Webcasts


Upcoming

10 Things I Hate About Storage Silos

Join us to hear the top 10 most common problems your peers and colleagues have with storage silos, and how you can solve them. Learn more.

Date: 06/04/2020

Time: 11:00am


How to Consolidate Multiple Office 365 Tenants

Office 365 tenant to tenant migrations present a host of challenges that can impact end-users, but these can be mitigated against with smart planning and execution. Join us to learn how! Find out more here.

Date: 06/10/2020

Time: 11:00 am


How to choose the right Privileged Access Management solution for your needs

Privileged Access Management (PAM) is essential to meeting compliance and security requirements. Choosing the ideal PAM solution for your organization’s needs can be a challenge. There’s a wide range of choices available. So how do you choose?

Date: 06/10/2020

Time: 11:00 AM


10 Incredible Ways to Hack Email & How to Stop the Bad Guys

Join us as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. We will also share a special treat - a (pre-recorded) hacking demo by Kevin Mitnick. Learn more!

Date: 06/11/2020

Time: 11:00am


Sector-17: The State of Cybersecurity in the Legal Sector

This webinar will review the findings of the global analysis and provide helpful insight to law firms in specific and concerned organizations in general. Find out more.

Date: 06/16/2020

Time: 2:00pm


Best Practices for a Successful Cloud Center of Excellence

This session will walk through a framework to help you benchmark your cloud management processes, identify areas for improvement, and maintain cross-functional alignment across cloud financial management, operations, and security and compliance. Learn more.

Date: 06/18/2020

Time: 11:00am


Take Two Steps to Obtain Endpoint Compliance and Data Protection

Join us in this information-packed session in which industry expert Tim Warner and Quest Software's Jillian Salamon walk you through practical steps to achieve endpoint compliance and cure your IT management teams' headaches. Learn more.

Date: 06/24/2020

Time: 11:00am


On Demand

Best Practices for Maximizing Your Hyperconvergence Implementation

Join this session packed with expert advice about hyperconvergence infrastructure and the most important do’s, don’ts and gotcha’s. You’ll leave with a solid understanding of the top things do (and not to do) when implementing HCI. Learn more.


Top 7 Benefits of Hyperconvergence

Get an expert walk-through of the top seven benefits, including ease of deployment, cost savings and management benefits. Learn more.


Going All-In with Hyperconvergence: Why You Don't Want To Do HCI "Lite"

In this session, find out about what Hyperconvergence really is and why so many enterprises are moving to this new way of architecting their systems. Learn more.


Inside Hyperconvergence: Maximizing Your Enterprise

Join us for this free half-day seminar and hear from independent industry experts on why hyperconvergence is the future, the top benefits that HCI provides and learn best practices from those who’ve gone before. Learn more.


Going Remote: Architecting Cybersecurity for the Short Term AND the Long Term

In this webinar, you will hear how a leading cybersecurity services company shifted to an all-remote delivery model and how their experience can be used to inform decisions for your own organization. Learn more.


5-min demo: Data Security

Veeam Availability Suite 5-min Demo on Data Security. In mid-2018, the average ransomware payment was $41,198. By late-2019, that price more than doubled to $84,166. With modernized data protection, however, 96% of organizations cut their average ransomware recovery cost down to $5,000, with 76% of companies not paying anything at all. How? This demo shows how to protect your data with immutability from Veeam®.


5-min demo: Hybrid Cloud Acceleration

Veeam Availability Suite 5-min Demo on Hybrid Cloud Acceleration. The adoption of modern backup systems is driving rapid cloud adoption through the unification of tools — ensuring over 49% savings in hybrid cloud protection. This demo shows how to use native backup and recovery services straight from the cloud, reducing time, cost and resources.


5-min demo: Modernizing Backup

Veeam Availability Suite 5-min Demo on Backup Modernization. Through Cloud Data Management™, organizations are achieving substantial results, including 50% lower cost of data protection and backup, and higher productivity across development, backup and recovery teams. This demo shows how to re-use your backup data to drive rapid application development through virtual sandboxes.


10 Best Practices for VM Backup

When backing up virtual machines, one should consider applications running on the machine, how critical the machine is for business operations and how fast you can get back up running when a disaster occurs. Proper protection for critical applications and implementing off‑site solutions are essential to keeping VM data available while minimizing data loss. Every business should have a backup strategy to guarantee virtual machines are properly protected and recoverable.


Remote Employees' Password Self-Service and Productivity Tracking

Jay Reddy our IAM strategist, hands-out must-haves and must-dos for effective password management and productivity tracking for remote working use cases. Learn more.


Maximizing the Return on Your Office 365 Licenses

In this webinar, we cover how your Office 365 licensing can perfectly align with the needs of your organization via a combination of continuous measurement, automation and delegation. Learn more.


Improving IT Cost Efficiency in Private and Multi-Clouds

Cloud admins and architects are increasingly being tasked to manage applications across multiple clouds while on a tighter budget than ever. Learn more.


The Dos and Don’ts of Recovering Active Directory from a Scorched Earth Disaster

In this technical workshop, you’ll learn the dos and don’ts of recovering AD from a cyber disaster, including recovering AD even if domain controllers are infected or wiped, restoring AD to alternate hardware and eliminating reinfection of malware from system state backups. Learn more.


Re-think Your Refresh! Your Applications Deserve Better

Join this session about modern applications and the need for modern infrastructure and data protection. Learn more.


Choosing the Appropriate Cybersecurity Assessment for Your Organization

This webinar aims to empower decision makers on cybersecurity assessment selection with simplified analogies to home inspection that are then developed into in-depth comparisons of external and internal vulnerability assessments, penetration tests, red teaming and specialized types of assessments including CMMC. Learn more.


Reduce Costs and Increase IT Agility with Self-Service

In almost every industry, IT is under tremendous strain as they enable remote work at scale, keep systems up, and strive to reduce costs in this challenging business environment. Learn more.


Endpoint Backups: Now More Important than Ever

In the work-from-home era; it is now time to consider the need to backup endpoints when they are out of the data center. Learn more.


10 Ways that Coronavirus, Sadly, Makes Cloud Disaster Recovery Shine

n this special webcast, our expert explores some of the ways both incremental and comprehensive cloud approaches, such as cloud backup, cloud disaster recovery and disaster recovery as a service (DRaaS), are proving their value in these extremely challenging times. Learn more!


Cloud-Based Disaster Recovery Virtual Summit: Taking a Coronavirus Lens to Your Enterprise Transition

Join this virtual summit to see how the Covid-19 virus has caused a rapid and massive shift in the way IT is done accelerating the industry transition to cloud-based approaches to learn concrete ideas for filling newly opened gaps and the cloud's role in business continuity in the post-pandemic future.. Learn more.


Cloud DR for the Long Haul: The Many Possible COVID-19 Futures to Take Into Account

We're hearing a lot about how things will never be the same after COVID-19. Maybe. As someone responsible for your organization's business continuity, your job is to keep multiple possible scenarios in your head at once. Join us as our experts look at three potential scenarios. Learn more.


In a Pandemic, Will That Old Plan for Hurricanes, Tornadoes and Ransomware Still Work?

Join our experts as the explore concrete guidance on shoring up your existing business continuity plans for the mid-pandemic enterprise. Learn what a comprehensive cloud disaster recovery plan should include now that it might not have required before COVID-19. Read on!


Top 5 Ways to Prepare for your next Microsoft 365 (Office 365) Tenant Migration

The moving of data in Office 365 (now Microsoft 365) between tenants, in some ways, is the easy part. Learn more.


A Proactive Approach to Securing Active Directory

Active Directory is seen as a legacy application implemented without security in mind. Attackers are fully aware of this and are using this to attack many organisations today.


Nutanix Business Continuity Solutions Protect your Apps and Data From IT Downtime Due to Disasters

The Nutanix Private Cloud takes all the guesswork out of deploying scalable, resilient, pay-as you grow software defined infrastructure, providing self-healing, highly available, resilient infrastructure that ensures application and data availability in the event of both planned and unplanned disasters. Learn more.


The Business Impact of Data Protection

Data protection has now become the heart and soul of many organizations. It’s not just simply about backing up and restoring data but extending your capabilities to reuse and get the most from that data. Learn more.


Many Ways to Defeat Multi-Factor Authentication and How To Stop the Bad Guys

Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years of experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite MFA solution Learn more.


What Enterprises Don’t Know About M365 Data Protection

Email is the #1 SaaS application, yet 6 out of 10 organizations don’t have adequate data protection. Join Chadd Kenney, Clumio Chief Technologist, and guest speaker, Archana Venkataraman, Associate Research Director, Cloud Data Management, IDC Europe, to discover the M365 data protection challenges and how you can overcome them. Learn more. *IDC- Why a Backup Strategy for Microsoft 365 is Essential for Security, Compliance, and Business Continuity


Unleash the Power of NAS Backup

With the NEW Veeam® Backup & Replication™ v10, we bring the most powerful, reliable and easy-to-use file-level backup capabilities aimed at protecting your file shares.


Veeam Availability Suite v10 - Backup and Recovery capabilities you didn't know about

Your business is likely protecting data from and in any environment, including cloud, virtual and physical — but are you using the key capabilities needed to achieve your recovery and business agility goals? What about unstructured NAS data that is rapidly growing unchecked? When moving data off site — are your copies protected from things like ransomware?


Best Practices in Planning On-Prem and Cloud Backup

In this engaging, interactive webinar, we’ll look at the trends, issues and challenges of protecting a hybrid data center and provide best practices for what you can do to address them today. You’ll learn how to simplify your data protection strategy in the cloud and in the data center without compromise, all while removing complexity and cost.


Maximizing Your Hybrid Cloud Investment

The cloud has evolved from being a thorn in the side to IT to becoming a clear enabler of business. This on-demand webcast explores how IT professionals feel about using the cloud, both public and private. Don’t miss this opportunity for valuable, insightful data about cloud use from a broad spectrum of over 300 IT pros ― so you can see how your organization's use of cloud compares.


Protecting Microsoft Office 365 with NetVault

If you think your Office 365 data is automatically protected, think again. Sure, Microsoft may host the infrastructure, but it doesn’t offer the levels of data protection needed to satisfy your demanding data protection, disaster recovery and compliance goals. Watch this on-demand demo to see how NetVault delivers comprehensive Office 365 data protection.


Cloud Management Made Easy: Best Practices for Your Data-Driven Business

Adoption of the cloud continues to grow, yet despite its enormous advantages, the cloud also creates new challenges and pain points. For example, the more you explore and embrace different cloud services, the more costs increase. In addition, it becomes more difficult to keep track of workloads and services. And as you seek to modernize your applications via cloud-based containers, new management complexities arise.


Why Managing Containers Changes the Game for Cloud Applications

In this webcast, Peter Varhol of Technology Strategy Research, and Quest Foglight product designer Mike Condy, explore why teams are increasingly using containers, and what effect these decisions have on their operational strategies. They examine the uptake of containers as a development and deployment environment in the cloud, and how containers using Dockers and Kubernetes change application architectures for new applications.


Leave Nothing Behind: Cloud Migration Done Right

If you’re thinking about migrating workloads to AWS or Azure, do you know exactly what you’ll migrate, what you’ll leave on premises and what it’ll cost, now and in the future? Get full visibility into your cloud migrations and how migrations will affect your environment by listening Microsoft MVP Tim Warner, and Quest Software.


Best Practices in Office 365 Data Protection

Attend this webinar and learn about the gaps left by Microsoft’s Office 365 protection, the risks posed and how to overcome them all with a comprehensive 3rd-party data protection solution. Learn how to get the Office 365 backup and recovery strategy you need and want.


Making Veeam Backup & Replication Better

Join Greg Schulz, IT expert and founder of StorageIO, and Adrian Moir, Senior Consultant at Quest Data Protection, for an insightful and dynamic conversation about your evolving storage and backup requirements.


More Effective Cybersecurity: The Practical Application of The MITRE ATT&CK Framework

In this webinar, Mike Scutt delves deeply into the MITRE ATT&CK framework, discusses its implications for Security Teams and shares how to implement it. Learn more.


Ransomware vs. Active Directory Backups: What Can Throw a Wrench into Your Disaster Recovery Process?

In a cyber disaster, you must recover Active Directory before you can recover your business. But only one in five organizations have a tested plan in place for recovering AD after a cyberattack. This is alarming given the spike of ransomware attacks and the widespread impact of an AD outage. Learn more!


OnDemand Webcast - Securing Active Directory: Proactively Detecting Attacks & Attack Pathways

Let 15-time Microsoft MVP, Derek Melber, show you how to detect hidden misconfigurations, attacks, and even do threat hunting. Don’t miss this opportunity to secure your most essential identity and access control: AD.


Private vs. Public vs. Hybrid vs. Multi-Cloud: Understanding Security Liabilities and Strengths

How does picking a public vs. private vs. hybrid cloud set up affect your security risk? Is private-only really the most secure option -- or one that most enterprises need? What do secure hybrid cloud setups look like? Join this session to find out! Learn more.


Cloud Security Architecture for AWS & Azure: Expert Advice

In this live roundtable, the editors of Redmondmag.com and Virtualization and Cloud Review have brought together AWS and Azure architecture experts to talk about the real-world architecture concerns that can significantly affect your systems’ security. Learn more.


Top Cloud Security Threats to Watch for in 2020

In this session, we'll discuss why the cloud is your enterprise’s No. 1 attack vector! You can’t afford to miss a possible vulnerability. Stay on top of the hackers


2020 Enterprise Cloud Security Summit

Join us for this free half-day seminar and find out the top 10 threats you're facing, get real-world architecture advice and find out the pros and cons of public, private and hybrid cloud platforms. Learn more.


Optimizing the Office 365 Experience When Everyone’s at Home

As more and more individuals are working from home, IT organizations need to learn how to address bandwidth constraints, lack of corporate security safeguards, and cybercriminals looking to take advantage of the situation while still looking to deliver a fast, consistent, and secure Office 365 experience. Learn more.


Next-Generation Databases Don’t Sit in Silos

Legacy database solutions have had their place, but it’s high time for a new competitor to out-rank the silos, complexity, and lag of multi-tiered architecture. Learn more.


Database Migration to Azure: Which Option to Choose, and Why

Join Microsoft MVP Tim Warner and SolarWinds to understand how Microsoft Azure supports the infrastructure-as-a-service (IaaS) and Database-as-a-service (DBaaS) deployment models, and what questions you need to answer before you undertake your database migration journey. Learn more!


Converge or Hyperconverge: That is the Question

Like a real-life "choose your own adventure" book, IT Organizations are constantly forced to make critical decision about which path to take. Learn more.


Reducing Reliance on AD as You Move to the Cloud

While on-prem AD infrastructure ages, many companies are looking to reduce their AD footprint as they are moving to more and more cloud services. Learn more.


Securing Active Directory: Proactively Detecting Attacks & Attack Pathways

Active Directory is seasoned and well known. Unfortunately, the security set at install, 15 years ago, is still weak. However, the attackers are using these attack pathways to move laterally and gain privileged access in AD. Let 15-time Microsoft MVP, Derek Melber, show you how to detect hidden misconfigurations, attacks, and even do threat hunting. Don’t miss this opportunity to secure your most essential identity and access control: AD. Learn more.


Securing Privileged Remote Access When Everything’s Insecure

We’ve quickly shifted to a world where even the most privileged IT admins need to connect using devices and network connections that may be anything but secure. Learn more.


Controlling the Cost of Office 365: The Viability in Visibility

Licensing Office 365 seems straightforward enough: have a user, buy a license. Learn more.


Cyber CSI: Learn How to Forensically Examine Phishing Emails to Better Protect Your Organization Today

In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will show you how to become a digital private investigator and get inside the mind of the hacker, learn their techniques, and how to spot phishing attempts before it’s too late! Learn more.


Leveraging IT & Enterprise Service Management for Cloud Automation & Governance

According to most credible CIO sources, Cloud makes the top 3 in the priority for 2020. Increasingly leading organizations are looking for ways to streamline and automate cloud services and management while retaining real-time governance to maximize the impact cloud can have on innovation in the business. ​ Learn more.


Active Directory: Best Practices for Administration and Backup

Microsoft Active Directory is the basis for every Microsoft‑oriented networking environment. However, it’s not always a solid basis. With thousands of network environments under their belts, Sander Berkouwer (Microsoft MVP) and Veeam’s® Andrey Zhelezko know their Active Directory. Watch this webinar to benefit from their best practices.


3 Ultimate Strategies for Ransomware Prevention

Ransomware is here to stay. As much as no one likes to hear that, we have to admit that it’s no longer a question of ‘if’ but rather ‘when’ and ‘to what’ extent your business might be affected. Rather than hope it won’t get you, let’s explore all the options that exist to prevent, locate, disarm and mitigate ransomware risks. We’ll go over some essential strategies you can implement today and also review what a comprehensive backup software can offer you.


Attacking & Defending Active Directory Workshop

In this workshop, we’ll demonstrate real-world attacks used against Active Directory, including credential theft, Kerberos-based attacks, Group Policy-based attacks, and ACL attacks. This is a red vs. blue standoff, so don’t expect a bunch of slideware. Read on!


Modernize Your BC/DR on a Back-to-School Budget

Unitrends has long empowered SLED institutions to achieve robust data protection without unnecessary complexity. Join a Unitrends specialist as we discuss how SLED organizations leverage their platform to break down silos and deliver rapid ROI. Learn more!


[COVID-19] WFH Essentials for IAM Administrators. Must-Haves and Must-Dos.

Learn from our IAM experts, how we at Zoho Corporation successfully implemented WFH for our 10,000 strong workforce. You'll also learn how you can simplify identity and access management for teleworkers to ensure business continuity. Read on.


TLS and the Zero Trust Paradigm

Modern cyberattacks are not limited to just network intrusion from the outside. Learn more.


OnDemand Webcast - IT Decision Maker’s Guide To Office 365 Backup

Whether they have completely migrated to Office 365, or have a hybrid exchange and Office 365 deployment, a business’s objectives remain the same. Organizations must remain in control of their data, and with Veeam Backup for Microsoft Office 365 from NewCloud Networks, businesses can take control of their data instantly.


Achieve Endpoint Compliance in 2 Easy Steps

Today’s IT professionals face enormous challenges in securing and meeting compliance regulations. Learn more.


How to Succeed in Rapidly Expanding and Evolving Infrastructure & Operations World

The increasing complexity and scale of today’s clouds make automation tools a necessity—not just “nice-to-have”s. Learn more.


Office 365 Adoption: The “Dale Carnegie” Approach

Moving to Office 365 introduces a world of collaborative workloads - such as Teams, SharePoint Online, and OneDrive for Business - but driving user adoption of these new platforms can be a huge challenge, especially for larger organizations. Learn more.


How Nutanix IT Uses Software-Defined Storage for Simplicity and Flexibility

Nutanix doesn’t just develop next-generation storage solutions for its customers; we actively use them in our internal system. Learn more.


IT Management Strategies to Optimize Productivity with Windows 10

The modern workplace puts pressure on IT management in unprecedented ways. People expect to be connected and productive anywhere, at any time, and from their preferred device. Learn how one IT Director efficiently manages 40 hardware models with one Windows 10 image. Watch now!


Prevent Credential-based Attacks

During this editorial webcast, experts from Redmond magazine will discuss methods to best prevent credential-based attacks like strong multi-factor authentication, blacklisting leaked passwords, securing self-service functions and using common password dictionaries. Learn more.


Securing a Hybrid On-Premises/Cloud Directory: Guard Against Common Mistakes

Join this detail-rich session for expert advice on common mistakes, pitfalls, misconfigurations and misunderstandings that can lead to credential or system compromise and other serious security and compliance problems. Learn more!


Should Active Directory Go in the Cloud, Stay On-Premises or Both? What to Put Where, When and Why

Join us for this in-depth session, as our experts explore the advantages and disadvantages of having different parts of your identity and authentication infrastructure in different places -- on-premises, in the cloud or in both places at once. Learn more!


What's New in Active Directory and Azure AD: New Feature Round-Up

Join us for an expert view of which GA, public preview and private preview features are the ones to watch and implement. Learn more!


Active Directory & Azure AD Summit

Join us for this free three-hour virtual event to introduce you to the state of the art and best practices surrounding the use of Microsoft's power duo of directory technologies. Learn more!


How to Migrate Data Between Office 365 Tenants

There are numerous reasons why organizations need to relocate, consolidate, or migrate data between tenants, but as many businesses have found, it’s not a straightforward project. Learn more.


How to Choose Your Security Awareness Training Vendor

In this webinar Perry Carpenter, KnowB4's Chief Evangelist and Strategy Officer and former Gartner Analyst, steps you through key measures that will help you make an informed security awareness decision for your organization. Learn more.


How is Nutanix Frame Different Than Amazon, Citrix, Microsoft and VMware?

In this session Ruben Spruijt, technologist at Nutanix and former Frame CTO, will share his insights about the DaaS landscape, its partners and competitors as well as how Nutanix XI Frame compares to other Desktop-as-a-Service vendors. Read on.


Build a Solid Foundation for Password Protection

During this editorial webcast, our expert speaker will describe what you can do behind the scenes to make your password protocols as strong as possible; while preventing users from circumventing policy. Learn more.


Nutanix Frame – The NextGen Desktop-as-a-Service Solution Designed for Multi-Cloud

Join us and learn about the unique Nutanix Frame use-cases and learn how end-users use Frame in simple and complex customer environments. Find out more.


The Threats Students Face Online and How We Can Protect Them

A rise in encryption over the Internet is making it hard to comply with CIPA mandates aimed at protecting and shielding school-age children from malicious and harmful content. Learn more.


Five Password Management Best Practices that Can Help You Avert Breaches that Could Cost You Millions

In this webinar by ManageEngine IAM expert, Jay Reddy, will reveal the best password management practices for thwarting cyberattacks that could cost you millions of dollars Learn more.


Planning for a Post-AD World: Tips for Looking Beyond Active Directory

Let’s cut to the chase: Active Directory is 20 years old and even Microsoft wants you to move off of it. Learn more.


2019 Cybersecurity Year End Review & What to Expect in 2020

This informative webinar will highlight the top trends in cybersecurity and cyberattacks from 2019 and share the new tools and techniques used by today’s adversaries and how to defend against them.


The essential guide for physical and cloud data protection

Organizations have data in many different places that all must be made available and resilient. Physical systems and the cloud aren't exceptions from this requirement. Despite obvious differences, these types of environments are still much alike in terms of data protection and they demand a proper backup strategy. Luckily, Veeam has an answer to this challenge. Join this session where Andrew is going to showcase how Veeam Agents can play a major role in physical and cloud environments’ data Availability.


7 expert tips for multi-Cloud Data Management

Join Veeam®, Cisco and LinxDataCenter for a discussion on working in a multi-cloud environment and the challenges that go along this journey.


The Biggest IT challenge in 2020 is coming from the board room

Three out of four organizations have a “reality gap” between what business leaders expect from IT and what IT is geared to deliver. This session will examine the industry trends that are causing the gap, how those expectations are driving 2020 challenges and strategy, and give some ideas on how to close the gap from both a technical and an operational perspective. Watch now.


Intro - Veeam Predictions 2020

VeeamON Virtual provides the latest insights and predictions for Cloud Data Management. Veeam will highlight predictions that will remain top of mind for 2020, including ones that will affect the backup and Availability markets. Understanding these predictions and preparing for them ahead of time will allow organizations to enhance and optimize their Cloud Data Management practice. Watch now.


Flash-enabled Availability: Evolving beyond the backup

Introducing Flash-to-Flash-to-Cloud (F2F2C), a solution designed for the scale and use cases of modern data backup and protection. Together, with Pure Storage and Veeam® Backup & Replication™, this architecture provides significant improvements in recovery times.


Modernize your Data Center with Veeam Availability for Nutanix AHV

Veeam Availability for Nutanix AHV is an easy to use prism-like interface that gives you a possibility to look at snapshot jobs, do restores and recoveries, see job errors and more. Watch this video, which will walk you through the menu and interface, and get acquainted with all the functions and features of it.


AHV VeeamLive - The New Availability Standard for Nutanix AHV

In this episode Shawn Lieu, Jason Leiva, Ronn Martin and a special guest from Nutanix have discussed the NEW Veeam Availability for Nutanix AHV software solution that provides Nutanix AHV integration with Veeam Backup & Replication. This customer requested solution combines agentless AHV backups with Prism like management interface to deliver the world-class ease-of-use, reliability and Availability, that Veeam customers currently enjoy for VMware and Hyper-V environments.


Mission Availability: Restore to Azure and Azure stack in 2 steps

As more businesses look to move workloads to the cloud, they can encounter challenges and constraints with their current data management solutions. In fact, 47% of IT leaders are concerned that their cloud workloads are not as portable as intended. It is your mission as an IT guru to obtain workload portability in the cloud.


Mission Availability: Native data retention on Azure Blob

One thing is certain about data today — it’s growing exponentially. With this rapid increase of data created by organizations, it’s no surprise that challenges such as storage capacity and cost are starting to take hold. In addition, compliance requirements are requiring businesses to hold onto data for longer and longer. It is your mission to manage data growth, while also addressing compliance requirements.


Live Demo: Magecart Attack

Watch a Magecart Attack in Action And Get Practical Tips on How to Protect Your Website.


Finally, Order Management - Simplified. Find out the challenges retailers face and a solution that makes it simple!

Order Management is all about “just in time” DELIVERY! Retailers are in a constant “battle” for current and new customers. Watch this webinar recording and learn about the challenges retailers face, a different approach to resolving those challenges and a solution that just plain “makes sense”, and can fit into any retail organization mix.


What Most Computer Security Defenses are Doing Wrong, and How to Fix It

Most companies have huge gaps in their computer security defenses and can be compromised at will by a determined hacker. The industry even has a term for it: “Assume Breach”. Learn more.


5 Backup and Disaster Recovery Resolutions to Keep This Year

With the beginning of a new year, it's time for a fresh start on many things, including getting your data protection strategy in order. Learn more.


Build the Case for Automated Onboarding and Offboarding

Watch Okta’s Business Value Expert Bora Repishti explore two common scenarios using company size, industry, hiring trends and market position to learn the value gained from automated lifecycle management. Leveraging key statistics from our customers, Bora demonstrates how your IT and HR teams, end-users, and business overall can benefit financially, increase productivity, and decrease security risks.


Okta Lifecycle Management – Automating Onboarding + Offboarding

Many IT professionals, like yourself, are struggling with time-intensive onboarding and offboarding processes. According to a recent survey of IT leaders these manual efforts sap budgets and productivity, and increase your security gaps. Okta can help you reduce the burden on IT and provide more security. In this webinar, we’ll talk about the benefits of automating onboarding and offboarding and how Okta Lifecycle Management can help streamline many of the manual processes that you likely have in place today.


Unlock the Secrets of User Logon Auditing to Prevent Attacks

In this webinar, IT security expert Jay will discuss preventing attacks by auditing user logon activity, spotting patterns in logon failures that can indicate a potential breach, leveraging logon and logoff activity to detect unauthorized file accesses, and much more. Read on.


50 Backup and Recovery Tips and Tricks in 1 Hour

In just under an hour, Redmond Editor Scott Bekker and Unitrends Expert Adam Marget will provide 50 tips and tricks across several subject areas to help you ensure that your data protection approach is reliable, secure and as fast as possible. Learn more.


Unleashing the Power of SQL Server with Nutanix DBaaS

Imagine simplifying and automating the time-consuming activity of SQL Server management with automated provisioning or patching, where one-click simplicity allows you to clone/copy SQL server databases that are TBs in size in just a few minutes. Find out more.


Threat Hunting in Today’s Perilous Threat Landscape

Join Michael Scutt, BlueVoyant’s Director of Hunting Operations, as he covers how threat hunting tactics, techniques, and procedures need to evolve to help security teams and SOCs protect their sensitive data and business operations in today's perilous environment. Learn more.


Exchange, SQL, Active Directory - How to Easily Recover Your Data

Learn how to take advantage of Veeam® Explorers™ to recover critical information for Microsoft SQL Server, Active Directory, and Exchange. Get the details.


Enterprise Hyperconvergence Summit

In this three-part summit our experts cut through all the hype about hyperconvergence in the marketplace. They clearly define what it is, why its important and how it can truly benefit your enterprise. The experts also explore best practices to help you optimize and streamline your implementation. Join us!


Hyperconvergence 102: Determining ROI

Join Daniel Kusnetzky as he reviews TCO and ROI related to hyperconvergence and suggests ways to ensure that your analysis more completely reflects your organization's environment and needs. Learn more.


Hyperconvergence 103: Expert Tips for Successful Implementations and Avoiding 'Gotchas'

During this session, you’ll hear detailed descriptions of the top five tips for ensuring a smooth and streamlined hyperconvergence deployment. You’ll also learn how to avoid some of the most common mistakes or missteps. Learn more.


Fireside Chat: Get What You Deserve from Your Office 365 Partner

Redmond Editor Scott Bekker will be sitting with Champion Solutions Group/MessageOps CEO Chris Pyle to discuss what value a client should be receiving from Microsoft O365. Find out more.


Third-Party Phishing: The New Spear-Phishing Attacks That Traditional Defenses Just Don’t Stop

Join Roger Grimes of KnowBe4 in this webcast to find out how third-party phishing attacks operate, how you can spot them, and what defenses do and don't work against them. Learn more.


OnDemand Webinar: What are the essential strategies for containerization?

Cloud native and legacy software owners are adopting containerization to transform software delivery, deployment and maintenance to meet business-focused KPIs. Containerization ensures faster development and testing, allowing for more efficient application management in production at scale. Multiple container technologies, container-enabled microservices apps, CI/CD tools and dynamic multi-cloud architectures are creating disruption. Most organizations today are considering or have already taken steps to create or re-architect their existing application for the containerization and microservices paradigm.


Backup and Recovery Recap: What We Learned in 2019

The year 2019 is drawing to a close, and what a year it for backup, recovery, business continuity and disaster recovery. Attend this special year-end webcast in which Redmond Editor Scott Bekker and Unitrends expert Adam Marget will recap what happened during the year, what trends emerged and what it all suggests about the year ahead. Learn more.


Active Directory Deep-Dive: Top Issues, Tips and Gotchas from the Experts

Active Directory (AD) is the personnel file of Microsoft Windows—the library that manages password policy and access to enterprise resources like applications or devices. Learn more.


How to Overcome the Challenges of Disaster Recovery Testing

Join this webinar where Veeam explores the benefits that orchestration and automation bring to not only executing a disaster recovery plan, but also ensuring that the plan is maintained, updated and validated to work in a time of need. Learn more.


CSP: The Hidden Benefits, Savings, and Support from Microsoft

Join experts to learn about the hidden benefits, savings, and support from Microsoft and its partners through CSP, as well as how the CSP model differs from the Enterprise Agreement/Software Assurance model. Learn more.


Password Management Best Practices for Improved Efficiency, Security, and Control

As an MSP business owner or small business owner, you know how important it is to maintain strict controls around password management—all while staying efficient. Join the panel discussion with Passportal’s founder, Colin Knox, where he explains today’s password best practices. Learn more.


Simplifying Your Journey to Microsoft Azure with Nutanix

Enterprise organizations are increasingly trying to simplify their journey to public cloud.  Join us as we follow the journey of an enterprise organization as they move towards Microsoft Azure, using Nutanix Enterprise Cloud to bridge their on-premises infrastructure to the public cloud.   Learn more.


Why All-in-One is a Smart Approach to Backup (Hint: It's Not Just the Single Pane of Glass)

Join IT veteran Howard M. Cohen and experts from Unitrends as they explore the "all-in-one" approach that assures restorable backups of all data, virtual machines, cloud contents, user devices, servers .and the most effective solutions in the industry. Learn more.


Top 5 Best Practices for Securing Self-Service

During this editorial webcast, experts from Redmond magazine will present several modern tactics to help your organization ensure that any self-service capabilities it extends have the highest degree of security. Read on.


Build Group Simplifies Backup, Reduces Cost, and Restores Data in 30 Minutes

Build Group’s IT team set out to implement a modern, cloud-based backup and restore solution. The company now leverages Druva Phoenix, powered by Amazon Web Services (AWS) infrastructure, to back up its virtual machines to Amazon S3, simplifying its backup environment, reducing costs, and driving efficiencies with recovery and restore. By deduplicating its data by more than 40x and backing up only changes in the data, backups can now run faster, and during off-hours. Learn more.


Top 10 Event Categories to Monitor in the Windows Server Event Log

The Windows event log contains a lot of information about what’s happening on your network. However, that information is only useful if you can remove the noise and focus on what is truly important. In this webinar, Windows Server expert Russell Smith will detail the event types you should collect to secure your servers and network from attacks, and how to view and process the event log data so that you can respond effectively.


Fake News and Deepfakes: Harmless Fun or the Future of Fraud?

Join KnowBe4 Security Awareness Advocate Erich Kron as he discusses the frightening advancement in digital deception techniques and the growing popularity of recent threats known as DeepFakes. Learn more.


Is AD Safe in the Cloud: You Don’t Know What You Don’t Know

In this educational webcast, join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Sr. Product Manager Keri Farrell from Quest Software, as they discuss the real risk of your hybrid AD data, who' s responsibility and how you can protect your hybrid AD for the future. Find out more.


Best Practices in Office 365 Data Protection

Join us for this webinar and learn about the gaps left by Microsoft’s Office 365 protection, the risks posed and how to overcome them. You'll also find out how to get the Office 365 backup and recovery strategy you need and want. Get the details.


Data Governance for the Cloud Era

Data volume is on the rise. At the same time, 60% of all workloads will be hosted or born in the cloud by 2022. But data risks are increasing – and enterprises cannot ignore the potential for critical data loss or new regulatory requirements. A strong eDiscovery is necessary to maintain a competitive edge on the global stage. Watch this webinar today.


Block Ransomware in 2020! Top Tips for IT Pros and Managers

Join the editors of Redmond magazine for this educational webcast exploring how to get your ransomware defense operations in shape for 2020. Find out more.


The Cost of Ransomware — How to Win the Battle of Security Economics

Join Milan Patel, former CTO and Senior Special Agent of the FBI's Cyber Division, for a discussion on winning ransomware approaches for your organization. Learn more.


Best Practices for Architecting End-User Computing (EUC) Solutions

Join Nutanix's EUC design expert, Brian Suhr, to learn how to overcome challenges like poor user experience, unpredictable availability and security, long cycles from pilot to production, and unexpected costs and complexities. Read on..


IT Security is National Security

Join CISSP and Strategic Solutions Consultant, Bryan Patton and Senior Product Marketing Manager, Jennifer LuPiba from Quest, as they discuss the nature of this new cold war and explore the tools you can use to protect your critical assets and national security. Learn more.


Make Sure You've Got a Belt AND Suspenders for Backup

Backup specialists have long engaged the "belt & suspenders" metaphor to describe solutions that provide multiple layers of protection. Learn more.


DevOps Automation: Cutting Multicloud Costs in Half

In this webinar, we will take an in-depth look into the automation policies and DevOps best practices that cloud admins need to implement, especially from the perspective of controlling runaway cloud spend, across both public and private clouds. Learn more.


7 Expert Tips for Multi-Cloud Data Management

Today’s users expect data to be available to them 24.7.365, but not everyone knows exactly how to ensure this in a multi-site and multi-cloud environments. Learn more.


Mission Availability: Restore to Azure and Azure stack in 2 Steps

As more businesses look to move workloads to the cloud, they can encounter challenges and constraints with their current data management solutions. In fact, 47% of IT leaders are concerned that their cloud workloads are not as portable as intended. It is your mission as an IT guru to obtain workload portability in the cloud. Watch now.


Tips, Tricks and Best practices for physical server and endpoint backup

Join this session with Rick Vanover to know more about how to what capabilities exist today for physical server and endpoint backup and off-site data backup and restore options. Watch this today!


Protect your workforce productivity: What's your Office 365 backup strategy?

In this webinar, industry experts discuss strategies for a modern Office 365 data protection solution that enables continuous user productivity and collaboration. You will learn about Microsoft’s shared responsibility model and best practices for protecting against common Office 365 data loss risks. Watch now!


Solving the Database Dilemma

Learn how Nutanix provides the industry’s best HCI platform for running database workloads with exceptional performance, security, reliability, resiliency and an integrated automation framework that brings one-click operational simplicity to database provisioning, copy data, and lifecycle management. Find out more.


Osterman Research: Why you need third party backup for Office 365

Microsoft Office 365 is the top productivity tool for today’s modern workforce. But did you know that Office 365 native capabilities may not be enough to protect your organization from accidental and malicious data loss -- as well as meet strict data compliance and regulatory requirements? Learn more.


Why Recoveries Fail Today

In this session, technology industry veteran Howard M. Cohen joins with experts from Unitrends to discuss restoration challenges beyond just the data, highlighting strategies including automated DR testing, DRaaS, orchestration and resilience against ransomware. Learn more.


How to Prevent 81% of Phishing Attacks from Sailing Right into Your Inbox with DMARC

In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way! Then, learn the six reasons why phishing still might get through to your inbox and what you can do to maximize your defenses Learn more.


Don't Fear Ransomware - How to Protect Your Endpoints and Enforce Least-Privilege Access

Do you know of any companies whose data was held hostage by a ransomware attack? You don't want to gamble with your data, and endpoint security is crucial because malware infections occur there so frequently. Learn more.


Beginner’s Guide to Azure Reservations

Do you see your Azure cloud costs growing out of control as your usage goes up? In this webinar, we will cover everything you need to know about Azure Reservations and share best practices to help you master reservation management.


Online Briefing: Cisco Integrated Security Architecture - Design, Benefits & Buying Models

82% of companies want an integrated security portfolio. Why? Our networks no longer have edges, so our security approach must be borderless. Solutions must work in concert, and seamlessly integrate with other tools. And today, an integrated portfolio does not mean giving up best-in-class features. Cisco’s architectural approach to security integrates security across all borders to incorporate the network, cloud, Internet, email, and rapidly expanding endpoints.


Cloud Plumbing - The Pumps, Valves, and Pipes of a Successful Private Cloud

Private cloud solutions, powered by the industry’s most advanced Hyperconverged Infrastructure (HCI) technology, deliver applications, services, and data at any scale, with advanced automation and built-in self-service capabilities that bring true cloud-like simplicity to enterprise datacenters. Learn more. .


Multi-cloud? Containers? Kubernetes? How Do You Manage It All? Find Out!

As more enterprises migrate mission-critical applications to the cloud and begin to make use of containers and Kubernetes, they remain wary of lock-in to a single cloud vendor. Both fear of escalating costs and a single point of failure are causing enterprises to look at strategies that span multiple cloud environments. Find out more.


People, Process and Technology for a High-Performance Security Team

Small to medium enterprises are top targets for cybercriminals. Verizon reports that 43% of all breaches target SMBs. Why? Because most SMBs are under-protected and offer the least resistance and quickest return for threat actors. Today’s attacks are sophisticated, fast-moving and continuously evolving. Security teams need to be equally sophisticated, fast-moving and continuously evolving.  Learn more.


Mitigating Insider Threats with User Behavior Analytics

Spot insider threats and external attacks with user behavior analytics. In this webinar, IT security expert Jay explains how to perform instant threat detection and prevention by detecting suspicious activities in your network. Learn more.


Moving from Windows 7 to Windows 10: Little Time, Lots of Work

So, what’s the best approach to making the migration to Windows 10 as easy and future-proof as possible? In this interactive webcast, join in on the conversation with Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Brian Suhr. Please attend!


Modernizing Your Cloud Data Management Platform

Data availability is crucial to your business success – are you making the most out of it to drive growth? Today many organizations continue to use legacy data backup and recovery, while not utilizing an intelligent system that responds to your application and data behaviors. Learn more.


A Three Step Approach to Keeping Your Network Safe from Ransomware

One of the biggest mistakes that organizations tend to make in their fight against ransomware is that of basing their defenses around a product rather than a strategy. Learn more.


Hurricane Mid-season Update: Disaster Recovery Lessons Learned from 2019

We're a little over halfway through the 2019 Atlantic Hurricane Season, and this peak period has been true to form with the unprecedented devastation of Category 5 Hurricane Dorian. Learn more.


Five Key Data Protection Considerations for Your Move to AWS

Data protection is your responsibility, not matter where your data resides—including the cloud. Learn more.


Rethinking Storage for a Data-centric World

This webcast takes you through findings from a recent ESG research study exploring the problems caused by massive unstructured data growth, the growth in the number of data accessors and creators, and how new methods of unstructured storage management and data management are helping IT leaders realize their digital transformation goals. Watch now!


Ransomware: To Pay or Not to Pay?

It's been a summer of ransomware, with devastating incidents shutting down governments in Florida and Texas, ongoing fallout from the Baltimore attack and reports of increased targeting elsewhere. Watch now!


Office 365 Tenant Hacks: The Ultimate Guide to Post Migration Setup

Did you just unpack your shiny new Office 365 tenant? Now that your migration is complete, did you think it was time for some R&R? Learn more.


Moving Workloads to the Cloud: You Need to Have a Plan

There’s more to migrating workloads to Azure or AWS than simply “lifting and shifting”. Organizations need to plan for performance impacts, changes in operating costs, and making certain the right workloads are hosted in the right cloud. Learn more.


The Problem with Privileged Access Management

Data breaches have become commonplace, and despite significant investments in perimeter and endpoint security, breaches typically begin at the desktop and server layers of an organization’s IT infrastructure. Learn more.


Online Event: Microsoft + McAfee Integration for Enhanced Security in Azure, Office 365 & Win 10 Environments

McAfee helps customers adopt Microsoft Azure and Office 365 with the same security controls available in a private data center. McAfee understands the complexity of the cloud and has designed a security architecture and multiple integration points to enhance your overall security posture. This includes new processes and techniques to protect the entire stack and capabilities to inspect north-south as well as east-west traffic, in addition to the ability to manage across hybrid environments with one management tool and with one security policy.


Zerto and Azure - From Nut to Shell

In this webinar, Zerto Solutions Architect and Microsoft Azure SME Kyle Bromley, will discuss how to “right size” your workloads in Azure with Zerto and what hyperscale-level IT resilience really looks like. Learn more!


Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network

The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. Learn more.


Why Private Cloud and How to Build One

Join this webinar to discover the business necessities of private cloud and how it’s a stepping stone to hybrid cloud.


Office 365: Migration to Protection

Microsoft’s Office 365 is now the most widely used enterprise cloud service by user count. While Office 365 is a robust, secure platform with extensive compliance and governance capabilities, it is essential that organizations lay the groundwork for a cyber secure Office 365 adoption. Learn more.


Mind the Multi-Cloud Gaps! What IT Needs to Know NOW About What Data Isn't Protected

In this webcast, Redmond editors explore the best way to make sure your data estate is fully protected in this mixed cloud reality. Learn more!


5 Ways to Beat Gaming Booters with Zero-Trust DDoS Defenses

Join experts to learn about the challenges and best practices to ensure your users have unfettered access to online games that drive your business. Watch now!


The Security Risk in SSL/TLS Traffic: Architecting Visibility and Security Through Decryption

Nearly all commerce, communications, and data traffic going over the web is encrypted. As organizations transform operations, leverage more of the cloud, expanding locations, and utilizing remote workforces, IT’s lack of visibility into encrypted traffic puts the organization at risk for a cyberattack, data breach and compliance failures. Learn more.


Windows Server 2008 EOS Is Coming! So Is The Silver Lining

End of support for Windows 2008 servers is only 6 short months away. The good news is it’s not too late to build your plan and take action before January 14, 2020. Learn more.


Rethinking Storage for a Data-centric World

Digital transformation is top of mind for nearly all IT decision makers. Data is the lifeblood of that process. IT leaders struggle to simultaneously manage the exponential growth of unstructured data while leveraging this data drive greater business value. Legacy infrastructure impedes the access and use of data as it was not built to handle either the new volume of data or the use cases that enterprises are taking on. Learn more.


Database as a Service For Your Enterprise Cloud

Many organizations are moving to a database as a service (DBaaS) model for managing and operating their databases because DBaaS model is efficient, agile, cost-effective and scalable. What if copying a database were as easy as the copy and paste operations on your computer? Learn how to automate and simplify database management.


Migrating & Managing 2,000 Windows Devices

With a growing number of computer imaging solutions to choose from, IT teams now have the ability to hand-pick a tool that meets the exact requirements of their modern computing environment. This 30-minute technical discussion includes tips for managing a Windows 10 environment, a comparison of leading imaging solutions and considerations when evaluating a computer provisioning solution. Watch now.


A Day in the Life of a Security Operations Center: How to Prevent Incidents from Becoming Breaches

Cybersecurity threats are increasing, becoming more sophisticated, and creating more damage. 44% percent of legitimate alerts are not investigated*. Security Operations are inundated with a deluge of alerts from disparate security solutions. Learn more.


The Biggest Causes of Data Loss in 2019 and How to Counter Them

When it comes to data loss, natural disasters and ransomware grab the most headlines. Yet the exact incident that's most likely to cause you problems on a day-to-day basis tends to be much more mundane. Learn more.


Empowering Your Human Firewall: The Art and Science of Secure Behavior

You know that "security awareness" is key to a comprehensive security strategy. But just because someone is aware doesn't mean they care. So how can you design programs that work with, rather than against, human nature? View now!


The Biggest Mistake You're Making with Office 365

If you’re using Office 365, don’t ignore your data protection responsibilities — or you may be putting your critical data at risk. Making assumptions about how cloud applications protect your data can be a huge oversight, and with limited built-in data recovery capabilities, Office 365 is an app that’s commonly overlooked.


“Honeytokens” – Using Honeypots to Detect Credential Compromise

Commonly used and highly successful credential compromise techniques like Pass-the-Hash and Pass-the-Ticket are notoriously difficult to detect amidst the noise of everyday activities within Active Directory. To an observer, they appear to be legitimate authentication events and to Active Directory, they are.


Alleviate the Stress of Your Windows 7 Migration

Microsoft extended end of support for Windows 7 to January 14, 2020. This may seem far away, but migrations occur slowly for many organizations due to a lack of automated user state and data provisioning, resource requirements, and remote workforce deployment. So, how can you alleviate the stress of migrating and gain critical insights into your business data?


Alleviate the Stress of Your Windows 7 Migration

Microsoft extended end of support for Windows 7 to January 14, 2020. This may seem far away, but migrations occur slowly for many organizations due to a lack of automated user state and data provisioning, resource requirements, and remote workforce deployment. So, how can you alleviate the stress of migrating and gain critical insights into your business data?


Hybrid Office 365 Virtual Summit 2019

In this recorded virtual summit, you will hear from Stephen Gee from Zix and Michael Osterman of Osterman Research to learn about the issues and complexities involved with running hybrid and MS Office 365 environments and why organizations of all sizes may need to supplement the native features with third-party solutions, especially in the security, archiving, and encryption areas.


DRaaS: How Disaster Recovery as a Service Fits into a Complete DR Plan

The cloud expands organizations' options for robust offsite recovery. Learn more.


The US Department of Homeland Security's Office 365 Security Recommendations

The Cybersecurity and Infrastructure Security Agency (CISA) of the Department of Homeland Security (DHS) recently issued the AR19-133A report to help admins address the vulnerabilities and risks their organizations face after an Office 365 transition, so they can protect their Office 365 service from attacks. Learn more.


How a Comprehensive Password Management Tool Can Help You Prevent Password Breaches

Your organization is only as strong as its weakest link—which is often weak passwords—and hackers know this, meaning they always are on the lookout for user accounts with passwords that can be easily compromised. Learn more.


Top 5 Pitfalls to Avoid with Bare-Metal Recovery for Active Directory

Learn why bare-metal backups are usually NOT the best option for disaster recovery from cyberattacks. Learn more.


Better IT Asset Management and Data Quality for IT Teams

In today’s competitive world, using new technology to set your business apart can make the difference between getting ahead or falling behind. But staying in control of the growing complexity is tough. Learn more.


Office 365 Security & Compliance Auditing Best Practices

In this educational webcast, join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, and Rob Tovar, from Quest Software, as they discuss the best way to simplify auditing to meet security and compliance requirements. Learn more.


Destroyer of Cities: Lessons from the Latest Ransomware Attacks

A rash of ransomware attacks has hit small and local governments in recent months. From a trio of municipalities in Florida, to the ongoing problems in Baltimore to the expensive remediation in Atlanta, city governments falling victim to ransomware has become all too common. Learn more.


Top Tips to Defend Against Stolen Credentials

Stolen credentials and passwords are a lingering security loophole these days. Learn more.


The Great Office 365 Migration: Are We There Yet?

In this webinar, you'll learn why companies are migrating to Office 365 and hear about their experiences, including delays, cost overages, problem applications, and more. Watch now!


Cloud Ready Data Protection for Hybrid Data Centers

Join Microsoft MVP, VMware vExpert and IT analyst Greg Schulz of Server StorageIO along with Michael Gogos, Data Protection expert from Quest, as they discuss how to become hybrid and cloud data protection ready, and much more. Read on.


The Ransomware Hostage Rescue Guide

It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. Learn more.


Covering your Assets: Office 365 Data Protection Measures for End Users and Administrators

How can you protect your content from the very people that have access and either accidentally or intentionally delete important information? Learn more.


Automate Endpoint Security Patching

In this on-demand webcast, experts from the Spiceworks Community and Quest review how you can tackle your security challenges. Learn more.


Is Your Backup Process Built for the Way Your Users Store Their Critical Files?

Backup and recovery has its origins in a structured world. As always, the key business assets that cry out for backup are the order databases, the payroll systems, ERP and the like. Learn more.


Why YOU Need to Protect Your Microsoft Office 365 Data

Join us in this webcast for an in-depth look at how to address your most pressing needs when it comes to protecting Office 365 data and all the common pitfalls to avoid when implementing backup for this important data source. Sign up.


Tips, Tools and Techniques for Overcoming Data Protection Challenges

Register now for a dynamic panel discussion. Register Now!


Active Directory Security: Early Stage Attack Activities to Watch For

Join us at this webcast as we discuss two early stage attack activities: LDAP reconnaissance and Password Spraying – that allow attackers to map out the target infrastructure to plan out their attack and begin to take over accounts. Detection strategies and mitigation steps will also be explained. Sign up.


Stay Out of the Net: Your Ultimate Guide to Phishing Mitigation

Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, as he explores techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. Roger won't just cover one angle. He'll come at it from all angles! Read on.


Active Directory Security: Detecting Internal Attacks

In this webinar, MVP Derek Melber will guide you through how you can configure your SIEM to detect direct attacks and also improve your SIEM with technologies such as user behavior analytics. Find out more.


Ooops! Your AD is Encrypted…!

Don't let Active Directory fall victim to a cyber attack! When it comes to protecting your Active Directory, there is no room for error. In this On Demand Webcast , join Dale Meredith, cyber security expert as he explores ways to protect AD from cyber criminals. Watch now!


Leveraging Cloud-Based Object Storage as Part of a Modern Data Protection Strategy

In this discussion, Dave Russell Vice President of Enterprise Strategy of Veeam reviews the considerations for adopting cloud-based object storage and how to leverage cloud object storage for the best outcome. Learn more.


Recovering the CEO's Lost Presentation and Other Backup Nightmares

Join experts from Redmondmag.com as they share backup and recovery horror stories. You'll hear about business that thought they did everything right, only to find out about their data was not recoverable due planning mistakes, technical limitations or glitches. Learn more.


4 Best Practices for Azure Cloud Management

In this webinar, we'll offer you best practices and key trends to help you maximize the return on your Azure cloud investment and gain control of your scaling cloud infrastructure. Learn more.


How to Keep the Personal Data of Citizens Secure

Learn from the first-hand experience of the CIO of Central Arizona College. Register Now!


The Future of Business Critical Asset Data and Analytics

In today’s competitive world, using new technology to set your business apart can make the difference between getting ahead or falling behind. But staying in control of the growing complexity is tough. Learn more.


Natural Disasters: Top Tips to Help IT Keep the Business Going

It's been said that North America has some of the wildest weather on Earth. With the summer months approaching, it's the season for thunderstorms, tornados, hurricanes, wildfires and floods. Is your business data prepared to weather any approaching storms? Learn more.


Shed On-Prem Identity Complexity in a Cloud-First World

The shift to the cloud always seems to focus on enhanced productivity for an organization overall. But cloud adoption also means IT must figure out how to integrate “all-things-cloud” with on-prem Active Directory. Learn more.


What Keeps IT Pros Like You Up at Night

When attempting to protect your organization, you’re being pulled in a million directions, trying to secure every possible attack vector. Learn more.


Ransomware Update: Biggest Emerging Risks, Aftermath of Recent Events & IT Best Practices

If there's one silver lining to the emergence of ransomware in the last few years, it's this -- it's brought into sharp relief how interrelated security, backup and recovery, disaster recovery, business continuity, training and organizational policies are in a solid defense strategy. Learn more.


Why Microsoft's Latest Data Protection Enhancements Aren’t Enough

Industry analysts and leaders agree that you need to add backup and recovery tools to Office 365 for more comprehensive data management and retention. Learn more!


The Biggest Mistake You’re Making with Office 365

If you’re using Office 365, don’t ignore your data protection responsibilities — or you may be putting your critical data at risk. Industry analysts and leaders agree that you need to add backup and recovery tools to Office 365 for more comprehensive data management in protection. Watch now!


Encryption for End Users: What IT Managers Need to Know

When it comes to end-user security, hard-drive encryption is a key pillar to consider for your security strategy. Yet while it adds a layer of security and can be required for compliance, it also adds some challenges and creates risks of accidental data loss on individual PCs. Learn more.


How to Accelerate Your Veeam Backups to Azure

Using your Veeam solution for backup and replication to the Microsoft Azure cloud is a great start, but did you know it’s possible to make it better and faster? Read on.


The Extended Enterprise: Top 5 Things IT Must Know

Many organizations need to provide network access to their extended enterprise -- contractors, temp workers, partners, vendors, and others -- to effectively run their business. However, these users create unique challenges and introduce new cybersecurity risks. Join us to learn the top five questions IT must address to successfully manage the extended enterprise. Learn more.


Active Directory Migration Planning

Active Directory is the living heart of most IT organizations. No matter if your organization is on-premises, in the cloud, or in some hybrid situation somewhere in-between your on-premises Active Directory is most likely the most important part of your IT infrastructure. Read on.


10 Ways to Fail at Enterprise Data Protection in 2019

The data estate that organizations have to protect in 2019 is more complicated than ever. The old concept of a network perimeter is gone, bulldozed by cloud storage, Software as a Service applications, bring your own device practices, data on mobile phones and many employees who never really go off the clock no matter where they are. Learn more.


Veeam and AWS avengers: Guardians of recovery

Watch this video to learn about key considerations for ensuring the portability of workloads to the cloud, built-in Veeam features for successful workload recovery into AWS and more! Watch this today!


The Biggest Mistake You Are Making with Office 365

If you're using Office 365, don't ignore your data protection responsibilities—or you may be putting your critical data at risk. Making assumptions about how cloud applications protect your data can be a huge oversight, and with limited built-in data recovery capabilities, Office 365 is an app that's commonly overlooked.


No Passwords, No Problem: Using WebAuthn to Stop Account Takeover

Want to eliminate passwords? We all do. WebAuthn is a new web standard published by the World Wide Web Consortium (W3C) for users in the era of passwordless authentication for web applications. Learn more.


Live Demo: Netwrix Auditor – Data Discovery & Classification Edition

Modern IT environments are so large and dynamic that it has become extremely difficult to keep track of all the critical and sensitive data stored there. Register now to find out how Netwrix Auditor — Data Discovery and Classification Edition can help. Register today!


Avoiding GDPR Penalties – 5 Key Principles. Veeam Compliancy Experience Shared

The GDPR grace period for businesses to get themselves compliant ends on May 25, 2018, which touches over 500 million EU residents your company might be working with. Your inaccurate GDPR compliance might result in €20 million of fines or even more. Learn more.


How to Protect Identities and Secure Your Azure Environment

Azure AD allows you to layer features such as conditional access and multifactor authentication to help protect your users and data. Along with Azure Security Center, it helps monitor security across on-premises and cloud workloads. Unfortunately, incorporating Microsoft’s native tools alone is rarely enough to maintain a strong security posture of your Azure infrastructure. Learn more.


What the California Consumer Privacy Act Means for IT Pros

Data privacy and data security have been among the hottest topics of 2018, mainly due to the GDPR, which came in force on May 25. However, 2018 also saw the signing of another important law, the California Consumer Privacy Act (CCPA). Although it has gotten a lot less press than the GDPR, it is nearly as sweeping, since it applies to all organizations that store the personal information of California residents. Learn more.


Citrix Virtual Tech Summit

As your environment grows more diverse—more clouds, more devices, more types of apps—you need a more efficient and secure approach to management. At this technical online event for hands-on IT leaders, we’ll discuss the building blocks of a modern digital workspace. Register now!


The 3 Pillars of SharePoint Security

Many organizations purchase and implement software solutions based on factors like a rich feature set, a low price and an appealing user interface. Unfortunately, security issues are often pushed to the side or forgotten altogether. Consider SharePoint, Microsoft’s flagship collaboration platform. Learn more.


How to Spend Your Security Budget in a DevOps World

In this session, Threat Stack Security Engineer, Mark Moore, and CFO, Kevin Durkin, will discuss the current state of security processes and investments as organizations shift to the cloud. Learn how to build a scalable security program that fits your organization’s budget. Join us on November 8th at 1pm ET! Sign up today!


Gain Control Over Windows 10 Updates

There’s no doubt about it, Windows 10 upgrades have caused disruption across IT departments. Our team of Windows 10 specialists will share stories from the field and tips for successful management of Windows 10 in this technical discussion. We’ll highlight the latest best practices that every company should follow and explore the usability of unified endpoint management toolsets from VMware, Citrix, and Microsoft asking, “Do they really solve the need?”


IT Security Horrors that Keep You Up at Night

One reason companies continue to get breached is that they are too focused on the wrong things. You lose sleep over the “shock and awe” security headlines in the news — while your executives and directors use a password of monkey123 without 2-factor authentication for their email. The good news is you can greatly increase the security of your network without spending thousands of dollars on shiny new boxes with pretty blinking lights!


Top Nine Insider Attacks and How to Spot Them

In this live webcast, Quest experts Shawn Barker and Ghazwan Khairi will be introducing our brand new product Change Auditor Threat Detection — a powerful solution for proactively detecting anomalous behavior based on user activity. You will discover ways to minimize your insider threat risk. Learn more.


Session 1 - The Human Factor: Malicious Insiders vs. Negligent End Users

Breaches resulting from insider misdeeds are front-page news on a regular basis. Unfortunately, the average employee misses a critical common thread across many these stories. It’s up to IT pros to understand the techniques attackers use, educate their users to avoid common traps, and take the necessary steps to avoid breaches. Learn more.


Reduce Your Security and Compliance Risks with IT Asset Inventory Management

To minimize security and compliance risks, as well as reduce costs on under-utilized hardware and software, IT pros need to inventory all IT assets their organization has and track changes to them. If done manually, these tasks require hours of tedious work, so many organizations seek tools that streamline the process. Learn more.


Identity Management Key to IT Modernization

Enterprises are saddled with an IT architecture that has evolved organically over time. With the adoption of cloud and a drive to a more distributed workforce, IT is tasked with securely managing more users, on more devices, in more locations, and accessing more applications. The demands on IT are compounding quickly. And, limited staffing and budgets mean IT is constantly being asked to do more with less. Learn more.


Align HR and IT to Streamline Employee Onboarding

Growing companies onboard 30 new employees, on average, each month. This is no small challenge for the HR and IT teams. Now is the time for onboarding processes that are automatic, efficient and secure. Learn more.


Netwrix Auditor – Data Discovery & Classification Edition

Meet the brand-new Netwrix Auditor – Data Discovery and Classification Edition, which provides complete visibility into where sensitive files are, what content is inside them, who can access the files and who actually uses them. Learn more!


A Hacker Explains: How Attackers Exploit Office 365 Vulnerabilities

Office 365 has become the platform of choice for document collaboration and sharing. If you’re using Office 365 or planning to migrate there, understanding the types of security attacks you can expect is imperative. Microsoft provides tools for testing your end users by simulating some of the most common attacks, so you can educate them as part of your broader defense strategy. Learn more.


The Role of Virtualization in the Hybrid Cloud Era

Join us on this webinar to learn how both on premises infrastructure and public cloud can play a role giving enterprise IT the freedom to leverage the best attributes of both by creating a hybrid cloud environment making the deployment and transition between environments simple and seamless. Learn more.


Five Expert Tips to Overcome Compliance Challenges

Regulatory compliance is one of the biggest challenges that IT pros face today, regardless of their organization’s location, size or industry. Although GDPR, PCI DSS, HIPAA, GLBA, CJIS and other compliance regulations focus on different things, the underlying objective is the same — securing the data. Register now!


Netwrix Auditor Product Demo

See what the new Netwrix Auditor 9.6 has to offer, including how you can now classify and secure your data. Register today!


Netwrix Auditor Product Demo

See what the new Netwrix Auditor 9.6 has to offer, including how you can now classify and secure your data. Register today!


VIDEO: Optimize Your Connection to Oracle Cloud with Equinix

Learn how Oracle and Equinix help organizations to transform their business by integrating hybrid and multicloud environments to increase operational efficiency, enhance system processes, improve customer experiences and grow revenues. Learn more.


VIDEO: Optimize Your Connection to Oracle Cloud with Equinix

Learn how Oracle and Equinix help organizations to transform their business by integrating hybrid and multicloud environments to increase operational efficiency, enhance system processes, improve customer experiences and grow revenues. Learn more.


Multi-Cloud Governance at Your Finger Tips

Join us for a discussion about multi-cloud management and learn how Nutanix can enable you to drive better visibility, cost optimization and intelligent resource planning for hybrid and multi-cloud deployments. Learn more.


A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.


A Pulse Check on Your Cloud-based Software-Defined Data Center Strategy

Join the conversation to get a pulse check on your cloud-based Software-Defined Data Center strategy and answers for enabling off-site DR application and data protection abilities.


Netwrix Auditor Product Demo

In this technical webinar, we will guide you through the key functionality of Netwrix Auditor 9.5. You’ll learn how to use Netwrix Auditor more effectively to audit critical systems such as Active Directory, Windows file servers, Microsoft SQL Server and many more.


Benefits of Moving Hyper-V Disaster Recovery to the Cloud

By attending this session, you will learn how to plan a customized and right-sized DRaaS solution featuring Veeam Backup & Replication for your Hyper-V environment.


To The Cloud, From The Cloud, Within The Cloud

Learn from Mike Jones on what modern approaches exist to do what you want with your data in the cloud. Whether you are starting your cloud journey, already underway or not sure how to meet your technical and business requirements in a cloud-ready world, there is something for everyone on this webinar. Watch it now.


Hyper-V 2016: The Next Generation of Virtualization

Watch this interactive, demo-filled webinar that will provide all of the details on the largest announcements within Hyper-V 2016. Join Microsoft Cloud and Datacenter Management MVP, Clint Wyckoff, as he illustrates the pieces of Hyper-V 2016! Learn more.


How the Cloud Drives Availability and Data Protection

Data is to this century what oil was to the last century – a driver of massive growth and change. This is not just about technology, but also new ways of doing business. And yet, Availability and data protection are among the biggest challenges facing IT leaders today, particularly with the recent increases in cyberattacks, such as ransomware, which have affected companies of all sizes. Learn more.


Total Control and Protection of Email Data with Veeam Backup for Microsoft Office 365

Whether you have completely migrated to Microsoft Office 365, or have a hybrid exchange and Office 365 deployment, your business objectives remain the same. You must remain in control of your data and be able to backup and recover Microsoft Office 365 items at all times. Veeam® Backup for Microsoft Office 365 enables you to mitigate the risk of losing access to Office 365 email data and ensure Availability for users. Learn more.


Availability Outside of the Data Center

Take a deep dive into how Veeam® Agents deliver Availability for Windows-based physical servers and Linux-based server instances. We’ll discuss how to meet RPOs and reduce the risk of data loss for laptops and tablets outside the corporate network. We will also discuss how you can solve key challenges like managing remote offices, offering Backup as a Service and Disaster Recovery as a Service, and more.


Availability On-Premises, In The Cloud And On The Go with Veeam Agent for Microsoft Windows

Are you looking to find out more about avoiding downtime and data loss quickly and easily for Windows-based physical or public-cloud workloads? How can you bring more Availability to these workloads? Learn more.


Exchange ActiveSync Best Practices and Pitfalls

Join us to get prepared for avoiding the pitfalls of wide-scale EAS deployments. It includes both practical tips and tricks for managing EAS and a guide for how to best find and address common issues. Register now!


Simplifying your Journey to AWS with Nutanix

Enterprise organizations are increasingly trying to simplify their journey to public cloud. Follow the journey of an enterprise organization as they move towards AWS using Nutanix Enterprise Cloud to bridge their on-premises infrastructure to the public cloud. Learn more.


Leveraging Office 365 in Your Digital Transformation

Successfully migrating and modernizing content to SharePoint, OneDrive for Business, and Teams can establish the first milestones in the digital transformation process. Learn more.