Webcasts


Upcoming

Understanding and Protecting Kerberos – The Soft Underbelly of Cybersecurity

With the advent of Active Directory more than 20 years ago, the Kerberos protocol was a game-changer in terms of security, unification, and moving AD into the realm of identity management. Learn more.

Date: 01/25/2022

Time: 11:00am


Top Best Practices for Windows Enterprise Security Heading Into 2022

Join Ian Thornton-Trump CD for a look at all the security goodness built into the Windows Operating system to thwart malicious attacks and dive into the Windows security ecosystem and discuss his top security tips and system hardening ideas.

Date: 01/28/2022

Time: 10:00 am


Microsoft Security in 2022 Summit

The editors of Redmondmag.com have created this half-day summit to get you up to speed on exactly what's happening with Microsoft's Security Roadmap plus give you tips, advice and best practices you can use right away to secure your Windows-based ecosystem. Learn more.

Date: 01/28/2022

Time: 9:00 am


Enterprise Cloud Backup & Recovery in 2022 Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSInsider.net for this free half-day summit along with independent experts who will help get you up to speed with real-world tools and techniques you need to know about Cloud Backup and Recovery in 2022. Learn more.

Date: 02/02/2022

Time: 9:00 am


Evolving Digital Operations: People, Process & Technology Summit

Harness the power of automation and critical event management to improve the resiliency and reliability of your business. Join us, as we celebrate the launch of Everbridge’s Digital Operations Platform on February 9th. Learn more.

Date: 02/09/2022

Time: 8:00am


Modern Ransomware Defense & Remediation Summit

Find out the best way to get your defense plan in place with this free half-day summit brought to you by the editors of Virtualization & Cloud Review, AWSInsider.net and Redmondmag.com. Learn more.

Date: 02/11/2022

Time: 9:00 am


Back to Basics – A Practical Guide to Following the NIST Framework for Ransomware Risk Management

In this webinar we will discuss the NIST Cybersecurity Framework for Ransomware Risk Management with a focus on what the guidance includes, how this guidance compares to other options, how to detect where your program falls short, and actionable advice on where to start and which actions will yield the most benefit.

Date: 02/15/2022

Time: 11:00 am


What's Ahead for Your Remote Workforce in 2022 Summit

Join the editors of Redmondmag.com and Virtualization & Cloud Review have pulled together this free half-day summit promoting what you need to know heading into the new year -- top trends and best practices that will keep your new remote workforce infrastructure not only secure and compliant but functional and cost-efficient into 2022 and beyond. Learn more.

Date: 02/16/2022

Time: 9:00 am


Remote Workforce for Enterprises for 2022: A Look Ahead

In this session, we’ll take a look ahead at where many of the technologies we already use are heading, and what new tools may soon become available to help companies better roll with the momentum the Covid-caused work-from-home new normal has created. Learn more.

Date: 02/16/2022

Time: 9:00 am


The Silent Scream of Every Network: The Horror that is Active Directory Security

Join us and let Derek Melber, 17X Microsoft MVP show you how to operate on the beast, making it capable of withstanding the constant attacks. Learn more.

Date: 02/17/2022

Time: 11:00 am


Hybrid Clouds/Multi-Clouds in 2022 and Beyond Summit

It's a hybrid-cloud/multi-cloud world. Find out the best tips, tools and best practices to support your new infrastructure.

Date: 02/23/2022

Time: 9:00 am


Microsoft Office 365 Security Summit

Join the editors of Redmondmag along with Microsoft 365 experts for this informative and free half-day summit on Microsoft 365 Security: Top Installation, Configuration and Management Mistakes and "Gotchas" and the top 10 Microsoft 365 Security Best Practices Every Organization Must Implement. Learn more.

Date: 02/25/2022

Time: 9:00 am


Ransomware: Top Threats and Best Practices Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSinsider.net for this half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practice advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Learn more.

Date: 03/02/2022

Time: 9:00 am


Getting Started with Cloud Security Summit

What are the current best practices for the modern IT enterprise? Find out in this half-day summit from the editors of Virtualization & Cloud Review.

Date: 03/04/2022

Time: 9:00 am


Multi-Cloud Trends to Watch in 2022 Summit

Join us for this half-day summit that will walk you through the security threats you can expect to face in the new year plus the real-world best practice advice you can implement right way. Learn more.

Date: 03/11/2022

Time: 9:00am


Digital Transformation in 2022 Summit

Don't miss this half-day summit brought to you by the editors of Virtualization & Cloud Review, Redmondmag.com, PureAI.com, AWSInsider.net, MCPmag.com and ADTmag.com where you'll learn about how digital transformation has transformed for 2022 and how you can take steps now to take advantage of it in the coming year and beyond. Don't miss out!

Date: 03/18/2022

Time: 9:00 am


Microsoft 365 & Teams Heading into 2022 Summit

You won't want to miss this free, half-day summit brought to you by the editors of Redmondmag.com to catch you up on what you need to know about Microsoft 365 & Teams heading into the New Year. Learn more.

Date: 03/23/2022

Time: 9:00 am


Cloud Data Protection & Disaster Recovery Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSinsider.net have created this free, half-day virtual event pulling together independent experts who will walk you through real-life techniques, best practices and more for helping you keep your cloud data protected and truly recoverable in 2022 and beyond. Learn more.

Date: 03/25/2022

Time: 9:00 am


Securing Azure AD & Active Directory Summit

Join the editorial staff of Redmondmag.com and independent experts who will make sure IT managers have what they need to know to protect their enterprise. Learn more.

Date: 03/30/2022

Time: 9:00 am


Zero Trust Summit

Join the editors of Virtualization & Cloud Review and Redmond magazines for this free half-day virtual summit bringing together independent experts detailing what you need to know now about zero trust.

Date: 04/08/2022

Time: 9:00 am


Azure Directory & Azure AD: What’s New & What’s Hot Summit

Join us for this free half-day summit where the editors of Redmondmag.com will bring together Azure AD and AD experts to walk you through the newest features plus share their tips, advice and best practices so you can walk away with a real catch-up of exactly what Azure AD/AD can do for your organization right now.

Date: 08/17/2022

Time: 9:00 am


On Demand

2022 State of IT & Digital Transformation Leadership Summit

Don't miss this expert-packed, two-hour summit created for CTOs, CIOs, IT directors, and IT professionals looking for technology trends that will impact them and their market in the new year. Learn more.


Identity & Access Management Summit

In this virtual summit, we look at top issues surrounding IAM, supplementing Active Directory and Azure AD, including SaaS authentication, changing compliance requirements and emerging approaches such as CARTA, continuous and adaptive risk and trust assessment. Learn more.


Identity & Access Pain Points: Top Issues from AD Integration to SaaS Control to Compliance

During this 60-minute session, Nathan O’Bryan (Microsoft Certified Solutions Master: Messaging/5x Microsoft Most Valuable Professional) will share his top identity management considerations and explain how these choices can have a lasting impact on your Microsoft 365 deployment. Learn more.


Identity & Access Management Best Practices: What IT Pros Need to Know Now

Join us to learn the best practices for establishing an IAM architecture that will work with your existing infrastructure and across clouds. Learn more.


Mastering Hyperconvergence Summit

Don't miss this free half-day summit brought to you by the editorial staff of Virtualization & Cloud Review and Redmondmag.com who will bring together independent HCI experts for to walk you through tips, advice, best practices and more that will help you master hyperconvergence. Learn more.


Top Hyperconvergence Infrastructure Tips

In this session, you will hear from two industry experts regarding best practices on managing and maintaining HyperConverged Infrastructure. Learn more.


Real-World HCI Best Practices

In this session, you will learn essential information about keeping your HCI infrastructure running and looking at future-proofing your designs. Tune into this session for expert industry advice for two of the worlds leading experts in HyperConverged Infrastructure.


DevSecOps: Securely Navigating a Shifting Threat Landscape

In this live Tech Talk, veteran technology journalist John K. Waters talks with DevSecOps expert Stephen Walters, solution architect at xMatters, a subsidiary of critical event management company Everbridge, about DevSecOps best practices. Learn more.


Office 365 Coexistence for Mergers and Acquisitions: Don’t Panic! Make it Simple

The early days – or even early hours – of an M&A announcement can cause anxiety and stress for Office 365 administrators. Common activities need to be repeated in the early stages, but these steps often come with unnecessary complexity. In this session, Microsoft MVPs Steve Goodman and Mike Weaver, will cover the four most common steps toward Office 365 coexistence and explain the simplest route to project success.


Incredible Email Hacks You'd Never Expect

In this webinar Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, explores many ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Learn more.


Part II: Optimizing and Securing Communications in the Hybrid Workplace

This is the secont of a two-part podcast featuring experts from unified communications platform provider RingCentral.


Ransomware advice webinar: Hear from experts

To beat ransomware, preparation is key. In this session, Rick Vanover from Veeam® and Krista Macomber, senior analyst at Evaluator Group, will share advice on ransomware protection, so that you will be better equipped to handle a ransomware attack on your organization.


The War on Ransomware Continues: Best Practices with V11

The ransomware threat continues to put data and business reputations at risk. In this webinar, join Rick Vanover from Veeam® to share the latest tips for beating ransomware by assessing the threatscape, evaluating steps you can take to protect your data and learning what's new in Veeam Backup & Replication™ v11 to keep your data protected.


VIDEO: Best Practices on Microsoft 365 Backup

Watch this technical product demo to get an in-depth technical look into the best practices for operating Veeam® Backup for Microsoft Office 365.


DEMO: Microsoft Teams Backup

Although Teams data has its own basic retention, Microsoft doesn’t fully protect against accidental deletion or security threats that lead to data loss, nor does it enable long-term retention for compliance or regulatory purposes. Whether it’s Teams or your entire Office 365 environment, it's your data — you control it — and it is your responsibility to protect it.


Technical Deep-Dive into #1 Office 365 Backup

Join us for this technically‑focused presentation, and learn about the infrastructure components, and how simple it is to use Veeam® Backup for Microsoft Office 365 — from the early planning stage all the way to performing restores.


Cloud Protection Trends: Expert Insights

Join Veeam’s vice president of product strategy, Jason Buffington and vice president of enterprise strategy, Dave Russell as they share key research insights from the NEW 2021 Cloud Protection Trends Report to help organizations of all sizes learn what to consider when adopting cloud based production platforms and how to protect them.


How to Create a SIEM Framework That Aligns With NIST Guidelines

Join our webinar where our SIEM expert talks about how you can align your SIEM framework with NIST guidelines. Learn more.


Best Practices for Cloud Storage, Backup & Recovery Summit

Don't miss this half-day summit where you will learn best practices and insights you need to make sure, should the worst happen (and it very well could), you can come back up with the click of a button. Learn more.


Best Practices for Managing, Securing and Recovering AWS

Join our expert solution architect to discuss a comprehensive approach to management and security of AWS. Learn more.


AWS Architecture & Configuration Best Practices

In this session, we'll go through a few cloud architectures and explain why these design choices were made, and discuss a few best practices around application scalability, security and resilience. Learn more.


Expert AWS Best Practices Summit

Hear from experts who live and breathe AWS security, performance and recoverability and the editors of AWSinsider.net and Virtualization & Cloud Review in this half-day summit packed with tips and real-world advice.


Why Office 365 Backup is Essential

With Office 365, It's your data — you control it — and it is your responsibility to protect it. Join the experts to find out why Office 365 backup is so essential! Learn more.


Microsoft + Theta Lake - Enabling the Next Generation of Modern Work

After a fast-moving year of adopting & implementing collaboration platforms to enable workforces to stay productive & in touch with each other, the next step is to ensure platforms meet the evolving demands of business.


Leveraging AI for Faster, Easier, and Accurate Regulatory Compliance in the Digital Age

The increased adoption of modern collaboration tools & platforms resulting from the shift to hybrid work during the pandemic has introduced a gap in oversight of these platforms & risks they potentially introduce to businesses.


Microsoft 365: A Look Ahead to 2022 Summit

In this summit, join the editors of Redmondmag.com plus independent experts to learn everything you need to know about changes coming to Microsoft 365 in 2022! Learn more.


What's New in Microsoft 365: Top Features You Might Have Missed

Keeping up with all the changes and new features in Microsoft 365 is a constant challenge. Join Nathan O’Bryan in this session as he covers some of the new features and functionality that have been announced for Microsoft 365. Learn more.


What's Ahead & Best Practices for Microsoft 365 in 2022

In this session we'll help you with the cliff notes brief understanding of "what's coming and what's new for this next calendar year" and catch you up on Microsoft 365 Best Practices. Learn more.


Hacking Your Organization: 7 Steps Cybercriminals Use to Take Total Control of Your Network

In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the "Cyber Kill Chain" in detail to show you how a single email slip up can lead to the total takeover of your network. Learn more.


Veeam Platform Updates: Protect Cloud, Virtual, Physical environments

Watch this webinar for a full run down of the latest on the Veeam Platform products with a demo of some of the newest capabilities, including native and advanced protection for AWS, Azure and Google Cloud Platform, and more! Learn more.


Your Hybrid/Multi-Cloud Infrastructure & Data: Wise Decisions for 2022 and Beyond

Whether its decisions about how to manage backups, or how to design high availability solutions in a hybrid cloud scenario, join us to learn about how to ensure you have availability, security and data integrity. Learn more.


Hybrid & Multi-Cloud Data & Database Best Practices

Whether you are on platform as a service, or infrastructure as a service, or in a hybrid model, you will face new and different challenges when moving to the cloud. Join this session to learn about how to optimize your databases in modern infrastructure. Learn more.


Hybrid Cloud & Cloud Database Preparation for 2022 and Beyond

Attend this free, half-day virtual summit brought to you by the editors of Virtualization & Cloud Review, Redmondmag.com & AWSInsider.net to learn what you need to know now about performance, best practices and more for managing your hybrid cloud infrastructure and data thanks to insights, advice and insights brought to you by leading independent hybrid cloud experts. Learn more.


Simplifying Azure data protection and migration with Veeam

Simplify data management between on-premises and public cloud environments and lower storage expenses with Azure-native backup and recovery, built for simplicity, scale, savings and security.


Cloud Security & Recovery Summit

What are the top threats after your cloud today and heading into 2022? How can you make sure your cloud infrastructure and data remain as safe as possible, and easily recoverable if the worst happens? Join the editors of Redmondmag.com and Virtualization & Cloud Review for this free half-day summit. Learn more.


Top 10 Cloud Infrastructure & Data Best Practices

In this session Top 10 Cloud and Infrastructure and Data best practices you will gain valuable insight into protecting your cloud from our expert speakers. Learn more.


The Cloud Security Threat Landscape Heading Into 2022

Join Ian Thornton-Trump CD for a look backward, a look forward and a stark warning about the biggest threats and the biggest opportunities for organization’s digital transformation efforts. Learn more.


Part I: Optimizing and Securing Communications in the Hybrid Workplace

This is the first of a two-part podcast featuring experts from unified communications platform provider RingCentral.


Modern Tips for Microsoft 365 Tenant Migrations

In this webcast, we will explore the top 5 tips for Tenant-To-Tenant migrations, including methods to prepare, migrate, coexist, and manage in this changing world. Learn more.


How to Painlessly Deliver and Scale Company Email Signatures

How do you address your organization’s growing (and evolving) email signature needs n without making it a full-time job? Learn more.


Masterclass: Simplifying Identity and Access Management with AD360

In this webinar we'll discuss in-depth a platform that can take care of all your IAM needs. Join to learn how to efficiently evaluate an IAM platform, see how ManageEngine AD360 can help you tackle IAM challenges across AD, Exchange, and Microsoft 365 environments and more! Learn more.


What About the Email Archive? Modern Strategies for Migration

Join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Jason Jacobo from Quadrotech/Quest, for this educational webcast as they discuss why you can't just start migrating your archive, what archive data should and shouldn't be migrated and what your options are when it comes to migration strategies. Learn more.


Maximizing Microsoft 365 Summit

Join the editors of Redmondmag.com plus independent experts in this half-day summit that will walk you through what you need to know about configuration, optimization, security, backup tips and tricks plus more. Learn more.


Top Tips for Managing and Optimizing Microsoft 365

Join us to learn the top tips for managing your Teams environment and getting the most out of your deployment beyond just keeping Teams running for your users. Learn more.


The Top 10 Actions Every Organization Should Take to Protect their AD from Attacks

Join us to learn the 10 actions you can take that will greatly increase your chances of fighting off attackers and building your resilience. Learn more.


Migrating to Windows 11: It’s All About the Preparation

What does it take to simplify the process of migration to achieve a secure and productive Windows 11 environment when you’re done? Learn more.


Top Security & Ransomware Threats Summit

From the latest threats to the best recovery methods should the worst happen, this half-day summit will make sure you’re armed and ready if (when) your enterprise falls under attack. Learn more.


The Top 10 Ransomware Attacks Enterprises Need To Worry About

Join us as we take a page from the Facts of Life and look at the impact law enforcement is having on ransomware attacks and the groups that are still a threat.


Top Steps Every Enterprise Must Take NOW to Protect Themselves from Ransomware

Join two of the industry’s top experts on Cyber Security and Ransomware as they discuss how to take a proactive approach against Ransomware today. Learn more.


Network Solutions from Red Hat and Red Hats ecosystem partners

Build a reliable, security-focused network infrastructure with Red Hat and our certified partners: Organizations are increasingly developing distributed, data-intensive, and more latency-sensitive cloud-native applications. To provide predictable performance and a consistent user experience, you need a reliable, scalable, and security-focused networking infrastructure. Learn how Red Hat works closely with our networking ecosystem partners to test, certify, integrate, and optimize the technologies you need to build security-focused, reliable networks.


Learn What’s In Store for Retail SD-WAN

Join us as we discuss the retail WAN landscape and how to use Juniper Session Smart™ SD-WAN to your business advantage. Juniper's Tom Wilburn, VP of Sales, and Tim Lieto, Director of Sales, will cover how Juniper's AI-driven SD-WAN solution can help retail organizations improve customer and employee connected experiences today and in the future.


Why Disaster Recovery Will Matter Even More in 2022

Join us as we discuss the dynamics of a new-age disaster recovery program that addresses a mobile workforce, the threat of ransomware, the sudden absence of key people, and how to define viable alternatives in the New Year. Learn more.


Enterprise Disaster Recovery Summit for 2022 and Beyond

Join the editors of Redmondmag.com and Virtualization & Cloud Review, plus their hand-picked independent experts, as they walk you through the real-world advice that your organization is going to need to make sure you're truly protected in the year ahead with a disaster recovery and backup plan that is truly recoverable and that is also manageable and secure. Learn more.


Make the Most of Location Tracking Technologies

Get the details on indoor location tracking technologies and their use cases from the IT masters at Walmart Global Tech, Sewio, and Juniper Mist, in our on-demand webinar. You don’t want to miss this second part of a three-part series on leveraging AIOps to deliver better user experiences and simplify network operations.


What's New in Microsoft Teams for Security, Performance & Management

Join us to learn the latest updates to Microsoft Teams that you need to know about in order to get the most from your Teams deployment. Learn more.


Microsoft Teams: Security, Performance & More Summit

Join Redmondmag.com and independent Microsoft Teams experts for this completely free half-day summit to bring you real-world guidance you can use today to make your Microsoft Teams installation more secure, better performing and much easier to manage. Learn more.


Top 10 Microsoft Teams Best Practices Every Organization Needs To Implement

Join us to learn the top Microsoft Teams deployment considerations and an explanation on how these choices can have a lasting impact on your Teams deployment. Learn more.


Exchange Server Exploits: Experts Discuss Why Cloud Email Can be More Secure and How to Make the Transition

A crisis eliminates all the reasons why we couldn’t do something before. The pandemic taught us that many people can be productive and work from home for extended periods. The HAFNIUM Exchange Server attack taught us that unpatched and unmaintained Exchange on-premises servers are vulnerable to attack and that it might be a better idea to leave that work to Microsoft by moving email to Exchange Online. Attackers are attempting to exploit the four critical security flaws in Exchange Servers 2010, 2013, 2016, and 2019 to gain a foothold in your environment. This is the wake-up call for many organizations to move email from on-premises Exchange to Exchange Online (EXO). Over 5.5 billion mailboxes are supported in EXO – will yours be too?


Simplifying Microsoft 365 Tenant Migrations

The pandemic has created opportunity for plenty of M&A/Divestiture activity. This effectively results in lots of new tenant migration/consolidation projects to ensure users can be productive in their new organization. But M&A activity-based migrations often come with tight deadlines that IT must hit. And to make matters worse, the native tools available for tenant migration are extremely limited, making it difficult for IT teams, and impacting M&A plans and timelines. So, how can you simplify tenant migrations to align IT outcomes with business requirements?


Active Directory Migration: Go Native or Not

You can’t always predict when you’re about to face a sizable migration. Maybe a merger, acquisition, or divestiture came your way and you got the exciting news that you have a migration in your near future! When you have an Active Directory consolidation looming, how do you know whether Microsoft native tools can do the job, or whether you should consider a tool that’s more tailored for the job? This on demand webcast will help you identify some of the pros and cons you should take into consideration as you make the decision to go native or not.


Why office 365 Backup is Essential for the Modern Business

There is a common misconception that Microsoft fully backs up your data on your behalf, but the reality is that this is YOUR responsibility. Join NewCloud, an Otava Company and Veeam as we discuss Backup for Microsoft Office 365 and how it can help your business.


Simplify Critical GPO Management and Governance Tasks

Group Policy Objects (GPOs) are critical for successful Microsoft Active Directory environments. One wrong GPO can inflict massive damage to the security of your network within minutes, and you have up to thousands of GPOs deployed across your environment. There’s huge potential for insider threat without the proper compensating security controls. Join this on-demand webcast, where Quest experts Matthew Vinton, Bryan Patton and Chris Ashley discuss how to simplify/automate complex GPO management and governance tasks with GPOAdmin.


Improving Healthcare with IT Innovation

The network is the lifeblood of modern healthcare delivery. Providing high-quality patient, staff, and guest experiences requires a reliable and secure wired and wireless network. Watch this 15-minute variety show-style webinar for tips on how to harness IT to deliver best-in-class experiences, including lessons learned from a real-world Juniper customer case study.


Cloud Data Protection for 2022 Summit

Don't miss this important look ahead at cloud data protection strategies that you need to know brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com. Learn more.


Modern Cloud Data Protection Best Practices

Join us for a look at what practices you and your organization should be implementing in your cloud and hybrid data solutions including Confidential Computing & Zero Trust, Data Security Features, Anti-tamper Features, and more! Learn more.


Top Threats to Your Cloud Data Landscape in 2022

Join Ian Thornton-Trump CD, CISO for Cyjax Ltd as he outlines how we arrived into a post-pandemic digitally transformed landscape and the top threats to SaaS and hosting services. Learn more.


Why PSTs are Such a Bad Idea in the Cloud

PSTs, or Personal Storage Tables, arrived in the days of 25 MB mailboxes and 3 KB messages. They still linger on today, but when most Exchange mailboxes are in the cloud, isn’t it time to drop this antiquated technology? Join Tony Redmond (Microsoft MVP for Office Apps and Services) and Mike Weaver (Technical Product Manager at Quest Software), for a discussion about why PSTs are an obsolete and potentially dangerous storage location for email.


Top 10 Things You Should Never Do with a Multi-Cloud Architecture

Join our experts to gain deep insight on the top 10 things you should never do with a Multi-Cloud Architecture. Learn more.


Hybrid Cloud/Multicloud Security Summit

Don’t miss this half-day summit brought to you by the editors of Redmondmag.com, Virtualization & Cloud review and AWSinsider.net will bring together independent cloud security experts that will give you real-world information you can use to make sure your cloud data is truly secure. Learn more.


The New Generation of Hybrid Cloud Security Best Practices

Join us to learn the best emerging practices for ensuring the optimal security posture for both the public and private cloud as part of an enterprise hybrid cloud platform. Learn more.


Understanding the New Remote Workforce

Join us to learn how the key to the remote workforce of tomorrow is to produce productivity and performance through people, platforms, applications, programs, processes, and policies. Learn more.


Remote Workforce Summit

Join the editors of Redmondmag.com and Virtualization & Cloud Review along with independent experts who will share their insights on what you need to do NOW to make sure your remote workforce and digital workplace is protected for the future. Learn more.


Top 10 New Best Practices for a Secure Remote Workforce

Because remote work was put into place so quickly, the solutions that were rapidly adopted probably aren’t as secure as they might be if the organization had been able to take its time. Join us in taking a step back to consider how things could be improved – especially with regard to security. Learn more.


Incorporate Zero Trust and SASE into your IAM strategy to secure your hybrid workforce

Join us as we discuss the security challenges involved in catering to a hybrid workforce, how Zero Trust and Secure Access Service Edge should be at the forefront of your IAM strategy and how to keep up with the key trends to build a strong IAM framework for your organization. Learn more.


A Master Class on Cybersecurity: Roger Grimes Teaches Data-Driven Defense

Join Roger Grimes for this thought-provoking webinar where he’ll share the most common reasons for data breaches and a data-driven approach to determining your organization’s specific weaknesses. Learn more.


Cloud Infrastructure in 2022 Summit

Join this summit to find out what your top infrastructure and cloud security concerns should be for the rest of 2021 and heading into 2022. Learn more.


Architecting Security for the Cloud

Join us as an expert reviews the importance of not relying on only one control, and what additional measures can be used to protect you, or at least mitigate, against future problems.


Top 10 Tips for Cloud Infrastructure Heading into 2022

Join the experts as they discuss the top 10 tips for Cloud Infrastructure in 2022 surrounding networking, site connectivity, security, administration and more. Learn more.


The New Best Practices for Microsoft 365 Security, Backup & Recovery

In this Webinar, you will learn a number of data protection strategies particularly with regard to data backups and security. Learn more!


Microsoft 365 Security, Backup & Recovery Summit

Join the editors of Redmondmag.com and Virtualization & Cloud Review for this free half-day summit where they'll bring you together with independent experts who work with Microsoft 365 security day-in and day-out. Learn more.


Top Microsoft 365 Security, Backup & Recovery Mistakes

Join us as we look into the common mistakes or assumptions related to making sure your data in Microsoft 365 is safe and how to correct them. Learn more.


Negate Cyber Attacks: Secure Vulnerabilities, Misconfigurations, Privileged Account Attacks

The steps of a cyber attack against an enterprise are always the same. The exploits attackers leverage are nearly the same as well. Therefore, it is due time that we start protecting our networks with more intelligent approaches. Let 17X Microsoft MVP Derek Melber give you a clear path to a more secure network. Learn more.


Defending Against Active Directory Attacks That Leave No Trace

In this session, an identity and access management expert will walk you through some attack techniques that bypass traditional monitoring solutions. Learn more.


AWS Cloud Security Summit

Are you prepared to manage your entire AWS cloud ecosystem securely? Make sure you're truly secure with this free half-day summit. Learn more.


AWS Security, Backup and Recovery Best Practices

Join us to learn how to protect yourself against ransomware and the latest security threats as we discuss AWS Architectures designed for data protection, backups, and disaster recovery. Learn more.


Threat Detection Thursday — Life of a Zero-Day in the BlueVoyant SOC

Join this panel Q&A commenting on the lessons learned from the angles of Improved Detection, Threat Hunting, and Accelerated Response. 


Ransomware: All About the Benjamins

2021 has been a weird one for ransomware. We've seen more ransomware groups than ever either taken down by law enforcement or decide to "retire" but ransomware attacks have not slowed down at all. Learn more.


Best Practices for Cloud Storage, Backup & Recovery Summit

Don't miss this half-day summit where you will learn best practices and insights you need to make sure, should the worst happen (and it very well could), you can come back up with the click of a button. Learn more.


Fuel Digital Transformation: Changing Document Productivity Challenges into Opportunities

The shift to a hybrid workforce and digital workspaces has caused many organizations to heavily rely on PDF documents, e-signatures and workflows to replace manual in-office processes that no longer meet current business needs. Learn more.


Challenges and Best Practices for Protecting Azure Kubernetes Services

Enterprises all over the world are seeing more mission-critical cloud-native applications deployed on Kubernetes. Learn more.


Transforming Cloud Security with SASE

SASE is a security framework designed to counter threats that thrive in an environment which is invisible and distributed. Learn more.


Modernizing Privileged Access Management: Stopping Cyberattacks in Their Tracks

How can you implement privileged access management where both flexibility and effectiveness are achieved? Learn more.


Microsoft 365 and SharePoint Online Best Practices Summit

Don’t miss this summit that will keep you ahead of those changes and give you real-world insights you can use the same day to improve your Microsoft 365 and SharePoint Online installations. Learn more.


Top 10 Security & Backup Tips for Microsoft Office 365 and SharePoint Online

Join us for this session to learn a number of best practices that can enhance SharePoint’s performance. Learn more.


Best Practices for Managing & Optimizing Microsoft 365

Join us for this session to learn a number of best practices that can enhance SharePoint’s performance. Learn more.


Why it’s Time to Revisit Your Teams Strategy

This Webcast explains why it’s time to take a step back and take a critical look at your organization’s unified communications strategy, especially as it relates to Teams. Learn more.


How You Can Extend the Cloud Perimeter Beyond the Microsoft Cloud

During this webinar, we'll be unpacking some of the deeper integration potential around MCAS and your 3rd party SaaS and PaaS apps. Learn more.


Multi-Cloud Security Summit

Join us to discover top cloud security threats and what you can do to secure your multi-cloud and hybrid cloud environment in the face of today's top threats. Learn more.


Top Hybrid/Multi-Cloud Security Threats

The key takeaways from this presentation will help security and IT teams support your organization’s business objectives while at the same time continuing to maintain a robust security and compliance posture. Learn more.


Security Best Practices for Hybrid/Multi-Cloud Environments

This session outlines strategies and tactics for keeping our hybrid cloud environments safe from ever-increasing threats. Learn more.


An Admins Guide to Secure and Efficient Microsoft Teams Management

In this webinar, we're going to provide some of our favorite tips and guidance to help you best manage Microsoft Teams. Learn more.


Digital Resiliency Strategies for Application Infrastructure in a Hybrid Cloud World

Application delivery infrastructure and security have become more complex. Learn more.


Top Microsoft Teams Best Practices for Today's Workforce

Join Senior Resultant, Howard M. Cohen, as he shows you how to produce your best results by leveraging Teams best practices. Learn more.


Maximizing Microsoft Teams Summit

Join the editors of Redmondmag.com and independent Microsoft Teams experts for this free, half-day summit filled with real-world tips, advice and best practices to help you get the most out of your Microsoft teams installation, no matter the size of your organization. Learn more.


Expert Insights for Maximizing Your Microsoft Teams Installations

Join this session as we look at ways you can maximize some of the other benefits Microsoft Teams has to offer. Hopefully, you'll come away from this session with at least one new piece of functionality within Teams that you can take back to your organization to help you get even more from platform! Learn more.


Veeam CDP: Tips for Lightning-Fast Recovery

In this webcast, we will share the latest tips and tricks for implementing this new capability for those critical workloads that require near-zero Recovery Point Objectives (RPOs). Learn more.


Understand the Differences Between Traditional Endpoint and Cloud-Based Device Management

Sign up for this webcast and you’ll come away with a clear understanding around system and licensing requirements, and talking points to convince your internal stakeholders of the shift. Learn more.


Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim?

After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Learn more.


Ransomware advice webinar: Hear from experts

To beat ransomware, preparation is key. In this session, Rick Vanover from Veeam® and Krista Macomber, senior analyst at Evaluator Group, will share advice on ransomware protection, so that you will be better equipped to handle a ransomware attack on your organization.


The War on Ransomware Continues: Best Practices with V11 Webinar

The ransomware threat continues to put data and business reputations at risk. In this webinar, join Rick Vanover from Veeam® to share the latest tips for beating ransomware by assessing the threatscape, evaluating steps you can take to protect your data and learning what's new in Veeam Backup & Replication™ v11 to keep your data protected.


DEMO VIDEO: VM Backup and Recovery

Get started protecting virtual machines such as VMware, Hyper-V and Nutanix AHV with a solution that is simple, flexible and reliable.


Cloud Data Protection Best Practices for AWS & Azure

Join us for the second session of summit as you will learn about the options you have, their cost impact and structure, and finally best practices for securing your environment. Learn more.


The Top Ransomware Threats You're Facing Right Now

Join us for the first session of summit to learn how ransomware groups are going after the cloud with the same ferocity they have been attacking local networks and learn what you need to do to protect yourself and your cloud providers. Learn more.


Ransomware & Cloud Data Protection Summit

Join us for this half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practice advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Learn more.


The European Union's Recommendations to Prevent Cyberattacks on SMEs

After identifying and analyzing the cybersecurity issues faced by SMEs post-pandemic, the EU has developed recommendations that could help SMEs improve their cybersecurity posture. Learn more.


How to Create a Unified Threat Hunting Experience Across Security Portals

This webinar is for you if you’ve been comfortable with the old portal but want to know more about the new environment. Learn more.


Pain Points: When to Consider Switching or Evolving Your Cloud Architecture

Please join us for this session as we discuss tips on how to make your cloud usage more efficient! Learn more.


State of the Cloud Art: The What, When and Why of Public vs. Private vs. Hybrid vs. Multi-Cloud

Remember when managing your network or data center meant constantly updating, upgrading, and shopping for new hardware and new software to constantly keep making your infrastructure better and better? Learn more.


Choosing Your Cloud Summit

Attendees of this Redmond and Virtualization & Cloud Review virtual summit will find out the latest on the key emerging differences of each major approach and for ideas from experts to get more business value out of their architecture. Learn more.


Modern Cloud Data Protection Summit

Join the editors of Virtualization & Cloud Review and Redmondmag.com as they bring together experts in the cloud and Infosec world to make sure their data stays secure in their modern cloud infrastructure. Learn more.


Modern Best Practices for Cloud Data Protection, Collaboration & Compliance

Join IT industry veteran Howard M. Cohen for an in-depth examination of best practices around managing both your people and your tech to achieve maximum security, and maximum regulatory compliance, too! Learn more.


Top 10 Threats to Your Cloud Data in 2021

Join Ian Thornton-Trump CD for a blunt assessment of the ten threats to your cloud data, how Digital Transformation projects can derail organizational security and how to introduce new attack surfaces for malicious actors to pray upon. Learn more.


Integration Between Microsoft’s EDR Technology and Incident Response Across the Productivity and Collaboration Layer

Join this webcast and you’ll walk away understanding how to balance the needs around organizational security with your user’s quality of work life. Learn more.


Ransomware Defense & Recovery Summit

Join editors and experts of Virtualization & Cloud Review to find out what you need to know to defend, protect and recover when ransomware comes after you. Learn more.


How to Reduce Alert Fatigue, Optimize Logs, and Concentrate on High Value Sources of Information

Join us for this webcast as we discuss Attack Surface Reduction, creating valuable Identity Protection Policies, and managing your end user’s experience in the process. Learn more.


#1 Office 365 Backup: Technical Deep Dive

Join this webcast and learn about the infrastructure components, and how simple it is to use Veeam Backup for Microsoft Office 365 — from the early planning stage all the way to performing restores. Learn more.


Implement DMARC the Right Way to Keep Phishing Attacks Out of Your Inbox

​​​​​​​Get the details you need to know now to protect your organization from phishing and social engineering attacks. Learn more.


Why PSTs are Such a Bad Idea in the Cloud

PSTs – Personal Storage Tables – arrived in the days of 25 mb mailboxes and 3 kb emails. But now that most Exchange mailboxes are in the cloud, isn’t it time to drop this antiquated technology?


Expert Hybrid Cloud Data Tips & Infrastructure Best Practices

Join us as Howard M. Cohen examines how to approach data management and protection in today’s hybrid environments. Learn more.


Top Hybrid Cloud Data Dos and Don'ts

Join this session of summit to learn about networking, authentication, security, and monitoring concerns, and techniques for resolving them. Learn more!


Hybrid Cloud Data Summit

To help guide you the editors of Virtualization & Cloud Review, AWSinsider.net and Redmondmag.com have teamed up with independent cloud experts to show you how architecture, best practices, security protocols, new tools and much more can make your job managing these systems so much easier. Learn more!


Best Practices for Implementing, Managing and Optimizing Office 365/Microsoft 365

This informative presentation provides practical tips that administrators can use to make sure that they deploy Microsoft 365 in a way that truly meets the organization’s needs. Learn more.


Top Security Concerns Every Enterprise Must Know for Office 365/Microsoft 365

This session will provide expert advice and insight on optimizing and securing your organization’s Office 365 infrastructure today and preparing and upgrading it for tomorrow. Learn more.


Microsoft Office 365 for Enterprises Summit

This half-day summit brings together the editors of Redmondmag.com plus independent experts to show IT pros how they can maximize Microsoft Office 365 in their enterprise environment. Learn more.


Protecting Your Organization Against Zero-Day Vulnerabilities

Join us as we take a deep dive into the process of these Proxylogon attacks and use this information to establish steps you can take to keep your organization secure from similar zero-day attacks using a strong SIEM framework. Learn more.


The New Reality: How Covid-19 Changed Everything

Join us for this session of summit to learn how others are evaluating and planning how and where work will be happening going forward.  Learn more.


Transforming Your Remote Workforce Summit

The editors of Redmondmag.com and Virtualization & Cloud Review, along with independent experts, will provide expert advice and insight on optimizing and securing your prospect's infrastructure today and preparing and upgrading it for tomorrow.  Learn more.


4 Hybrid Identity Security Pitfalls You Probably Already Forgot About

Over the past 18 months, it’s likely you’ve forgotten about potential risks that existed when expanding to the cloud. Learn more.


Secure and Extend Your AD Environments: Starling CertAccess + Active Roles

Join us for this webcast from IAM Security analyst experts to hear the top considerations and pitfalls to avoid when determining your IAM Active Directory (AD) security and management strategy. Learn more.


The Good, Bad, and the Ugly of the Rush to Remote Work

For this session Tom Fenton reached out to his friends in the industry to get their insights and he will go over what they and he has learned over the last year: the good, the bad and, of course, the ugly of enabling remote workers. Get the useful details.


Next-generation Approaches to End-User Computing in 2021

Join us for this session as we discuss how the pandemic began to grip the world in early 2020 and kicked off a forced march to remote work. Learn more.


Future of Desktop Infrastructure Summit

Join the editorial staff of Virtualization & Cloud Review and Redmondmag.com as well as independent experts for this half-day informational summit packed with real-world advice and insights you can't afford to miss! Learn more.


VDI or Daas? The Future of EUC is Hybrid

In this 30 minute discussion, we'll cover the advantages of a hybrid and multi-cloud EUC solution. Learn more.


Empowering Today’s DBAs: The New Backup & Recovery Best Practices

Join us for this crucial webinar that will walk you through the new backup & recovery best practices every DBA needs to know to make sure their data is secure and recoverable in today's cloud landscape. Learn more.


Applying the MITRE ATT&CK Framework to Your Active Directory

With the accelerating pace and increasing sophistication of cyberattacks, having a common framework for your security strategy helps you cope with the changing threat landscape. Learn more.


Recorded Demo: Azure-native Backup with Veeam

Watch this interactive session to learn more about how NEW Veeam® Backup for Microsoft Azure v2 delivers enterprise-ready Azure-native backup and recovery that is both cost-effective and secure.


Microsoft Azure Stack HCI Summit

IT decision-maker attendees of this Redmondmag.com Microsoft Azure Stack HCI Summit will find out about key advantages of the Microsoft hybrid cloud approach for HCI, and best practices and use cases involving Azure Stack HCI.


Microsoft Teams Backup: 8 Facts You NEED To Know

Microsoft Teams is now the center of our productivity universe — but should you back it up? Although Teams has its own basic retention, it does not fully protect against user error or security threats nor does it enable long‑term retention for compliance or regulatory purposes. With the rush to deploy Teams, many organizations still do not understand the what, why and how of protecting Teams as a critical app in their Office 365 environment — make sure you do!


Threat Detection Tuesday - What's In Your Toolbox?

Join BlueVoyant’s Owen Allen and Mike Scutt for a deep dive into some of the tools and techniques used by BlueVoyant Threat Hunters to identify breaches and threats more quickly. Learn more.


Managing Your Microsoft Dynamics 365 Data: Retain, Recover, and Be Ransomware-Ready

During this session, they’ll discuss how Microsoft Dynamics 365 is transforming business operations in the cloud and how the newest Metallic SaaS offering extends native capabilities for purpose-built protection, rapid recovery from attack, and long-term data retention to meet SLA compliance. Learn more.


Top Cloud Backup & Recovery Best Practices for Every IT Pro

In this session, we will look at best practices, tips, trends and techniques pertaining to cloud backup and recovery so you can be prepared when something happens. Learn more.


Modern Cloud Backup & Recovery Summit

This free, half-day summit is for every IT pro who isn't 100 percent confident their cloud backup recovery can withstand natural (or not-so-natural) disasters, ransomware, other hacks, or even just the weakness of the cloud systems themselves. Learn more.


A Master Class on IT Security: Roger Grimes Teaches Ransomware Mitigation

Join Roger for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware. Learn more.


Administrative Delegation and Policy Control in Microsoft 365

In this Webinar, you will learn how Microsoft 365 delegation differs from that of on premises environments, what Microsoft recommends with regard to administrative, and strategies for managing multi-tenant environments. Learn more.


My Top 5 Data Protection Tips

In this presentation, Karen Lopez shares her top 5 ways to protect data and the systems that house it. She’ll even throw in one or two that aren’t typically covered under this topic.


Prevent Active Directory Password Attacks: Steps and Tools

Password attacks are one of the most common reasons for data breaches even in 2021. The best way to get ahead of cybercriminals is to think like them. In this webinar, we'll show you how. Learn more!


Azure AD & Active Directory Security Summit

This half-day summit brings together the editorial staff of Redmondmag.com and independent experts to educate IT pros on what they need to know to protect their enterprise. Learn more.


Ransomware in 50 Minutes: Top Current Threats & What Experts Expect in 2021

Join Ian Thornton-Trump CD for the first session of our Azure AD & Active Directory Security Summit for a walk-through of a recent US Government Agency compromise and how monitoring of the Windows Security Event log could have revealed the unauthorized activity - on many occasions. Learn more.


Threat Detection Thursday - Breaking All The Rules!

This session will provide an overview of detection types, applicability, and rule aggregation to help you better focus on events that matter. If you can't tell your RBA from your UBA, join us on our journey to detection excellence! Learn more.


Enabling Digital Transformation with Windows Embedded IoT Solutions

Join us at this interactive and engaging webinar to learn how Microsoft Windows Embedded IoT and Azure cloud enable digital transformations helping partners to accelerate their delivery goals. Find out more now.


Addressing Endpoint and Data Insecurity in a Post-COVID World

The shifts that have occurred in the last 12 months in the way your organization operates have resulted in a drastically different working environment than what previously existed. Learn how you should go about addressing post-COVID insecurity? Register now.


Active Directory Hybrid Cloud Management: Top Security Risks to Watch For

In this webinar, we'll will discuss the top three security considerations when shifting to a hybrid identity model. Learn more.


Microsoft Teams Summit

It's time for your IT department to become your company's Microsoft Teams hero! Join the editors of Redmondmag.com plus independent experts in this half-day summit that will walk you through what you need to know about configuration, optimization, security, tips and tricks plus more. Learn more.


Simplifying Microsoft 365 Tenant Migrations When M&A Makes it Complicated

The pandemic has created opportunity for plenty of M&A/Divestiture activity. Learn more.


Don’t Do This With Your VM, Physical or NAS Backups: Worst Practices Gallery

So, you think you’ve seen it all? Think again. Join this webcast and learn more.


Hybrid Cloud 102: Best Practices for Hybrid Cloud Enterprise Configuration

Join us for session two of this summit as we look at best practices for Enterprise Hybrid Cloud Configuration and associated topics. Learn more.


Hybrid Cloud 101 Summit

Do you know the best practices for setup and configuration? What about the tools that can help? Join the editors of Virtualization & Cloud Review along with independent experts for this information-packed half-day seminar. Learn more.


Digital Transformation & The Cloud: Expert Best Practices for Transforming Your Enterprise

In this special editorial webcast, experts from Redmondmag.com will walk you through basic steps for considering a major Digital Transformation project. We'll look at everything from identifying stakeholders, rallying organizational support, to determining and securing budget and executing the project. Learn more.


How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches

Active Directory Exploitation Is the Common Thread in Recent High-Profile Attacks. Colonial Pipeline, SolarWinds, Hafnium - every day we hear about a new attack, a new vulnerability, and devastating consequences. Learn more.


Calculating the Impact of Cloud PBX for Microsoft Teams

Join us for this informative webinar to understand the critical nature and impact of selecting the right telephony partner for your Microsoft Teams direct routing deployment. Learn more.


Threat Detection Thursday

Based on methodologies developed though BlueVoyant's continuous research into attacker TTPs and real-world experience in countering espionage and financial crimes, our Threat Hunters will expose expert perspectives on human-driven defense. Learn more.


Enterprise Cloud Wars 2021 Summit

Join for this fun and fast-paced half-day summit where the editors of Redmondmag.com and Virtualization & Cloud Review bring together independent experts to discuss the pros and cons of many of today's top cloud solutions as well as what's working for organizations like yours.  Learn more.


AWS vs. Azure vs. GCP: Public Cloud Smackdown

In this tongue-in-cheek but informative roundtable session, public cloud experts will review what makes different public cloud systems great but also the weaknesses of each and what you might want to watch out for.  Learn more.


Best Practices for Making AWS and Azure Work Together

Join the second session of our Enterprise Cloud Wars 2021 Summit and get insights on what you need to do in your enterprise to make them work well together. Learn more.


Top 5 Identity and Access Management Challenges of 2021 and How to Overcome Them

In this webinar, we'll discuss top five identity and access management challenges IT admins will likely face in 2021 and how to overcome these challenges. Learn more.


A Master Class on IT Security: Roger Grimes Teaches You Phishing Mitigation

Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist where he’ll share a comprehensive strategy for phishing mitigation and how securing your users can become your best, last line of defense. Learn more.


Top Security and Compliance Issues with Office 365

In this session, we'll look at 5 of the top security and compliance issues with Microsoft 365 and what you can do to make sure your company doesn't fall victim to data compromises using Microsoft 365 services. Learn more.


What's New/What's Hot/What's Not with Office 365/Microsoft 365 Security

In this session, you will learn about the security features that you should be using and about some new features that you might not yet be familiar with. Learn more.


Office/Microsoft 365 Security Summit

Stay up to date on the latest features and security issues with Office 365/Microsoft 365 in this information-packed half-day seminar.  Learn more.


Microsoft Teams Backup: 8 Facts you NEED to Know!

Microsoft Teams is now the center of our productivity universe — but should you back it up? Learn more.


Getting More From Your Microsoft Teams Investment

In this webcast we'll cover the obstacles you will likely encounter on your way to a full Teams deployment and tips for how to overcome those obstacles. Learn more.


Top Do's and Don'ts of Enterprise Cloud Migration

Join cloud solution architect and technical trainer Tim Warner for a content-rich, “no fluff” breakdown of proven “do this, not that” cloud migration approaches.  Learn more.


Enterprise Cloud Migration Summit

Join us for this half-day summit brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com to learn what you need to know to get your enterprise safely cloud-enabled. Learn more.


Enterprise Cloud Migration Best Practices

Join this session as we look into topics including having a plan, being prepared, and understanding your application and data infrastructure environment.   Learn more.


DEMO VIDEO: Continuous Data Protection (CDP)

Eliminate downtime and minimize data loss for your Tier 1 VMware workloads with built‑in Continuous Data Protection (CDP) and achieve immediate recoveries to a latest state or desired point in time, plus more.


DEMO VIDEO: Ransomware Protection

Stop ransomware in its tracks, ensure backup compliance and safeguard your recoverability with immutability for your backup copies plus much more.


DEMO VIDEO: Instant Recovery

Instantly recover even more of your data center’s workloads with seamless recovery for Microsoft SQL, Oracle and NAS backups from the pioneer of Instant VM Recovery®.


What You Need to Know About Securing Active Directory

In this web seminar, we will discuss AD access points used in recent cyberattacks, how to look for warning signs that AD has been compromised, and steps to take in the event of an attack. Learn more.


Understanding the Hybrid and Private Cloud Dynamics

Cloud computing technology is evolving fast! Join this session as we answer your top questions and learn what the best solution for your business needs are. Learn more.


Best Practices for Architecting and Securing Your Hybrid and Private Clouds

During this session, we will examine several best practices for architecting your hybrid and private cloud environment so it will be as secure and resilient as possible. Learn more.


Cloud Architecture & Security Summit

The enterprise most likely has a mix of hybrid/private cloud infrastructure —or is striving to achieve it. Join this summit and learn more.


Microsoft 365 Data Protection – It’s Not Just Backup

Join Redmondmag.com Editor-in-Chief Scott Bekker, 14-time Microsoft Office Apps and Services MVP Matthew McDermott, and Spanning Director of Product Marketing Dave Wallen for a lively discussion around Microsoft 365 Data Protection. Learn more.


Best Practices for Multi-Cloud Environments

Join IT industry veteran Howard M. Cohen in exploring some of these best practices, why they’re each critical to your success, and how they enable you to recognize the full value of your multi-cloud strategy. Learn more.


Multi-Cloud Management Summit

Join this half-day virtual event to learn from topics like: Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Learn more.


How to Apply the Cyber Kill Chain Framework to Identify and Combat Cyberattacks

Join us to learn how the cyberattack chain model can help IT security teams put in place strategies to “kill” or contain the attack at various stages, and how to better protect their IT ecosystem.


Navigate your Hybrid Workplace Strategy with Microsoft Teams and BlueJeans

In this webcast you will learn about key predications regarding the future of the workplace, the next of Microsoft Teams for collaboration and how to get the office ready for a productive hybrid workforce. Find out more.


Living the DReam: Rapid Ransomware Recovery with VMware Cloud DR

Join us for this session, where we explore why you should care about ransomware, how to take control of your data and what ransomware can do to businesses. Learn more.


Hacking Multifactor Authentication: An IT Pro’s Lessons Learned After Testing 150 MFA Products

Join Roger as he discusses the good, the bad, and the ugly lessons he learned from his research. He’ll share with you what works, what doesn’t, and what you should absolutely avoid. Learn more.


Migrating Your Microsoft 365 Tenant Through Mergers & Acquisitions

Mergers, acquisitions, and divestitures are common business activities that can have a huge impact on your Microsoft 365 tenant. Learn more.


How to Apply the Cyber Kill Chain Framework to Identify and Combat Cyberattacks

Join us to learn how the cyberattack chain model can help IT security teams put in place strategies to “kill” or contain the attack at various stages, and how to better protect their IT ecosystem.


Would Your Organization Fail the Active Directory Security Assessment?

Join Microsoft identity experts as they walk through the most common weak spots in Active Directory configurations—and how to fix them. Learn more.


Building Your Distance Learning Experience

In the era of distance learning, education institutions have been forced to quickly adapt how their students learn as well as how their educators teach into a completely digital experience. Learn more.


The Changing Role of Active Directory Engineers in a Cyber-Resilient Organization

Join this webcast for a discussion on how AD engineers and architects can expand their roles and add value to the company by focusing on developing and implementing a strategy to ensure that AD is secure from malicious intruders. Learn more.


Why PSTs are Such a Bad Idea in the Cloud

Join us for a discussion about why we think PSTs are an obsolete and potentially dangerous storage location for email. Learn more.


DEMO VIDEO: Physical Backup and Recovery

Watch this short demo of Veeam® Backup & Replication™ to learn how to backup and recover physical servers. You will see basic product features and how to create a protection group and backup a Windows server.


DEMO VIDEO: Applications Recovery

Watch backup demos for widely used applications and databases including: Microsoft Active Directory, Exchange, SharePoint and SQL server; Oracle and SAP HANA; Backup from Storage Snapshots.


DEMO VIDEO: VM Backup and Recovery

Watch this short demo of Veeam® Backup & Replication™ to learn what it protects, its primary features and how to backup and recover virtual machines (VMs). This demo also includes an example of a quick deployment, the configuration of various backup jobs and recovery options for VMs.


Recorded Demo: AWS-native Backup with Veeam

Watch this interactive session to learn more about how NEW Veeam® Backup for AWS delivers AWS-native backup and recovery that is both cost-effective and secure. Our Veeam/AWS experts will share:


Migrating Active Directory in a Work-From-Anywhere World

There can be many reasons why your organization might need to do an Active Directory migration. No matter the reason, you are going to have to make a decision about what tools to use. Learn more.


The FBI's Recommendations to Prevent BEC Attacks on Office 365 Users

Join this webinar as our cybersecurity expert explains how you can implement the FBI's recommendations to mitigate BEC scams. Learn more.


The War on Ransomware Continues: Tips and Best Practices with Veeam v11

In this webinar, we'll share the latest tips for beating ransomware by assessing the threatscape and steps you can take to protect your data. Learn more.


The Modern SOC and the optimization of Microsoft Security

Company exposure today can appear in many sizes and forms. As a business ecosystem expands so do the risks, whatever the size of the company. By using the latest thinking from Microsoft, BlueVoyant is helping customers optimize their Microsoft 365 E5 license. By working with an expert to unite the security tools from one manufacturer, you can not only save money, time and resources but concentrate on managing those risks that actually have the potential to disrupt your business. Learn more.


Public vs. Private vs. Hybrid: Enterprise Pros and Cons

Join Greg Schulz of Server StorageIO as he looks at various cloud options and scenarios including pro’s, con’s and scenarios for Public vs. Private vs. Hybrid, from core to edge and other points in between. Learn more.


Best Practices for Managing a Hybrid Cloud Environment

In this practical, hands-on session, Microsoft MVP Tim Warner reviews the most important proven practices in hybrid cloud computing. Learn more.


Modern Enterprise Hybrid Cloud Summit

This free three-hour virtual event brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com will make sure you have what you need to know about best practices for making the most of a hybrid cloud infrastructure. Learn more.


The Latest on the Microsoft 365 E5 Security Licensing Journey

Join BlueVoyant’s Director of Microsoft Security Solutions, Micah Heaton, as he recaps their M365 E5 license bundle conversation from last October and shares insights on announcements made at Microsoft Ignite around Endpoint Management, Information Protection, and Identity and Access Management. Learn more.


Remote Workforce & Digital Workplaces: Why Infrastructure Matters Even More

Join the editors of Redmondmag.com plus independent technology experts as they share their insights to guide you through the top tips you need to know when considering your infrastructure of a remote future. Learn more.


Transforming the Enterprise: The Remote Workforce and Digital Workplaces Summit

Join the editors of Redmondmag.com along with independent experts who will share their insights on what you need to do NOW to make sure your remote workforce and digital workplace is protected for the future. Learn more.


Security, Security and Security: The Top 3 Concerns of a Remote Workforce & Digital Workplaces

Hear from independent infosec experts and the editors of Redmondmag.com on the top security concerns you need to be concerned about now and the best practices you can implement to mitigate them. Learn more.


Solving the Insecurity of Education in the Remote Workforce Era

Join us for this webcast to learn how can educational institutions better manage the security of their remote workforce. Learn more.


Protect, Detect, and Respond to Supply Chain Cyber Attacks (e.g. Solarwinds) Using Splunk Enterprise Managed Security Services

Join this webcast for an in-depth discussion about the SolarWinds attack, and learn best practices and strategies to strengthen your defenses. Learn more.


Modern Best Practices for Cloud Data Protection, Collaboration & Compliance

Attend this session of our Modern Cloud Data Protection Summit and walk away with top tips and best practices around cloud data protection. Learn more.


What the SolarWinds Attacks Mean for Cloud Data Protection

In this timely session, Editorial Director Scott Bekker and security expert Ian Thornton-Trump will have a conversation about what cloud data protection requires in light of the revelations. Learn more.


Modern Cloud Data Protection Summit

Join the editors of Virtualization & Cloud Review and Redmondmag.com as they bring together experts in the cloud and Infosec world to make sure your data stays secure in your modern cloud infrastructure. Learn more.


Zscaler and Microsoft 365: Best-of-Breed Platforms Supercharge Digital Transformation

The definition of the workplace has fundamentally changed. Modern enterprises are transforming their applications and network stack to support the cloud-and-mobile-first reality of today. Learn more.


Expert Q&A: State of Office 365 Protection

Join Redmondmag.com Editorial Director Scott Bekker for this wide-ranging discussion with Microsoft MVP Matt McDermott and Dave Wallen about the state of Office 365 security. Learn more.


Ransomware Recovery: What to do if You're Hit and You Didn't Have a Plan

In this session, Cyber-Security Trainer and Pluralsight Author Dale Meredith will review the critical steps every organization should take after a data breach. Join us!


Ransomware 2021: What to Expect in the Year Ahead, from Malware Families to Payout Trends

In this session we will look at trends so far in 2021 and what to expect the rest of the year.  Join us!


Responding to Ransomware Virtual Summit

In this special editorial summit, experts gathered by Virtualization & Cloud Review look at what organizations can do once they're hit with ransomware. Join us!


Office 365, SharePoint & Data Protection: Top Tips for Protecting Your Enterprise

Join us for this editorial webcast to understand the unique data protection challenges in Office 365 and SharePoint, and come away with ideas for addressing them. Learn more.


Teams Data Protection — 8 Facts You NEED to Know!

Microsoft Teams is now the center of our productivity universe — but should you back it up? Learn more.


Top Do's and Don'ts of Enterprise Cloud Migration

In this session, you will learn about how to optimize costs, secure your cloud control plane and resources, and how to take advantage of the flexibility of the public cloud. Learn more.


Enterprise Cloud Migration Summit

Join us for this half-day summit brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com to learn how to get your enterprise safely cloud-enabled. Learn more.


HCI Best Practices 

Join us for the second session of our Hyperconverged Infrastructure Summit and you’ll leave with a solid understanding of the top things do (and not to do) when implementing HCI. Learn more.


Understanding the True Benefits of Hyperconvergence

Join us in this seminar to find out about what HCI really is and why so many enterprises are moving to this new way of architecting their systems. Learn more.


Hyperconverged Infrastructure Summit

Join the editorial staff of Virtualization & Cloud Review and Redmondmag.com as well as independent experts for this half-day informational summit packed with real-world advice and insights you can't afford to miss! Learn more.


Modern Best Practices for Cloud Backup and Recovery

Join the second session of our Cloud Backup and Recovery for 2021 Summit as Dave Kawula reviews his top tips to ensure your cloud backups are protected and recoverable.  Learn more.


How to Secure Your Remote Workforce with a Microsoft-Powered Solution - Part 2

In this webinar, we'll discuss how using Microsoft Defender for Endpoint with Intune can help your organization improve its ability to identify and respond to risks. Learn more.


Re-Imagining Businesses With the Power of Digital

Join this webcast as we discuss a human-centric approach towards reimagining newer business models, the significance of data and how to lead successful digital business transformation. Learn more.


8-Step Framework for Tracking and Measuring Enterprise IAM Metrics

In this webinar, our IAM expert, Jay, will help you identify IAM metrics that align with your business needs, and show you how to track them effectively. Learn more.


Top 10 Security Features in Office 365/Microsoft 365

This session will look at the ten native Microsoft 365 security features that can make the biggest difference to your organization’s security. Join us!


What's New for Enterprises in Office 365 in 50 Minutes

Join this session as we will talk about what is new in Microsoft 365 and how you can stay up-to-date with this fast-paced and ever-evolving service. Join us!


Microsoft Cloud App Security (MCAS): A Uniquely Integrated CASB Built for Today's SOC

Micah Heaton Director of Microsoft Security Services and John Wagner Sr. M365 Engineer from BlueVoyant will show you how Microsoft Cloud App Security (MCAS) is designed to take on this problem and then some. Learn more.