discuss the role data protection plays in minimising ransomware risk, with a focus on how public sector organisations are harnessing it to protect their cloud data, and plan to recover if the worst happens.


Ransomware 3.0: We Thought It Was Bad and Then It Got Even Worse

Attend this presentation to learn how ransomware is evolving to inflict maximum damage and more importantly how to protect yourself and your organization.


Cloud Security 101: Top Enterprise Cloud Setup & Configuration Best Practices

Join us as a Cloud Security Architect covers the fundamental practices every enterprise must consider for comprehensive cloud management and security. Learn more.


Getting Started with Cloud Security Summit

What are the current best practices for the modern IT enterprise? Find out in this half-day summit from the editors of Virtualization & Cloud Review.


Ransomware: Top Threats and Best Practices Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSinsider.net for this half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practice advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Learn more.


Why Machine Identity Management is Essential to Establish Zero Trust

In this webinar, we'll discuss why machine identity management is a crucial component in establishing a robust Zero Trust architecture, and how you can successfully gain better visibility over machine identities and automate the process of managing them.


Top 10 Microsoft 365 Security Best Practices Every Organization Must Implement

In this session, we will look at the top 10 things you should consider right away to make your Microsoft 365 environment as secure as possible! Learn more.


Microsoft 365 Security: Top Installation, Configuration and Management Mistakes and "Gotchas"

During this 60-minute session, Nathan O’Bryan (Microsoft Certified Solutions Master: Messaging/5x Microsoft Most Valuable Professional) will dive into the EM+S E5 suite and the features it brings to help secure your Microsoft 365 deployment. Learn more.


Microsoft Office 365 Security Summit

Join the editors of Redmondmag along with Microsoft 365 experts for this informative and free half-day summit on Microsoft 365 Security: Top Installation, Configuration and Management Mistakes and "Gotchas" and the top 10 Microsoft 365 Security Best Practices Every Organization Must Implement. Learn more.


Hybrid Clouds/Multi-Clouds in 2022 and Beyond Summit

It's a hybrid-cloud/multi-cloud world. Find out the best tips, tools and best practices to support your new infrastructure.


The Silent Scream of Every Network: The Horror that is Active Directory Security

Join us and let Derek Melber, 17X Microsoft MVP show you how to operate on the beast, making it capable of withstanding the constant attacks. Learn more.


How to prepare for the upcoming Microsoft 365 price increase

Starting March 1, 2022, Microsoft will raise the fees of three products. For an organization with 20,000 employees, this M365 E3 uplift would cost an additional $960,000 per year. And, not actively measuring and managing these licenses often results in two costly challenges.


Administrative Delegation and Policy Control in Microsoft 365

With security breaches on the rise, it is more important than ever for an organization to minimize its risk by separating administrative responsibilities. Even so, the Microsoft 365 native tools make it difficult to delegate administrative tasks at a granular level. This becomes far more challenging in multi-tenant environments.


New Remote Workforce Best Practices for 2022

This informative talk will focus on practical steps that IT pros can take right now to take the pain out of working remotely. In this session, you will learn how to identify the biggest challenges that your organization is facing with regard to remote work, what IT’s priorities should be at this moment in time, and more! Learn more.


What's Ahead for Your Remote Workforce in 2022 Summit

Join the editors of Redmondmag.com and Virtualization & Cloud Review have pulled together this free half-day summit promoting what you need to know heading into the new year -- top trends and best practices that will keep your new remote workforce infrastructure not only secure and compliant but functional and cost-efficient into 2022 and beyond. Learn more.


Remote Workforce for Enterprises for 2022: A Look Ahead

In this session, we’ll take a look ahead at where many of the technologies we already use are heading, and what new tools may soon become available to help companies better roll with the momentum the Covid-caused work-from-home new normal has created. Learn more.


Back to Basics – A Practical Guide to Following the NIST Framework for Ransomware Risk Management

In this webinar we will discuss the NIST Cybersecurity Framework for Ransomware Risk Management with a focus on what the guidance includes, how this guidance compares to other options, how to detect where your program falls short, and actionable advice on where to start and which actions will yield the most benefit.


Modern Ransomware Defense & Remediation Summit

Find out the best way to get your defense plan in place with this free half-day summit brought to you by the editors of Virtualization & Cloud Review, AWSInsider.net and Redmondmag.com. Learn more.


Evolving Digital Operations: People, Process & Technology Summit

Using automation as part of your digital transformation strategy is key for every IT manager in 2022 -- but do you know where to start? Or how to be successful? Do you have the tools to get you where you need to go?


Enterprise Cloud Backup & Recovery in 2022 Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSInsider.net for this free half-day summit along with independent experts who will help get you up to speed with real-world tools and techniques you need to know about Cloud Backup and Recovery in 2022. Learn more.


Take Charge of Your Microsoft Office License Renewal

Learn all about how to optimize your Microsoft licenses for the upcoming renewal increases.


Managing Your Microsoft Dynamics 365 Data: Retain, Recover, and Be Ransomware-Ready

Microsoft Dynamics 365 is the heartbeat of your business, bringing together data and insights to better run day-to-day operations. But as data loss threats continue to trend in the wrong direction, there’s never been a better time to consider third-party data backup.


Top Best Practices for Windows Enterprise Security Heading Into 2022

Join Ian Thornton-Trump CD for a look at all the security goodness built into the Windows Operating system to thwart malicious attacks and dive into the Windows security ecosystem and discuss his top security tips and system hardening ideas.


Microsoft Security in 2022 Summit

The editors of Redmondmag.com have created this half-day summit to get you up to speed on exactly what's happening with Microsoft's Security Roadmap plus give you tips, advice and best practices you can use right away to secure your Windows-based ecosystem. Learn more.


Understanding and Protecting Kerberos – The Soft Underbelly of Cybersecurity

With the advent of Active Directory more than 20 years ago, the Kerberos protocol was a game-changer in terms of security, unification, and moving AD into the realm of identity management. Learn more.


2022 State of IT & Digital Transformation Leadership Summit

Don't miss this expert-packed, two-hour summit created for CTOs, CIOs, IT directors, and IT professionals looking for technology trends that will impact them and their market in the new year. Learn more.


Identity & Access Pain Points: Top Issues from AD Integration to SaaS Control to Compliance

During this 60-minute session, Nathan O’Bryan (Microsoft Certified Solutions Master: Messaging/5x Microsoft Most Valuable Professional) will share his top identity management considerations and explain how these choices can have a lasting impact on your Microsoft 365 deployment. Learn more.


Identity & Access Management Best Practices: What IT Pros Need to Know Now

Join us to learn the best practices for establishing an IAM architecture that will work with your existing infrastructure and across clouds. Learn more.


Identity & Access Management Summit

In this virtual summit, we look at top issues surrounding IAM, supplementing Active Directory and Azure AD, including SaaS authentication, changing compliance requirements and emerging approaches such as CARTA, continuous and adaptive risk and trust assessment. Learn more.


Mastering Hyperconvergence Summit

Don't miss this free half-day summit brought to you by the editorial staff of Virtualization & Cloud Review and Redmondmag.com who will bring together independent HCI experts for to walk you through tips, advice, best practices and more that will help you master hyperconvergence. Learn more.


Top Hyperconvergence Infrastructure Tips

In this session, you will hear from two industry experts regarding best practices on managing and maintaining HyperConverged Infrastructure. Learn more.


Real-World HCI Best Practices

In this session, you will learn essential information about keeping your HCI infrastructure running and looking at future-proofing your designs. Tune into this session for expert industry advice for two of the worlds leading experts in HyperConverged Infrastructure.


DevSecOps: Securely Navigating a Shifting Threat Landscape

In this live Tech Talk, veteran technology journalist John K. Waters talks with DevSecOps expert Stephen Walters, solution architect at xMatters, a subsidiary of critical event management company Everbridge, about DevSecOps best practices. Learn more.


Incredible Email Hacks You'd Never Expect

In this webinar Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, explores many ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Learn more.


Part II: Optimizing and Securing Communications in the Hybrid Workplace

This is the secont of a two-part podcast featuring experts from unified communications platform provider RingCentral.


Ransomware advice webinar: Hear from experts

To beat ransomware, preparation is key. In this session, Rick Vanover from Veeam® and Krista Macomber, senior analyst at Evaluator Group, will share advice on ransomware protection, so that you will be better equipped to handle a ransomware attack on your organization.


Cloud Protection Trends: Expert Insights

Join Veeam’s vice president of product strategy, Jason Buffington and vice president of enterprise strategy, Dave Russell as they share key research insights from the NEW 2021 Cloud Protection Trends Report to help organizations of all sizes learn what to consider when adopting cloud based production platforms and how to protect them.


How to Create a SIEM Framework That Aligns With NIST Guidelines

Join our webinar where our SIEM expert talks about how you can align your SIEM framework with NIST guidelines. Learn more.


Best Practices for Cloud Storage, Backup & Recovery Summit

Don't miss this half-day summit where you will learn best practices and insights you need to make sure, should the worst happen (and it very well could), you can come back up with the click of a button. Learn more.


Best Practices for Managing, Securing and Recovering AWS

Join our expert solution architect to discuss a comprehensive approach to management and security of AWS. Learn more.


AWS Architecture & Configuration Best Practices

In this session, we'll go through a few cloud architectures and explain why these design choices were made, and discuss a few best practices around application scalability, security and resilience. Learn more.


Expert AWS Best Practices Summit

Hear from experts who live and breathe AWS security, performance and recoverability and the editors of AWSinsider.net and Virtualization & Cloud Review in this half-day summit packed with tips and real-world advice.


Why Office 365 Backup is Essential

With Office 365, It's your data — you control it — and it is your responsibility to protect it. Join the experts to find out why Office 365 backup is so essential! Learn more.


Microsoft 365: A Look Ahead to 2022 Summit

In this summit, join the editors of Redmondmag.com plus independent experts to learn everything you need to know about changes coming to Microsoft 365 in 2022! Learn more.


What's New in Microsoft 365: Top Features You Might Have Missed

Keeping up with all the changes and new features in Microsoft 365 is a constant challenge. Join Nathan O’Bryan in this session as he covers some of the new features and functionality that have been announced for Microsoft 365. Learn more.


What's Ahead & Best Practices for Microsoft 365 in 2022

In this session we'll help you with the cliff notes brief understanding of "what's coming and what's new for this next calendar year" and catch you up on Microsoft 365 Best Practices. Learn more.


Hacking Your Organization: 7 Steps Cybercriminals Use to Take Total Control of Your Network

In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the "Cyber Kill Chain" in detail to show you how a single email slip up can lead to the total takeover of your network. Learn more.


Veeam Platform Updates: Protect Cloud, Virtual, Physical environments

Watch this webinar for a full run down of the latest on the Veeam Platform products with a demo of some of the newest capabilities, including native and advanced protection for AWS, Azure and Google Cloud Platform, and more! Learn more.


Hybrid Cloud & Cloud Database Preparation for 2022 and Beyond

Attend this free, half-day virtual summit brought to you by the editors of Virtualization & Cloud Review, Redmondmag.com & AWSInsider.net to learn what you need to know now about performance, best practices and more for managing your hybrid cloud infrastructure and data thanks to insights, advice and insights brought to you by leading independent hybrid cloud experts. Learn more.


Your Hybrid/Multi-Cloud Infrastructure & Data: Wise Decisions for 2022 and Beyond

Whether its decisions about how to manage backups, or how to design high availability solutions in a hybrid cloud scenario, join us to learn about how to ensure you have availability, security and data integrity. Learn more.


Hybrid & Multi-Cloud Data & Database Best Practices

Whether you are on platform as a service, or infrastructure as a service, or in a hybrid model, you will face new and different challenges when moving to the cloud. Join this session to learn about how to optimize your databases in modern infrastructure. Learn more.


Simplifying Azure data protection and migration with Veeam

Simplify data management between on-premises and public cloud environments and lower storage expenses with Azure-native backup and recovery, built for simplicity, scale, savings and security.


Cloud Security & Recovery Summit

What are the top threats after your cloud today and heading into 2022? How can you make sure your cloud infrastructure and data remain as safe as possible, and easily recoverable if the worst happens? Join the editors of Redmondmag.com and Virtualization & Cloud Review for this free half-day summit. Learn more.


Top 10 Cloud Infrastructure & Data Best Practices

In this session Top 10 Cloud and Infrastructure and Data best practices you will gain valuable insight into protecting your cloud from our expert speakers. Learn more.


The Cloud Security Threat Landscape Heading Into 2022

Join Ian Thornton-Trump CD for a look backward, a look forward and a stark warning about the biggest threats and the biggest opportunities for organization’s digital transformation efforts. Learn more.


Part I: Optimizing and Securing Communications in the Hybrid Workplace

This is the first of a two-part podcast featuring experts from unified communications platform provider RingCentral.


Modern Tips for Microsoft 365 Tenant Migrations

In this webcast, we will explore the top 5 tips for Tenant-To-Tenant migrations, including methods to prepare, migrate, coexist, and manage in this changing world. Learn more.


How to Painlessly Deliver and Scale Company Email Signatures

How do you address your organization’s growing (and evolving) email signature needs n without making it a full-time job? Learn more.


Masterclass: Simplifying Identity and Access Management with AD360

In this webinar we'll discuss in-depth a platform that can take care of all your IAM needs. Join to learn how to efficiently evaluate an IAM platform, see how ManageEngine AD360 can help you tackle IAM challenges across AD, Exchange, and Microsoft 365 environments and more! Learn more.


What About the Email Archive? Modern Strategies for Migration

Join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Jason Jacobo from Quadrotech/Quest, for this educational webcast as they discuss why you can't just start migrating your archive, what archive data should and shouldn't be migrated and what your options are when it comes to migration strategies. Learn more.


Maximizing Microsoft 365 Summit

Join the editors of Redmondmag.com plus independent experts in this half-day summit that will walk you through what you need to know about configuration, optimization, security, backup tips and tricks plus more. Learn more.


Top Tips for Managing and Optimizing Microsoft 365

Join us to learn the top tips for managing your Teams environment and getting the most out of your deployment beyond just keeping Teams running for your users. Learn more.


The Top 10 Actions Every Organization Should Take to Protect their AD from Attacks

Join us to learn the 10 actions you can take that will greatly increase your chances of fighting off attackers and building your resilience. Learn more.


Migrating to Windows 11: It’s All About the Preparation

What does it take to simplify the process of migration to achieve a secure and productive Windows 11 environment when you’re done? Learn more.


Top Security & Ransomware Threats Summit

From the latest threats to the best recovery methods should the worst happen, this half-day summit will make sure you’re armed and ready if (when) your enterprise falls under attack. Learn more.


The Top 10 Ransomware Attacks Enterprises Need To Worry About

Join us as we take a page from the Facts of Life and look at the impact law enforcement is having on ransomware attacks and the groups that are still a threat.


Top Steps Every Enterprise Must Take NOW to Protect Themselves from Ransomware

Join two of the industry’s top experts on Cyber Security and Ransomware as they discuss how to take a proactive approach against Ransomware today. Learn more.


Why Disaster Recovery Will Matter Even More in 2022

Join us as we discuss the dynamics of a new-age disaster recovery program that addresses a mobile workforce, the threat of ransomware, the sudden absence of key people, and how to define viable alternatives in the New Year. Learn more.


Enterprise Disaster Recovery Summit for 2022 and Beyond

Join the editors of Redmondmag.com and Virtualization & Cloud Review, plus their hand-picked independent experts, as they walk you through the real-world advice that your organization is going to need to make sure you're truly protected in the year ahead with a disaster recovery and backup plan that is truly recoverable and that is also manageable and secure. Learn more.


What's New in Microsoft Teams for Security, Performance & Management

Join us to learn the latest updates to Microsoft Teams that you need to know about in order to get the most from your Teams deployment. Learn more.


Microsoft Teams: Security, Performance & More Summit

Join Redmondmag.com and independent Microsoft Teams experts for this completely free half-day summit to bring you real-world guidance you can use today to make your Microsoft Teams installation more secure, better performing and much easier to manage. Learn more.


Top 10 Microsoft Teams Best Practices Every Organization Needs To Implement

Join us to learn the top Microsoft Teams deployment considerations and an explanation on how these choices can have a lasting impact on your Teams deployment. Learn more.


Why office 365 Backup is Essential for the Modern Business

There is a common misconception that Microsoft fully backs up your data on your behalf, but the reality is that this is YOUR responsibility. Join NewCloud, an Otava Company and Veeam as we discuss Backup for Microsoft Office 365 and how it can help your business.


Cloud Data Protection for 2022 Summit

Don't miss this important look ahead at cloud data protection strategies that you need to know brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com. Learn more.


Modern Cloud Data Protection Best Practices

Join us for a look at what practices you and your organization should be implementing in your cloud and hybrid data solutions including Confidential Computing & Zero Trust, Data Security Features, Anti-tamper Features, and more! Learn more.


Top Threats to Your Cloud Data Landscape in 2022

Join Ian Thornton-Trump CD, CISO for Cyjax Ltd as he outlines how we arrived into a post-pandemic digitally transformed landscape and the top threats to SaaS and hosting services. Learn more.


Top 10 Things You Should Never Do with a Multi-Cloud Architecture

Join our experts to gain deep insight on the top 10 things you should never do with a Multi-Cloud Architecture. Learn more.


Hybrid Cloud/Multicloud Security Summit

Don’t miss this half-day summit brought to you by the editors of Redmondmag.com, Virtualization & Cloud review and AWSinsider.net will bring together independent cloud security experts that will give you real-world information you can use to make sure your cloud data is truly secure. Learn more.


The New Generation of Hybrid Cloud Security Best Practices

Join us to learn the best emerging practices for ensuring the optimal security posture for both the public and private cloud as part of an enterprise hybrid cloud platform. Learn more.


Understanding the New Remote Workforce

Join us to learn how the key to the remote workforce of tomorrow is to produce productivity and performance through people, platforms, applications, programs, processes, and policies. Learn more.


Remote Workforce Summit

Join the editors of Redmondmag.com and Virtualization & Cloud Review along with independent experts who will share their insights on what you need to do NOW to make sure your remote workforce and digital workplace is protected for the future. Learn more.


Top 10 New Best Practices for a Secure Remote Workforce

Because remote work was put into place so quickly, the solutions that were rapidly adopted probably aren’t as secure as they might be if the organization had been able to take its time. Join us in taking a step back to consider how things could be improved – especially with regard to security. Learn more.


Incorporate Zero Trust and SASE into your IAM strategy to secure your hybrid workforce

Join us as we discuss the security challenges involved in catering to a hybrid workforce, how Zero Trust and Secure Access Service Edge should be at the forefront of your IAM strategy and how to keep up with the key trends to build a strong IAM framework for your organization. Learn more.


A Master Class on Cybersecurity: Roger Grimes Teaches Data-Driven Defense

Join Roger Grimes for this thought-provoking webinar where he’ll share the most common reasons for data breaches and a data-driven approach to determining your organization’s specific weaknesses. Learn more.


Cloud Infrastructure in 2022 Summit

Join this summit to find out what your top infrastructure and cloud security concerns should be for the rest of 2021 and heading into 2022. Learn more.


Architecting Security for the Cloud

Join us as an expert reviews the importance of not relying on only one control, and what additional measures can be used to protect you, or at least mitigate, against future problems.


Top 10 Tips for Cloud Infrastructure Heading into 2022

Join the experts as they discuss the top 10 tips for Cloud Infrastructure in 2022 surrounding networking, site connectivity, security, administration and more. Learn more.


Microsoft 365 Security, Backup & Recovery Summit

Join the editors of Redmondmag.com and Virtualization & Cloud Review for this free half-day summit where they'll bring you together with independent experts who work with Microsoft 365 security day-in and day-out. Learn more.


Top Microsoft 365 Security, Backup & Recovery Mistakes

Join us as we look into the common mistakes or assumptions related to making sure your data in Microsoft 365 is safe and how to correct them. Learn more.


The New Best Practices for Microsoft 365 Security, Backup & Recovery

In this Webinar, you will learn a number of data protection strategies particularly with regard to data backups and security. Learn more!


Defending Against Active Directory Attacks That Leave No Trace

In this session, an identity and access management expert will walk you through some attack techniques that bypass traditional monitoring solutions. Learn more.


AWS Security, Backup and Recovery Best Practices

Join us to learn how to protect yourself against ransomware and the latest security threats as we discuss AWS Architectures designed for data protection, backups, and disaster recovery. Learn more.


AWS Cloud Security Summit

Are you prepared to manage your entire AWS cloud ecosystem securely? Make sure you're truly secure with this free half-day summit. Learn more.


Threat Detection Thursday — Life of a Zero-Day in the BlueVoyant SOC

Join this panel Q&A commenting on the lessons learned from the angles of Improved Detection, Threat Hunting, and Accelerated Response. 


Ransomware: All About the Benjamins

2021 has been a weird one for ransomware. We've seen more ransomware groups than ever either taken down by law enforcement or decide to "retire" but ransomware attacks have not slowed down at all. Learn more.


Best Practices for Cloud Storage, Backup & Recovery Summit

Don't miss this half-day summit where you will learn best practices and insights you need to make sure, should the worst happen (and it very well could), you can come back up with the click of a button. Learn more.


Fuel Digital Transformation: Changing Document Productivity Challenges into Opportunities

The shift to a hybrid workforce and digital workspaces has caused many organizations to heavily rely on PDF documents, e-signatures and workflows to replace manual in-office processes that no longer meet current business needs. Learn more.


Challenges and Best Practices for Protecting Azure Kubernetes Services

Enterprises all over the world are seeing more mission-critical cloud-native applications deployed on Kubernetes. Learn more.


Transforming Cloud Security with SASE

SASE is a security framework designed to counter threats that thrive in an environment which is invisible and distributed. Learn more.


Modernizing Privileged Access Management: Stopping Cyberattacks in Their Tracks

How can you implement privileged access management where both flexibility and effectiveness are achieved? Learn more.


Microsoft 365 and SharePoint Online Best Practices Summit

Don’t miss this summit that will keep you ahead of those changes and give you real-world insights you can use the same day to improve your Microsoft 365 and SharePoint Online installations. Learn more.


Top 10 Security & Backup Tips for Microsoft Office 365 and SharePoint Online

Join us for this session to learn a number of best practices that can enhance SharePoint’s performance. Learn more.


Best Practices for Managing & Optimizing Microsoft 365

Join us for this session to learn a number of best practices that can enhance SharePoint’s performance. Learn more.


Why it’s Time to Revisit Your Teams Strategy

This Webcast explains why it’s time to take a step back and take a critical look at your organization’s unified communications strategy, especially as it relates to Teams. Learn more.


How You Can Extend the Cloud Perimeter Beyond the Microsoft Cloud

During this webinar, we'll be unpacking some of the deeper integration potential around MCAS and your 3rd party SaaS and PaaS apps. Learn more.


Multi-Cloud Security Summit

Join us to discover top cloud security threats and what you can do to secure your multi-cloud and hybrid cloud environment in the face of today's top threats. Learn more.


Top Hybrid/Multi-Cloud Security Threats

The key takeaways from this presentation will help security and IT teams support your organization’s business objectives while at the same time continuing to maintain a robust security and compliance posture. Learn more.


Security Best Practices for Hybrid/Multi-Cloud Environments

This session outlines strategies and tactics for keeping our hybrid cloud environments safe from ever-increasing threats. Learn more.


An Admins Guide to Secure and Efficient Microsoft Teams Management

In this webinar, we're going to provide some of our favorite tips and guidance to help you best manage Microsoft Teams. Learn more.


Digital Resiliency Strategies for Application Infrastructure in a Hybrid Cloud World

Application delivery infrastructure and security have become more complex. Learn more.


Top Microsoft Teams Best Practices for Today's Workforce

Join Senior Resultant, Howard M. Cohen, as he shows you how to produce your best results by leveraging Teams best practices. Learn more.


Maximizing Microsoft Teams Summit

Join the editors of Redmondmag.com and independent Microsoft Teams experts for this free, half-day summit filled with real-world tips, advice and best practices to help you get the most out of your Microsoft teams installation, no matter the size of your organization. Learn more.


Expert Insights for Maximizing Your Microsoft Teams Installations

Join this session as we look at ways you can maximize some of the other benefits Microsoft Teams has to offer. Hopefully, you'll come away from this session with at least one new piece of functionality within Teams that you can take back to your organization to help you get even more from platform! Learn more.


Veeam CDP: Tips for Lightning-Fast Recovery

In this webcast, we will share the latest tips and tricks for implementing this new capability for those critical workloads that require near-zero Recovery Point Objectives (RPOs). Learn more.


Understand the Differences Between Traditional Endpoint and Cloud-Based Device Management

Sign up for this webcast and you’ll come away with a clear understanding around system and licensing requirements, and talking points to convince your internal stakeholders of the shift. Learn more.


Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim?

After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Learn more.


Cloud Data Protection Best Practices for AWS & Azure

Join us for the second session of summit as you will learn about the options you have, their cost impact and structure, and finally best practices for securing your environment. Learn more.


The Top Ransomware Threats You're Facing Right Now

Join us for the first session of summit to learn how ransomware groups are going after the cloud with the same ferocity they have been attacking local networks and learn what you need to do to protect yourself and your cloud providers. Learn more.


Ransomware & Cloud Data Protection Summit

Join us for this half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practice advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Learn more.


The European Union's Recommendations to Prevent Cyberattacks on SMEs

After identifying and analyzing the cybersecurity issues faced by SMEs post-pandemic, the EU has developed recommendations that could help SMEs improve their cybersecurity posture. Learn more.


How to Create a Unified Threat Hunting Experience Across Security Portals

This webinar is for you if you’ve been comfortable with the old portal but want to know more about the new environment. Learn more.


Pain Points: When to Consider Switching or Evolving Your Cloud Architecture

Please join us for this session as we discuss tips on how to make your cloud usage more efficient! Learn more.


State of the Cloud Art: The What, When and Why of Public vs. Private vs. Hybrid vs. Multi-Cloud

Remember when managing your network or data center meant constantly updating, upgrading, and shopping for new hardware and new software to constantly keep making your infrastructure better and better? Learn more.


Integration Between Microsoft’s EDR Technology and Incident Response Across the Productivity and Collaboration Layer

Join this webcast and you’ll walk away understanding how to balance the needs around organizational security with your user’s quality of work life. Learn more.


How to Reduce Alert Fatigue, Optimize Logs, and Concentrate on High Value Sources of Information

Join us for this webcast as we discuss Attack Surface Reduction, creating valuable Identity Protection Policies, and managing your end user’s experience in the process. Learn more.


#1 Office 365 Backup: Technical Deep Dive

Join this webcast and learn about the infrastructure components, and how simple it is to use Veeam Backup for Microsoft Office 365 — from the early planning stage all the way to performing restores. Learn more.


Implement DMARC the Right Way to Keep Phishing Attacks Out of Your Inbox

​​​​​​​Get the details you need to know now to protect your organization from phishing and social engineering attacks. Learn more.


Expert Hybrid Cloud Data Tips & Infrastructure Best Practices

Join us as Howard M. Cohen examines how to approach data management and protection in today’s hybrid environments. Learn more.


Top Hybrid Cloud Data Dos and Don'ts

Join this session of summit to learn about networking, authentication, security, and monitoring concerns, and techniques for resolving them. Learn more!


Hybrid Cloud Data Summit

To help guide you the editors of Virtualization & Cloud Review, AWSinsider.net and Redmondmag.com have teamed up with independent cloud experts to show you how architecture, best practices, security protocols, new tools and much more can make your job managing these systems so much easier. Learn more!


Protecting Your Organization Against Zero-Day Vulnerabilities

Join us as we take a deep dive into the process of these Proxylogon attacks and use this information to establish steps you can take to keep your organization secure from similar zero-day attacks using a strong SIEM framework. Learn more.