Webcasts


Upcoming

Getting the Most Out of Your Microsoft Security Investment With MDR

Join Greg Schulz, Sr. Analyst & Microsoft MVP at Server StorageIO, and Jerry Carlson, Microsoft Alliance Manager at Critical Start, for an interactive discussion. Jerry and Greg will discuss trends, customer pain points, techniques, and best practices for Operationalizing and maximizing your Microsoft Security investment with MDR. Learn more!

Date: 05/23/2022

Time: 11:00 am


3 Microsoft 365 Backup Keys to Success

This panel session will cover best practices Microsoft 365 administrators and their stakeholders need to be aware of, how Microsoft 365 technologies complement each other for holistic protection, and debunked myths on Microsoft 365 data ownership and management.

Date: 05/26/2022

Time: 11:00am


Leveraging AIOps in your ITSM Operations

It’s been about five years since AIOps emerged as an identifiable enterprise practice, and yet this application of analytics and machine learning to big data to automate and improve IT operations is already a table stakes capability in a growing number of highly competitive markets. In this webcast, you’ll learn how AIOps-driven ITSM operations can enable DevOps teams to be more productive, align DevOps and Product teams for rapid innovation, and apply analytics for rapid iteration that drives better customer experiences.

Date: 05/26/2022

Time: 11:00am


Is Your Zero Trust Evaluating the Right Identity?

Authentication, despite forming the basis of every security strategy, cannot be overlooked as a minor cog in the wheel. With hybrid model of working being the norm, it is imperative for authentication to be context-aware, and sensitive to all unique userrelated cases. Learn more!

Date: 05/31/2022

Time: 11:00 am


Modern Hybrid Cloud Security Summit

The editors of Redmondmag.com, Virtualization & Cloud Review, and AWSInsider.net have brought together independent security experts for this free, half-day summit that will walk you through the security threats you can expect to face in the new year plus the real-world best practice advice you can implement right way. Don't miss out!

Date: 06/01/2022

Time: 9:00 am


Ransomware Recovery Best Practices

Ransomware should not stop your backup or restore capabilities when you need it most. Join our webcast to learn more about the latest research on ransomware's impact on IT environments, how to use the Veeam 3-2-1-1-0 rule, and a demo of Veeam's powerful capabilities.

Date: 06/07/2022

Time: 11:00am


Hybrid Cloud Data Backup & Recovery Summit

With all the threats attacking your hybrid cloud infrastructure, you know how important reliable data backup and disaster recovery is -- and with the shared responsibility model, it's really up to you to make sure you can get things right (and quickly!) Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSInsider.net for this free half-day summit along with independent experts who will help get you up to speed with real-world best practices for hybrid cloud enterprise backup and disaster recovery in 2022 and beyond.

Date: 06/08/2022

Time: 9:00 am


Zero Trust 101 Summit

Join the editors of Virtualization & Cloud Review and Redmondmag.com for this free, half-day virtual summit bringing together independent experts who will walk you through what zero trust is and the best ways to implement it in your enterprise.

Date: 06/10/2022

Time: 9:00 am


Coffee Talk: Why Hybrid Cloud and Why Now?

Competitiveness requires agility, the ability to pivot instantly and effortlessly whenever business opportunity presents itself. Nothing supports agility better than hybrid environments. In this Coffee Talk session, Senior Resultant Howard M. Cohen discusses what a natural development hybrid cloud solutions really are, and how to strategically design best solutions with logical combinations.

Date: 06/13/2022

Time: 11:00am


How to Easily Backup and Recover SAP HANA Environments in Azure

Today, many customers are choosing to run their production SAP infrastructure in Microsoft Azure to optimize costs, increase agility and take advantage of the many Azure native services. Join our industry experts as they discuss the latest tips and tricks for protecting SAP HANA in Microsoft Azure.

Date: 06/16/2022

Time: 11:00am


Securing, Managing and Recovering Microsoft Teams Summit

The editors of Redmondmag.com have joined with independent experts to create this this free half-day summit that will walk you through current best practices for managing, securing and recovering Microsoft Teams, offering real-word advice, top tips and solutions.You don't want to miss it!

Date: 06/17/2022

Time: 9:00am


Azure & Your Digital Transformation Summit

Microsoft's Azure cloud technology has so much to offer enterprises, but most IT leaders can't keep up with all the relevant changes. And Azure can be the key to your digital transformation strategy, but only if you understand how it can lead your efforts toward application modernization, reducing technical debt, and more. That's why the editors of Redmondmag.com have joined with independent experts and MVPs, plus leaders from Microsoft and SoftwareONE, to walk you through what's new in Azure and how it can truly be the linchpin for your organization's digital transformation strategy. You don't want to miss this free, half-day summit -- register now!

Date: 06/22/2022

Time: 9:00AM


Hybrid Cloud Security Summit

A hybrid cloud infrastructure just makes sense for many organizations. Most enterprises use a variety of cloud types and services -- and rightly so -- but unfortunately, that’s going to complicate your security strategy. Learn the tips, tricks, do's, don'ts and modern best practices of experts who secure (and recover) these systems on a daily basis. If you're responsible for your organization's cloud infrastructure in any way, this is the summit you don't want to miss!

Date: 06/24/2022

Time: 9:00am


Multi-Cloud & Hybrid Cloud Data Summit

Join this free, half-day summit brought to you by the editors of Virtualization & Cloud Review as they bring together data and infosec experts and cloud architects who will walk you through the topic of modern cloud data techniques and best practices that every IT manager needs to maximize their hybrid/multi-cloud environment and keep it secure. Don't miss it!

Date: 06/29/2022

Time: 9:00 am


Securing, Managing & Recovering Microsoft 365 Summit

You won't want to miss this free half-day summit from the editors of Redmondmag.com that will keep you ahead of those changes and give you real-world insights you can use the same day to improve your Microsoft 365 installation and make sure it's secure and recoverable in the year ahead. Don't miss it!

Date: 07/08/2022

Time: 9:00 am


Top Enterprise Best Practices for Securing, Administering & Recovering M365

In this session, Nathan O’Bryan (MCSM: Messaging, MVPr Office 365) will explore Best Practices for Securing, Administering & Recovering M365 to ensure security, and compliance while maintaining the appropriate levels of access for end-users. Learn more!

Date: 07/08/2022

Time: 10:00 am


Enterprise Ransomware & Recovery Summit

In this free, half-day summit, the editors of Virtualization & Cloud Review and Redmondmag.com, as well as top infosec and IT experts, will come together to offer you their insights and advice on the current ransomware landscape and what to do if you're attacked. Learn more.

Date: 07/22/2022

Time: 9:00 am


Active Directory & Azure AD: What’s New & What’s Hot Summit

Join us for this free half-day summit where the editors of Redmondmag.com will bring together Azure AD and AD experts to walk you through the newest features plus share their tips, advice and best practices so you can walk away with a real catch-up of exactly what Azure AD/AD can do for your organization right now.

Date: 08/17/2022

Time: 9:00 am


Microsoft Teams: Security Best Practices Summit

Join the editors of Redmondmag.com as well as independent security and Microsoft Teams experts for this can't-miss, free half-day summit that will give you real-world advice you can use today to secure your Teams installation and harden it for the future. Don't miss it!

Date: 08/26/2022

Time: 9:00am


Microsoft 365 Security Best Practices Summit

Join the editors of Redmondmag.com for this free half-day summit where they'll bring you together with independent experts who work with Microsoft 365 security day-in and day-out. They'll share their inside tips, best practices and everyday advice you can use that same day to improve your Microsoft 365 security and recoverability. Be sure to join us!

Date: 09/14/2022

Time: 9:00 am


Top Cloud Backup & Recovery Best Practices Summit

With this heavy weight on your shoulders, you need expert advice. That's why the editors of Virtualization & Cloud Review, AWSInsight and Redmondmag.com have brought together independent experts to give you the real-word advice, best practices and insights you need to make sure that if/when the worst happens you can come back quickly, hopefully with the click of a button or two. Don't miss it!

Date: 10/05/2022

Time: 9:00am


Best Practices for Ransomware Defense and Recovery Summit

Find out the best way to get your defense plan in place from independent experts who've done it before with this free half-day summit brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com. Don't miss it!

Date: 10/14/2022

Time: 9:00am


Managing & Securing Active Directory & Azure AD Summit

The editors of Redmondmag.com have put together this free half-day summit by bringing you independent Azure AD/Active Directory experts to walk you through the new best practices for wielding Azure AD/Active Directory to your best advantage. Don't miss out!

Date: 11/04/2022

Time: 9:00 am


On Demand

Enterprise Best Practices for Azure AD/ Active Directory Summit

Azure Active Directory (Azure AD)/ Active Directory are extremely powerful tools for your enterprise, but are you using Active Directory to its top potential. Do you know the current best practices? Are there new features you might have missed out on? With everything IT managers need to fully grasp when it comes to Azure AD/Active Directory, the editors of Redmondmag.com have pulled together this half-day summit to walk you through the new best practices for wielding Azure AD/Active Directory to your best advantage. Don't miss out!


Modern Azure AD/Active Directory Security Best Practices

Maintaining good security is one of the most important tasks for any Active Directory environment. In this session, you will learn why a previously secure Active Directory might no longer be secure, things that you should be doing today to harden your Active Directory environment, and Microsoft’s current best practices for Active Directory security.


Top 10 Azure AD/Active Directory Best Practices for 2022 and Beyond

Although some Active Directory deployments are simplistic, even a basic Active Directory deployment can eventually become unwieldy and difficult to manage. This session will discuss things that organizations large and small can do to tame their Active Directory environments, making them more efficient and easier to manage.


Coffee Talk: Creating the Perfect Contact Center System

Join us for a Coffee Talk and find out why many organizations are re-defining and re-distributing their contact centers, and what you need to get started/support it. Learn more!


Identity Management & Zero Trust Summit

Join the editors of Redmodmag.com with independent security experts for this free half-day summit that will walk you through real-world best practices, practical advice and new tools you might have missed.


Zero Trust Implementation Tips & Techniques

Join us as we examine the components Gartner originally identified when they first defined Zero Trust, and some that have evolved. We'll also examine how to approach it from a broad encompassing level down to as many areas of detail as we can fit into one session.


Best Practices for Enterprise Multicloud Management

Come join us to learn how to implement best practices for enterprise hybrid multicloud management, such as creating a consistent view across the cloud environments with a unified layer of abstraction and governance and securing managed cloud infrastructure resources across multiple functional areas.


Top 10 Multi-Cloud Management Tips, Tricks and What Not to Do

We'll give you the first thing NOT to do right here from the outset: Don't think multi-cloud is too complex to manage, and don't think it's simple. Join this session to learn what's the differences, why choose one cloud over another, and apply DevOps to Multi-Cloud Management to achieve continuous improvement through continuous deployment.


Expert Best Practices for Multi-Cloud Environments

Multicloud is no longer a matter of “if”, it is a matter of “when” and “how”. But how will organizations operationalize and manage Multicloud? In this session, we share best practices and lessons learned from the trenches to help you successfully adopt Multicloud.


Enterprise Multi-Cloud Management Best Practices Summit

Attend this half-day virtual summit to learn what you need to know now about performance and best practices for getting Azure, AWS and GCP to work better together. As always, our summit session content is from the editors of Redmondmag, plus independent experts who offer real-world insight and advice that attendees can use right away!


Avoid Hybrid Active Directory Outages: Unifying Change Monitoring and Recovery Across On-Premises and Cloud Platforms

To stay on top of rising threats, IT professionals must identify unwanted changes and vulnerabilities across critical Microsoft platforms. Watch now to learn more about the importance of change monitoring in defensive AD security strategies.


Cloud Data Protection 101 Summit

Join the editors of Virtualization & Cloud Review and Redmondmag.com along with independent data and infosec experts who do this work day-in and day out who will walk you through all the modern tips, tricks and best practices you need to know to truly keep your data secure, no matter your cloud setup.


Cloud Data Security Basics

In this session, you will learn about the basics of protecting your data while gaining the flexibility and speed that the cloud delivers. Learn more!


Cloud Architecture & Cloud Data Security: Top Dos and Don'ts

In this session you will learn about patterns and practices for network security, protecting those pesky storage accounts, and how to plan for effective and secure access for your company and even for third parties who may need to access your data. Learn more!


Coffee Talk: Remote Workforce Security & Best Practices

Time to stop thinking WFH. When people work remotely, they may not be home. Your remote work policies and procedures must include public places too. Join Senior Resultant Howard M. Cohen for a hot cup of info and insight about keeping everyone and everything secure and productive from afar!


Active Directory Migration: Go Native or Not

You can’t always predict when you’re about to face a sizable migration. Maybe a merger, acquisition, or divestiture came your way and you got the exciting news that you have a migration in your near future! When you have an Active Directory consolidation looming, how do you know whether Microsoft native tools can do the job, or whether you should consider a tool that’s more tailored for the job? This on demand webcast will help you identify some of the pros and cons you should take into consideration as you make the decision to go native or not.


Simplifying Microsoft 365 Tenant Migrations

The pandemic has created opportunity for plenty of M&A/Divestiture activity. This effectively results in lots of new tenant migration/consolidation projects to ensure users can be productive in their new organization. But M&A activity-based migrations often come with tight deadlines that IT must hit. And to make matters worse, the native tools available for tenant migration are extremely limited, making it difficult for IT teams, and impacting M&A plans and timelines. So, how can you simplify tenant migrations to align IT outcomes with business requirements?


VDI & EUC Best Practices in the New Remote Landscape

Over the past few years, we have seen an unprecedented adoption of remote work. With this in mind, now is a great time to reflect on what we have learned during this time about rapid, large-scale deployments of VDI environments and the best practices around it. People who are new to, or are investigating, VDI will gain insights into how to make their transition from physical to virtual desktops smoother while those who already have a VDI environment in place will pick up tips to help optimize it and provide a better experience for their users.


Best Practices for Enterprise VDI & End User Computing Summit

The editors of Virtualization & Cloud Review and Redmondmag.com as well as independent experts who will take a deep-dive into the current status of end user computing technology, review best practices for securing your remote workforce and share real-world knowledge for configuring, maintaining and improving your VDI and other end user computing technology. You won't want to miss it!


Reinvent the Workplace with End User Computing

It may not be clear exactly what the “next normal” looks like for your organization, but with renewed focus on transformation for nearly every business there is opportunity to rebuild and gain a competitive advantage. Join Harsha Kotikela of Nutanix as he discusses how to implement EUC in the modern era and avoid the mis-steps of the past and how a Citrix on Nutanix solution can help you.


So You've Been Breached -- What Now?

Attacks are inevitable and breaches are probable, particularly where your Active Directory is concerned. Join breach prevention and incident response experts from Semperis as they provide best practices to ensure you recover quickly, completely, and in a more secure state than before.


Enhancing Digital Operations through AIOps

The advent of artificial intelligence (AI), primarily in the form of machine learning, has brought opportunities and challenges to the enterprise. In this Tech Talk technology journalist John K. Waters talks about AIOps with Prashant Darisi, General Manager and Vice President of Customer Experience Management in the Global Solutions group at Everbridge, and Rob Jahn, Sr. Technical Partner Manager at Dynatrace.


How Dedicated Active Directory Backup Simplifies Ransomware Recovery

Active Directory enables businesses to securely grant or restrict access to systems, applications, and environments. It’s also becoming a primary target for ransomware attacks, as bad actors exploit misconfigurations and blind entry points to penetrate, corrupt, and control applications and their data. In this webinar, we’ll explore how dedicated Active Directory Backup mitigates silent cybersecurity threats and simplifies restore operations to get your business back online.


Recovering from Ransomware with Zerto

Expect to learn how the Zerto architectures use continuous data protection, our unique journal, and immutable offsite copies to neutralize a ransomware infection.


Integrating UEBA with Zero Trust — Accounting for The Human Element

In this webinar, we'll discuss how a UEBA solution fits into a Zero Trust architecture and how you can implement the same. Learn more!


THE SAFETY NET: Ransomware Recovery and Disaster Recovery for Hybrid IT Environments

Ransomware and other cyberthreats are changing business’s needs for data protection across their on-premise, private cloud, SaaS and public cloud environments. Discover the benefits of multi-layered data protection for your Hybrid IT environments.


Simplifying Microsoft 365 Tenant Migrations: It’s All in the Planning

In this lively discussion-format webcast, join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Senior Product Manager, Malte Schoch from Quest, as they discuss Microsoft 365 tenant migrations.


When Ransomware Attacks Summit

Make sure you're ready for the biggest threat to your cloud and enterprise. Don't miss out!


Current Ransomware Attacks & Strategies

How are ransomware groups carrying out attacks in 2022 and how are their tactics evolving? This session will answer those questions and offer practical advice for those trying to defend their networks from these accelerated attacks.


Malicious Browser Notifications: The New Phishing Attack Not Blocked by Your Current Cyber Defense

Cybercriminals have added a devious weapon to their attack arsenals - malicious browser notifications. And the worst part is they’re not blocked by any current cyber defense. These innocuous looking pop ups can wreak havoc on your network while remaining completely undetected. Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist to find out what you need to know now about malicious browser attacks and how to stop them.


Migrate your Oracle Workload to Azure with No Risk and Almost Zero Downtime

Join Oracle Ace Director Charles Kim and Oracle experts Kellyn Gorman, Tim Gorman and Clay Jackson for a discussion about how Microsoft and Quest can help you migrate your Oracle workload to Azure Infrastructure with zero risk and near-zero downtime.


The 7 Critical Reasons You Should Backup Your Microsoft 365 Data

Join our webinar, in collaboration with Veeam, so you’re not a part of the 60% of Microsoft 365 users that DO NOT have a data protection solution in place. Learn more.


Top Security and Other Concerns with Teams & Remote Workforce

In this session, Nathan O’Bryan will explore different scenarios for hybrid and work-from-home workers. We’ll cover the best practice strategies your organization should be considering to ensure security, and compliance while maintaining the appropriate levels of access for workers using a mix of company owned and BYOD devices.


Microsoft Teams: Expert Remote Workforce Best Practices Summit

Microsoft Teams has become the backbone for many enterprises; remote workplace strategies. But in the rush to implement it (and Microsoft's rush to add new features and make other changes), knowing the best ways to use (and NOT to use) Microsoft Teams to manage your remote workforce can be hard to pin down.


Microsoft Teams & Remote Workforce Management Best Practices

Remote work and hybrid work have quickly become standard over the last few years. However, what remains the same is the need to manage both the users and the tools they use to perform the work. How you manage in a remote world is far from normal. This session will cover some best practices you can implement, specifically around Teams, to help with remote workforce management.


Why Database-as-a-Service is Crucial for Enterprises

Take a peek under the hood at any given enterprise, and you’ll likely find hundreds to thousands of databases - commercial and open-source, relational and non-relational - running both on-premises and in one or more public clouds. Join Jeff Kelly, Senior Product Marketing Manager at Nutanix, to learn how Database-as-a-Service (DBaaS) can simplify and de-risk database administration, reduce operating costs, and turn databases from a blocker to an accelerator of software-driven innovation.


2022 Data Protection: Best Practices

Based on Veeam’s 2022 Data Protection Trends Report, which surveyed nearly 3,400 IT leaders and implementers of data protection around the world, this session will look at the key scenarios that are driving changes in data protection tools and mechanisms.


Best Practices for Managing and Securing Microsoft 365 Summit

Join the editors of Redmondmag.com plus independent experts in this free half-day summit that will walk you through what you need to know about best practices for managing and securing Microsoft 365. If you have anything to do with Microsoft Office 365, you don't want to miss this summit!


Microsoft 365 Management Best Practices for Enterprises

Due to the critical role Microsoft 365 has taken in most businesses' day-to-day operations, it is more important than ever to ensure that you are managing it properly and effectively. Join this session to learn the best practices for managing Microsoft 365.


Microsoft 365 Security Best Practices for Enterprises

This session examines security best practices that enterprises can use today to better protect their Microsoft 365 data. Learn more.


Incident Response: Opportunities for Automation

DevOps and Agile are commonplace practices in the enterprise today, and the advent of CI/CD pipelines has added monitoring and automation to the process, creating conduits for delivering code changes frequently and reliably. This Tech Talk applies some of the lessons learned from DevOps and Agile practices to the process of automating incident response in your organization.


7 Steps to Better Microsoft 365 Security

Microsoft 365 is the most commonly used cloud office suite in the world, helping users generate, share, and store billions of files. In order to secure those files, many companies leverage M365’s out-of-the-box security capabilities but those capabilities can vary widely by license type, and many require extensive deployment, planning, and configuration.


Coffee Talk: UC as a Service: What Is It and Why Should Enterprises Care?

UCaaS goes far beyond being just another way to communicate, and this session will highlight all the advantages enjoyed by those who have made the switch.


Why AV & EDR are Failing to Stop Ransomware and What You Can Do About it

Ransomware attacks make headlines every week. Formerly proven security tools like next generation antivirus (NGAV) and endpoint detection and response (EDR) solutions don’t stop unknown attacks. Fileless, in-memory malware, and other advanced persistent threats evade NGAV and EDR at an alarmingly high rate. This is in spite of machine learning and behavioral detection.


Protecting Your Hybrid Active Directory Environment

You're moving to Azure Active Directory (AAD) but must maintain on-premises AD for the foreseeable future. Unfortunately, the only similarities between AAD and AD is the name. In this webinar, hybrid AD security experts from Semperis will talk about the difference, the interdependencies, and connections between these two mission critical identity stores. Join us to improve security and resilience for your legacy and Azure ADs, no matter where you are on the journey.


Combating Cyberattacks in 2022: Prepare to Defend Your Active Directory

Cyberattacks and the threat of ransomware reached new heights in 2021. In this webinar, you'll hear strategies to increase your defense capabilities and ways to build greater resiliency for your Microsoft platforms. Watch now on-demand!


Zero Trust Is Hot: Here's What It Is (and What It Is Not)

Join Ian Thornton-Trump for thoughts, feelings, emotions and raw survival instincts of looking at the latest and greatest “Zero Trust” approaches and finding that they may not hold up to “the real” world of IT unless - a lot of work, a lot of effort and money is readily available.


Zero Trust Best Practices: What Enterprise IT Needs to Know About Implementation

During this second session, we will examine some of the critical steps and preparations you’ll need to take to properly implement Zero Trust.


Zero Trust Summit

Join the editors of Virtualization & Cloud Review and Redmond magazines for this free half-day virtual summit bringing together independent experts detailing what you need to know now about zero trust.


5 Key Steps to a Successful Microsoft SQL Server Database Environment and Deployment

Managing SQL Server estates is a daunting task, especially for DBAs and IT teams. In that case, this webinar will walk you through best practices and methods of automating many of these mundane tasks using Nutanix Database Solutions. Learn how these steps can help you minimize the risk of downtime, reduce costs, and ensure a well-run SQL Server deployment.


Metallic Lunch & Learn - DMaaS Tech Demo

See award-winning DMaaS in action! From driving digital transformation to fortifying ransomware response strategies, companies of every size are leaning into Data Management as a Service (DMaaS) to safeguard their critical business data.


Powering the Modern Workplace with Zscaler and Microsoft

Over the next decade, 40% of the S&P 500 companies will cease to exist due to competition. Almost every business is aggressively adopting cloud, increasing their use of SaaS apps and allowing private apps to no longer run solely in the datacenter, but also the public cloud. Join us in helping your people and teams thrive, protect sensitive data, and propel the business forward and take a dive deep into the integrations between Microsoft and Zscaler.


Ransomware: Secure Backup is your last line of Defense

Veeam® Software is secure by design. Having a reliable backup can be the difference between downtime, data loss and paying a costly ransom. Veeam Software includes instant recovery at scale in case of a massive outage. Plus, our software‑defined approach means there is no lock‑in into proprietary hardware and it works with your existing architecture, both on‑premises and in the cloud.


Veeam Backup & Replication v11 Demo Video – Ransomware Protection

Stop ransomware in its tracks, ensure backup compliance and safeguard your recoverability with immutability for your backup copies.


The War on Ransomware Continues: Best Practices with V11

The ransomware threat continues to put data and business reputations at risk. In this webinar, join Rick Vanover from Veeam® to share the latest tips for beating ransomware by assessing the threatscape, evaluating steps you can take to protect your data and learning what's new in Veeam Backup & Replication™ v11 to keep your data protected.


Coffee Talk: Top Hybrid Work Trends for 2022 and Beyond

In this first “Coffee Talk” brought to you by our editors, we’ll discuss the key areas of change and the challenges IT pros can anticipate having to solve as we continue to evolve this new way of work. Join Senior Resultant Howard M. Cohen as we explore this brave new communicative world!


Decoding why SASE is SSE-first

As businesses prepare to open up in the post-pandemic world, they've realized that conventional ideas of corporate perimeters have been altered permanently. Watch this webinar to learn about Cybersecurity challenges in the post-pandemic world, SASE: The long-term solution, and more.


5-min demo: SaaS Data Protection

Gain control over your Office 365 data! Within all SaaS platforms including Office 365, it is your organization’s data — you control it — and it is your responsibility to protect it. Veeam® Backup for Microsoft Office 365 eliminates the risk of losing access and control over your Office 365 data at scale, including Exchange Online, SharePoint Online, OneDrive for Business, and Microsoft Teams — so that your data is always protected and accessible.


Demo Video: Protect Your Data

For most organizations, what hinders data availability is failed backup and recovery. Modern services and cloud acceleration are putting a strain on legacy data protection solutions. We see upwards of a 60% failure rate in data recovery due to failed backup and recovery processes. But even with the most modern data protection, cyberthreats are still one of the biggest security threats for any enterprise organization. In 2020, ransomware attacks grew by 700% alone. However, with modernized protection, 96% of organizations that were affected by ransomware cut their average recovery costs down to $5,000, with 76% of companies not paying anything at all. How? Let’s look at an example of how easy it is to protect your data with Veeam.


Best Practices for Securing Active Directory and Azure AD

In this session, you will learn about things that you can be doing today to improve the security of Active Directory and Azure AD. Learn more.


Securing Azure AD & Active Directory Summit

Join the editorial staff of Redmondmag.com and independent experts who will make sure IT managers have what they need to know to protect their enterprise. Learn more.


Azure AD & Active Directory: Top Security Issues in 2022

Join Ian Thornton-Trump as he looks at the evolution of Windows AD from its earliest days to the security solution, configuration and management tool it has become.


Technical Deep-Dive into #1 Office 365 Backup

Join us for this technically‑focused presentation, and learn about the infrastructure components, and how simple it is to use Veeam® Backup for Microsoft Office 365 — from the early planning stage all the way to performing restores.


VIDEO: Best Practices on Microsoft 365 Backup

Watch this free technical product demo to get an in depth look into the best practices for using Veeam® Backup for Microsoft 365.


DEMO: Microsoft Teams Backup

Although Teams data has its own basic retention, Microsoft doesn’t fully protect against accidental deletion or security threats that lead to data loss, nor does it enable long-term retention for compliance or regulatory purposes. Whether it’s Teams or your entire Office 365 environment, it's your data — you control it — and it is your responsibility to protect it.


Recorded Demo: AWS-native Backup with Veeam

Watch this interactive session to learn more about how NEW Veeam Backup for AWS delivers AWS-native backup and recovery that is both cost-effective and secure.


Identity Management for Attack Prevention

As IT continues to evolve as a result of work from home, digital transformation, cloud adoption, and other trends, identities are a critical element of protecting the organization as a whole. At the same time, identity management is becoming increasingly complex and unified identity security is often elusive.


5 Must-Haves for the Best AWS Backup and Recovery

A robust data protection solution is a vital component in your organization's tool set. Whether you need to restore files or application data, or recover entire workloads, your data protection solution must provide these capabilities with minimal effort and allow you to meet your operational objectives.


Cloud Data Protection & Disaster Recovery Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSinsider.net have created this free, half-day virtual event pulling together independent experts who will walk you through real-life techniques, best practices and more for helping you keep your cloud data protected and truly recoverable in 2022 and beyond. Learn more.


Expert Cloud Data Backup & Recovery Best Practices

In this session, Karen Lopez covers best practices for modern data recovery and shares stories of worst practices just to keep it real. Learn more.


The New Cloud Data Security Best Practices

In this session, you will learn about some of the tools available across public cloud providers and third-party software vendors that can help you identify risks, limit exposure, and help you survive internal and external threat actors. Learn more.


Leveraging AIOps and Service Intelligence for Active Incident Response

Artificial intelligence for IT operations (AIOps) combines big data and machine learning to automate IT operations processes, including event correlation, anomaly detection, and causality determination. In this Tech Talk veteran technology journalist John K. Waters talks with Prashant Darisi, General Manager and Vice President of Customer Experience Management in the Global Solutions group at Everbridge.


Microsoft 365 & Teams Heading into 2022 Summit

You won't want to miss this free, half-day summit brought to you by the editors of Redmondmag.com to catch you up on what you need to know about Microsoft 365 & Teams heading into the New Year. Learn more.


Digital Transformation in 2022 Summit

Don't miss this half-day summit brought to you by the editors of Virtualization & Cloud Review, Redmondmag.com, PureAI.com, AWSInsider.net, MCPmag.com and ADTmag.com where you'll learn about how digital transformation has transformed for 2022 and how you can take steps now to take advantage of it in the coming year and beyond. Don't miss out!


The Digital Transformation Landscape in 2022

In this session, we will discuss strategies that IT professionals can use to properly define digital transformation and develop an action plan to implement it. Learn more.


Key Digital Transformation Best Practices

In this session, Senior Resultant Howard M. Cohen will take you through some smaller digital transformations, finding new ways to make small but meaningful process improvements through more innovative applications of available technologies. Learn more.


Data Protection Strategies in 2022 for a Hybrid Multi Cloud World

In this educational webcast, join industry experts as they discuss the latest research on what is driving data protection strategies in 2022 including tips on how to get started with Microsoft Azure and Veeam®.


Best Practices for using the Cloud for Backup, Disaster Recovery, and Long-term Retention

Adrian and Greg will discuss trends, techniques and best practices in using optimized cloud object storage for backup, disaster recovery, and long-term data retention.


How To Turn Your Email Signature Pains Into Business Gains

Managing email signatures across an organization can be complex and cumbersome. Ensuring consistent branding with professional and consistent email signatures for all users and devices is often an ongoing IT task with little return.


Managing & Securing End User Computing Summit

Come watch the editors of Redmondmag.com and Virtualization & Cloud Review at this half-day event featuring independent experts to review best practices for securing your remote workforce.


Securing the Remote Workplace

There is a new security threat being exploited. In addition, there are various regulatory requirements that need to be met to ensure successful implementations.


Top Multi-Cloud Trends Impacting Enterprise IT

In this session we’ll explore why companies are becoming so much more deliberate in their approach to multi-cloud, including: Enjoying the best of all clouds, The importance of avoiding vendor lock-in and more! Learn more.


Multi-Cloud Trends to Watch in 2022 Summit

Join us for this half-day summit that will walk you through the security threats you can expect to face in the new year plus the real-world best practice advice you can implement right way. Learn more.


Multi-Cloud Best Practices Heading into 2022

As cloud adoption has grown over time, many companies have solutions spread across different cloud vendors and on-premises. Multi-cloud can be very effective, enabling you to leverage the best of all options, however it must be implemented correctly to prevent issues.


Digital Resilience: Is Your Company Ready?

In this live Tech Talk, veteran technology journalist John K. Waters talks with Bart Rys, Director of Business Solutions in the Everbridge Global Center of Excellence, about digital resilience.


Securing Public Sector Data in the Cloud

In this webinar, we’ll discuss the role data protection plays in minimising ransomware risk, with a focus on how public sector organisations are harnessing it to protect their cloud data, and plan to recover if the worst happens.


Ransomware 3.0: We Thought It Was Bad and Then It Got Even Worse

Attend this presentation to learn how ransomware is evolving to inflict maximum damage and more importantly how to protect yourself and your organization.


Cloud Security 101: Top Enterprise Cloud Setup & Configuration Best Practices

Join us as a Cloud Security Architect covers the fundamental practices every enterprise must consider for comprehensive cloud management and security. Learn more.


Getting Started with Cloud Security Summit

What are the current best practices for the modern IT enterprise? Find out in this half-day summit from the editors of Virtualization & Cloud Review.


Ransomware: Top Threats and Best Practices Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSinsider.net for this half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practice advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Learn more.


Office 365 Backup Checklist for 2022

More organizations are protecting Office 365 than ever before, is yours one of them? Kick-off 2022 with an insightful checklist you can use as you evaluate third-party vendors for your Office 365 backup strategy.


Why Machine Identity Management is Essential to Establish Zero Trust

In this webinar, we'll discuss why machine identity management is a crucial component in establishing a robust Zero Trust architecture, and how you can successfully gain better visibility over machine identities and automate the process of managing them.


Top 10 Microsoft 365 Security Best Practices Every Organization Must Implement

In this session, we will look at the top 10 things you should consider right away to make your Microsoft 365 environment as secure as possible! Learn more.


Microsoft 365 Security: Top Installation, Configuration and Management Mistakes and "Gotchas"

During this 60-minute session, Nathan O’Bryan (Microsoft Certified Solutions Master: Messaging/5x Microsoft Most Valuable Professional) will dive into the EM+S E5 suite and the features it brings to help secure your Microsoft 365 deployment. Learn more.


Microsoft Office 365 Security Summit

Join the editors of Redmondmag along with Microsoft 365 experts for this informative and free half-day summit on Microsoft 365 Security: Top Installation, Configuration and Management Mistakes and "Gotchas" and the top 10 Microsoft 365 Security Best Practices Every Organization Must Implement. Learn more.


Hybrid Clouds/Multi-Clouds in 2022 and Beyond Summit

It's a hybrid-cloud/multi-cloud world. Find out the best tips, tools and best practices to support your new infrastructure.


The Silent Scream of Every Network: The Horror that is Active Directory Security

Join us and let Derek Melber, 17X Microsoft MVP show you how to operate on the beast, making it capable of withstanding the constant attacks. Learn more.


How to prepare for the upcoming Microsoft 365 price increase

Starting March 1, 2022, Microsoft will raise the fees of three products. For an organization with 20,000 employees, this M365 E3 uplift would cost an additional $960,000 per year. And, not actively measuring and managing these licenses often results in two costly challenges.


Administrative Delegation and Policy Control in Microsoft 365

With security breaches on the rise, it is more important than ever for an organization to minimize its risk by separating administrative responsibilities. Even so, the Microsoft 365 native tools make it difficult to delegate administrative tasks at a granular level. This becomes far more challenging in multi-tenant environments.


What's Ahead for Your Remote Workforce in 2022 Summit

Join the editors of Redmondmag.com and Virtualization & Cloud Review have pulled together this free half-day summit promoting what you need to know heading into the new year -- top trends and best practices that will keep your new remote workforce infrastructure not only secure and compliant but functional and cost-efficient into 2022 and beyond. Learn more.


Remote Workforce for Enterprises for 2022: A Look Ahead

In this session, we’ll take a look ahead at where many of the technologies we already use are heading, and what new tools may soon become available to help companies better roll with the momentum the Covid-caused work-from-home new normal has created. Learn more.


New Remote Workforce Best Practices for 2022

This informative talk will focus on practical steps that IT pros can take right now to take the pain out of working remotely. In this session, you will learn how to identify the biggest challenges that your organization is facing with regard to remote work, what IT’s priorities should be at this moment in time, and more! Learn more.


Back to Basics – A Practical Guide to Following the NIST Framework for Ransomware Risk Management

In this webinar we will discuss the NIST Cybersecurity Framework for Ransomware Risk Management with a focus on what the guidance includes, how this guidance compares to other options, how to detect where your program falls short, and actionable advice on where to start and which actions will yield the most benefit.


Modern Ransomware Defense & Remediation Summit

Find out the best way to get your defense plan in place with this free half-day summit brought to you by the editors of Virtualization & Cloud Review, AWSInsider.net and Redmondmag.com. Learn more.


Evolving Digital Operations: People, Process & Technology Summit

Using automation as part of your digital transformation strategy is key for every IT manager in 2022 -- but do you know where to start? Or how to be successful? Do you have the tools to get you where you need to go?


The CI/CD Pipeline: Correcting Misconceptions and Avoiding Missteps

In this live Tech Talk, veteran technology journalist John K. Waters talks with Stephen Walters, solution architect at xMatters, a subsidiary of critical event management company Everbridge, about the CI/CD pipeline.


Enterprise Cloud Backup & Recovery in 2022 Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSInsider.net for this free half-day summit along with independent experts who will help get you up to speed with real-world tools and techniques you need to know about Cloud Backup and Recovery in 2022. Learn more.


Take Charge of Your Microsoft Office License Renewal

Learn all about how to optimize your Microsoft licenses for the upcoming renewal increases.


Managing Your Microsoft Dynamics 365 Data: Retain, Recover, and Be Ransomware-Ready

Microsoft Dynamics 365 is the heartbeat of your business, bringing together data and insights to better run day-to-day operations. But as data loss threats continue to trend in the wrong direction, there’s never been a better time to consider third-party data backup.


Top Best Practices for Windows Enterprise Security Heading Into 2022

Join Ian Thornton-Trump CD for a look at all the security goodness built into the Windows Operating system to thwart malicious attacks and dive into the Windows security ecosystem and discuss his top security tips and system hardening ideas.


Microsoft Security in 2022 Summit

The editors of Redmondmag.com have created this half-day summit to get you up to speed on exactly what's happening with Microsoft's Security Roadmap plus give you tips, advice and best practices you can use right away to secure your Windows-based ecosystem. Learn more.


Understanding and Protecting Kerberos – The Soft Underbelly of Cybersecurity

With the advent of Active Directory more than 20 years ago, the Kerberos protocol was a game-changer in terms of security, unification, and moving AD into the realm of identity management. Learn more.


2022 State of IT & Digital Transformation Leadership Summit

Don't miss this expert-packed, two-hour summit created for CTOs, CIOs, IT directors, and IT professionals looking for technology trends that will impact them and their market in the new year. Learn more.


Identity & Access Management Summit

In this virtual summit, we look at top issues surrounding IAM, supplementing Active Directory and Azure AD, including SaaS authentication, changing compliance requirements and emerging approaches such as CARTA, continuous and adaptive risk and trust assessment. Learn more.


Identity & Access Pain Points: Top Issues from AD Integration to SaaS Control to Compliance

During this 60-minute session, Nathan O’Bryan (Microsoft Certified Solutions Master: Messaging/5x Microsoft Most Valuable Professional) will share his top identity management considerations and explain how these choices can have a lasting impact on your Microsoft 365 deployment. Learn more.


Identity & Access Management Best Practices: What IT Pros Need to Know Now

Join us to learn the best practices for establishing an IAM architecture that will work with your existing infrastructure and across clouds. Learn more.


Mastering Hyperconvergence Summit

Don't miss this free half-day summit brought to you by the editorial staff of Virtualization & Cloud Review and Redmondmag.com who will bring together independent HCI experts for to walk you through tips, advice, best practices and more that will help you master hyperconvergence. Learn more.


Top Hyperconvergence Infrastructure Tips

In this session, you will hear from two industry experts regarding best practices on managing and maintaining HyperConverged Infrastructure. Learn more.


Real-World HCI Best Practices

In this session, you will learn essential information about keeping your HCI infrastructure running and looking at future-proofing your designs. Tune into this session for expert industry advice for two of the worlds leading experts in HyperConverged Infrastructure.


DevSecOps: Securely Navigating a Shifting Threat Landscape

In this live Tech Talk, veteran technology journalist John K. Waters talks with DevSecOps expert Stephen Walters, solution architect at xMatters, a subsidiary of critical event management company Everbridge, about DevSecOps best practices. Learn more.


Incredible Email Hacks You'd Never Expect

In this webinar Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, explores many ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Learn more.


Part II: Optimizing and Securing Communications in the Hybrid Workplace

This is the secont of a two-part podcast featuring experts from unified communications platform provider RingCentral.


Ransomware advice webinar: Hear from experts

To beat ransomware, preparation is key. In this session, Rick Vanover from Veeam® and Krista Macomber, senior analyst at Evaluator Group, will share advice on ransomware protection, so that you will be better equipped to handle a ransomware attack on your organization.


Cloud Protection Trends: Expert Insights

Join Veeam’s vice president of product strategy, Jason Buffington and vice president of enterprise strategy, Dave Russell as they share key research insights from the NEW 2021 Cloud Protection Trends Report to help organizations of all sizes learn what to consider when adopting cloud based production platforms and how to protect them.


How to Create a SIEM Framework That Aligns With NIST Guidelines

Join our webinar where our SIEM expert talks about how you can align your SIEM framework with NIST guidelines. Learn more.


Best Practices for Cloud Storage, Backup & Recovery Summit

Don't miss this half-day summit where you will learn best practices and insights you need to make sure, should the worst happen (and it very well could), you can come back up with the click of a button. Learn more.


Best Practices for Managing, Securing and Recovering AWS

Join our expert solution architect to discuss a comprehensive approach to management and security of AWS. Learn more.


AWS Architecture & Configuration Best Practices

In this session, we'll go through a few cloud architectures and explain why these design choices were made, and discuss a few best practices around application scalability, security and resilience. Learn more.


Expert AWS Best Practices Summit

Hear from experts who live and breathe AWS security, performance and recoverability and the editors of AWSinsider.net and Virtualization & Cloud Review in this half-day summit packed with tips and real-world advice.


Why Office 365 Backup is Essential

With Office 365, It's your data — you control it — and it is your responsibility to protect it. Join the experts to find out why Office 365 backup is so essential! Learn more.


Microsoft 365: A Look Ahead to 2022 Summit

In this summit, join the editors of Redmondmag.com plus independent experts to learn everything you need to know about changes coming to Microsoft 365 in 2022! Learn more.


What's New in Microsoft 365: Top Features You Might Have Missed

Keeping up with all the changes and new features in Microsoft 365 is a constant challenge. Join Nathan O’Bryan in this session as he covers some of the new features and functionality that have been announced for Microsoft 365. Learn more.


What's Ahead & Best Practices for Microsoft 365 in 2022

In this session we'll help you with the cliff notes brief understanding of "what's coming and what's new for this next calendar year" and catch you up on Microsoft 365 Best Practices. Learn more.


Hacking Your Organization: 7 Steps Cybercriminals Use to Take Total Control of Your Network

In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the "Cyber Kill Chain" in detail to show you how a single email slip up can lead to the total takeover of your network. Learn more.


Veeam Platform Updates: Protect Cloud, Virtual, Physical environments

Watch this webinar for a full run down of the latest on the Veeam Platform products with a demo of some of the newest capabilities, including native and advanced protection for AWS, Azure and Google Cloud Platform, and more! Learn more.


Your Hybrid/Multi-Cloud Infrastructure & Data: Wise Decisions for 2022 and Beyond

Whether its decisions about how to manage backups, or how to design high availability solutions in a hybrid cloud scenario, join us to learn about how to ensure you have availability, security and data integrity. Learn more.


Hybrid & Multi-Cloud Data & Database Best Practices

Whether you are on platform as a service, or infrastructure as a service, or in a hybrid model, you will face new and different challenges when moving to the cloud. Join this session to learn about how to optimize your databases in modern infrastructure. Learn more.


Hybrid Cloud & Cloud Database Preparation for 2022 and Beyond

Attend this free, half-day virtual summit brought to you by the editors of Virtualization & Cloud Review, Redmondmag.com & AWSInsider.net to learn what you need to know now about performance, best practices and more for managing your hybrid cloud infrastructure and data thanks to insights, advice and insights brought to you by leading independent hybrid cloud experts. Learn more.


Simplifying Azure data protection and migration with Veeam

Simplify data management between on-premises and public cloud environments and lower storage expenses with Azure-native backup and recovery, built for simplicity, scale, savings and security.


Cloud Security & Recovery Summit

What are the top threats after your cloud today and heading into 2022? How can you make sure your cloud infrastructure and data remain as safe as possible, and easily recoverable if the worst happens? Join the editors of Redmondmag.com and Virtualization & Cloud Review for this free half-day summit. Learn more.


Top 10 Cloud Infrastructure & Data Best Practices

In this session Top 10 Cloud and Infrastructure and Data best practices you will gain valuable insight into protecting your cloud from our expert speakers. Learn more.


The Cloud Security Threat Landscape Heading Into 2022

Join Ian Thornton-Trump CD for a look backward, a look forward and a stark warning about the biggest threats and the biggest opportunities for organization’s digital transformation efforts. Learn more.


Part I: Optimizing and Securing Communications in the Hybrid Workplace

This is the first of a two-part podcast featuring experts from unified communications platform provider RingCentral.


Modern Tips for Microsoft 365 Tenant Migrations

In this webcast, we will explore the top 5 tips for Tenant-To-Tenant migrations, including methods to prepare, migrate, coexist, and manage in this changing world. Learn more.


How to Painlessly Deliver and Scale Company Email Signatures

How do you address your organization’s growing (and evolving) email signature needs n without making it a full-time job? Learn more.


Masterclass: Simplifying Identity and Access Management with AD360

In this webinar we'll discuss in-depth a platform that can take care of all your IAM needs. Join to learn how to efficiently evaluate an IAM platform, see how ManageEngine AD360 can help you tackle IAM challenges across AD, Exchange, and Microsoft 365 environments and more! Learn more.


What About the Email Archive? Modern Strategies for Migration

Join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Jason Jacobo from Quadrotech/Quest, for this educational webcast as they discuss why you can't just start migrating your archive, what archive data should and shouldn't be migrated and what your options are when it comes to migration strategies. Learn more.


Maximizing Microsoft 365 Summit

Join the editors of Redmondmag.com plus independent experts in this half-day summit that will walk you through what you need to know about configuration, optimization, security, backup tips and tricks plus more. Learn more.


Top Tips for Managing and Optimizing Microsoft 365

Join us to learn the top tips for managing your Teams environment and getting the most out of your deployment beyond just keeping Teams running for your users. Learn more.


The Top 10 Actions Every Organization Should Take to Protect their AD from Attacks

Join us to learn the 10 actions you can take that will greatly increase your chances of fighting off attackers and building your resilience. Learn more.


Migrating to Windows 11: It’s All About the Preparation

What does it take to simplify the process of migration to achieve a secure and productive Windows 11 environment when you’re done? Learn more.


Top Security & Ransomware Threats Summit

From the latest threats to the best recovery methods should the worst happen, this half-day summit will make sure you’re armed and ready if (when) your enterprise falls under attack. Learn more.


The Top 10 Ransomware Attacks Enterprises Need To Worry About

Join us as we take a page from the Facts of Life and look at the impact law enforcement is having on ransomware attacks and the groups that are still a threat.


Top Steps Every Enterprise Must Take NOW to Protect Themselves from Ransomware

Join two of the industry’s top experts on Cyber Security and Ransomware as they discuss how to take a proactive approach against Ransomware today. Learn more.


Why Disaster Recovery Will Matter Even More in 2022

Join us as we discuss the dynamics of a new-age disaster recovery program that addresses a mobile workforce, the threat of ransomware, the sudden absence of key people, and how to define viable alternatives in the New Year. Learn more.


Enterprise Disaster Recovery Summit for 2022 and Beyond

Join the editors of Redmondmag.com and Virtualization & Cloud Review, plus their hand-picked independent experts, as they walk you through the real-world advice that your organization is going to need to make sure you're truly protected in the year ahead with a disaster recovery and backup plan that is truly recoverable and that is also manageable and secure. Learn more.


What's New in Microsoft Teams for Security, Performance & Management

Join us to learn the latest updates to Microsoft Teams that you need to know about in order to get the most from your Teams deployment. Learn more.


Microsoft Teams: Security, Performance & More Summit

Join Redmondmag.com and independent Microsoft Teams experts for this completely free half-day summit to bring you real-world guidance you can use today to make your Microsoft Teams installation more secure, better performing and much easier to manage. Learn more.


Top 10 Microsoft Teams Best Practices Every Organization Needs To Implement

Join us to learn the top Microsoft Teams deployment considerations and an explanation on how these choices can have a lasting impact on your Teams deployment. Learn more.


Why office 365 Backup is Essential for the Modern Business

There is a common misconception that Microsoft fully backs up your data on your behalf, but the reality is that this is YOUR responsibility. Join NewCloud, an Otava Company and Veeam as we discuss Backup for Microsoft Office 365 and how it can help your business.


Cloud Data Protection for 2022 Summit

Don't miss this important look ahead at cloud data protection strategies that you need to know brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com. Learn more.


Modern Cloud Data Protection Best Practices

Join us for a look at what practices you and your organization should be implementing in your cloud and hybrid data solutions including Confidential Computing & Zero Trust, Data Security Features, Anti-tamper Features, and more! Learn more.


Top Threats to Your Cloud Data Landscape in 2022

Join Ian Thornton-Trump CD, CISO for Cyjax Ltd as he outlines how we arrived into a post-pandemic digitally transformed landscape and the top threats to SaaS and hosting services. Learn more.


Top 10 Things You Should Never Do with a Multi-Cloud Architecture

Join our experts to gain deep insight on the top 10 things you should never do with a Multi-Cloud Architecture. Learn more.


Hybrid Cloud/Multicloud Security Summit

Don’t miss this half-day summit brought to you by the editors of Redmondmag.com, Virtualization & Cloud review and AWSinsider.net will bring together independent cloud security experts that will give you real-world information you can use to make sure your cloud data is truly secure. Learn more.


The New Generation of Hybrid Cloud Security Best Practices

Join us to learn the best emerging practices for ensuring the optimal security posture for both the public and private cloud as part of an enterprise hybrid cloud platform. Learn more.


Understanding the New Remote Workforce

Join us to learn how the key to the remote workforce of tomorrow is to produce productivity and performance through people, platforms, applications, programs, processes, and policies. Learn more.


Remote Workforce Summit

Join the editors of Redmondmag.com and Virtualization & Cloud Review along with independent experts who will share their insights on what you need to do NOW to make sure your remote workforce and digital workplace is protected for the future. Learn more.


Top 10 New Best Practices for a Secure Remote Workforce

Because remote work was put into place so quickly, the solutions that were rapidly adopted probably aren’t as secure as they might be if the organization had been able to take its time. Join us in taking a step back to consider how things could be improved – especially with regard to security. Learn more.


Incorporate Zero Trust and SASE into your IAM strategy to secure your hybrid workforce

Join us as we discuss the security challenges involved in catering to a hybrid workforce, how Zero Trust and Secure Access Service Edge should be at the forefront of your IAM strategy and how to keep up with the key trends to build a strong IAM framework for your organization. Learn more.


A Master Class on Cybersecurity: Roger Grimes Teaches Data-Driven Defense

Join Roger Grimes for this thought-provoking webinar where he’ll share the most common reasons for data breaches and a data-driven approach to determining your organization’s specific weaknesses. Learn more.


Cloud Infrastructure in 2022 Summit

Join this summit to find out what your top infrastructure and cloud security concerns should be for the rest of 2021 and heading into 2022. Learn more.


Architecting Security for the Cloud

Join us as an expert reviews the importance of not relying on only one control, and what additional measures can be used to protect you, or at least mitigate, against future problems.


Top 10 Tips for Cloud Infrastructure Heading into 2022

Join the experts as they discuss the top 10 tips for Cloud Infrastructure in 2022 surrounding networking, site connectivity, security, administration and more. Learn more.


Remote Mobile Collections for Corporate Investigations

When gathering crucial data from employees’ mobile phones, are you having to ship equipment or struggling with lengthy support sessions with custodians to guide them through the process?


eDiscovery Investigations in the Age of Remote Work

With remote mobile collection, you can gather insights from across a variety of data sources and collect only the data you need to protect employee privacy during eDiscovery investigations.


The New Best Practices for Microsoft 365 Security, Backup & Recovery

In this Webinar, you will learn a number of data protection strategies particularly with regard to data backups and security. Learn more!


Microsoft 365 Security, Backup & Recovery Summit

Join the editors of Redmondmag.com and Virtualization & Cloud Review for this free half-day summit where they'll bring you together with independent experts who work with Microsoft 365 security day-in and day-out. Learn more.


Top Microsoft 365 Security, Backup & Recovery Mistakes

Join us as we look into the common mistakes or assumptions related to making sure your data in Microsoft 365 is safe and how to correct them. Learn more.


Negate Cyber Attacks: Secure Vulnerabilities, Misconfigurations, Privileged Account Attacks

The steps of a cyber attack against an enterprise are always the same. The exploits attackers leverage are nearly the same as well. Therefore, it is due time that we start protecting our networks with more intelligent approaches. Let 17X Microsoft MVP Derek Melber give you a clear path to a more secure network. Learn more.


Defending Against Active Directory Attacks That Leave No Trace

In this session, an identity and access management expert will walk you through some attack techniques that bypass traditional monitoring solutions. Learn more.


AWS Cloud Security Summit

Are you prepared to manage your entire AWS cloud ecosystem securely? Make sure you're truly secure with this free half-day summit. Learn more.


AWS Security, Backup and Recovery Best Practices

Join us to learn how to protect yourself against ransomware and the latest security threats as we discuss AWS Architectures designed for data protection, backups, and disaster recovery. Learn more.


Threat Detection Thursday — Life of a Zero-Day in the BlueVoyant SOC

Join this panel Q&A commenting on the lessons learned from the angles of Improved Detection, Threat Hunting, and Accelerated Response. 


Ransomware: All About the Benjamins

2021 has been a weird one for ransomware. We've seen more ransomware groups than ever either taken down by law enforcement or decide to "retire" but ransomware attacks have not slowed down at all. Learn more.


Best Practices for Cloud Storage, Backup & Recovery Summit

Don't miss this half-day summit where you will learn best practices and insights you need to make sure, should the worst happen (and it very well could), you can come back up with the click of a button. Learn more.


Fuel Digital Transformation: Changing Document Productivity Challenges into Opportunities

The shift to a hybrid workforce and digital workspaces has caused many organizations to heavily rely on PDF documents, e-signatures and workflows to replace manual in-office processes that no longer meet current business needs. Learn more.


Challenges and Best Practices for Protecting Azure Kubernetes Services

Enterprises all over the world are seeing more mission-critical cloud-native applications deployed on Kubernetes. Learn more.


Transforming Cloud Security with SASE

SASE is a security framework designed to counter threats that thrive in an environment which is invisible and distributed. Learn more.


Modernizing Privileged Access Management: Stopping Cyberattacks in Their Tracks

How can you implement privileged access management where both flexibility and effectiveness are achieved? Learn more.


Microsoft 365 and SharePoint Online Best Practices Summit

Don’t miss this summit that will keep you ahead of those changes and give you real-world insights you can use the same day to improve your Microsoft 365 and SharePoint Online installations. Learn more.


Top 10 Security & Backup Tips for Microsoft Office 365 and SharePoint Online

Join us for this session to learn a number of best practices that can enhance SharePoint’s performance. Learn more.


Best Practices for Managing & Optimizing Microsoft 365

Join us for this session to learn a number of best practices that can enhance SharePoint’s performance. Learn more.


Why it’s Time to Revisit Your Teams Strategy

This Webcast explains why it’s time to take a step back and take a critical look at your organization’s unified communications strategy, especially as it relates to Teams. Learn more.


How You Can Extend the Cloud Perimeter Beyond the Microsoft Cloud

During this webinar, we'll be unpacking some of the deeper integration potential around MCAS and your 3rd party SaaS and PaaS apps. Learn more.


Multi-Cloud Security Summit

Join us to discover top cloud security threats and what you can do to secure your multi-cloud and hybrid cloud environment in the face of today's top threats. Learn more.


Top Hybrid/Multi-Cloud Security Threats

The key takeaways from this presentation will help security and IT teams support your organization’s business objectives while at the same time continuing to maintain a robust security and compliance posture. Learn more.


Security Best Practices for Hybrid/Multi-Cloud Environments

This session outlines strategies and tactics for keeping our hybrid cloud environments safe from ever-increasing threats. Learn more.


An Admins Guide to Secure and Efficient Microsoft Teams Management

In this webinar, we're going to provide some of our favorite tips and guidance to help you best manage Microsoft Teams. Learn more.


Digital Resiliency Strategies for Application Infrastructure in a Hybrid Cloud World

Application delivery infrastructure and security have become more complex. Learn more.


Top Microsoft Teams Best Practices for Today's Workforce

Join Senior Resultant, Howard M. Cohen, as he shows you how to produce your best results by leveraging Teams best practices. Learn more.


Maximizing Microsoft Teams Summit

Join the editors of Redmondmag.com and independent Microsoft Teams experts for this free, half-day summit filled with real-world tips, advice and best practices to help you get the most out of your Microsoft teams installation, no matter the size of your organization. Learn more.


Expert Insights for Maximizing Your Microsoft Teams Installations

Join this session as we look at ways you can maximize some of the other benefits Microsoft Teams has to offer. Hopefully, you'll come away from this session with at least one new piece of functionality within Teams that you can take back to your organization to help you get even more from platform! Learn more.


Veeam CDP: Tips for Lightning-Fast Recovery

In this webcast, we will share the latest tips and tricks for implementing this new capability for those critical workloads that require near-zero Recovery Point Objectives (RPOs). Learn more.


Understand the Differences Between Traditional Endpoint and Cloud-Based Device Management

Sign up for this webcast and you’ll come away with a clear understanding around system and licensing requirements, and talking points to convince your internal stakeholders of the shift. Learn more.


Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim?

After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Learn more.


Cloud Data Protection Best Practices for AWS & Azure

Join us for the second session of summit as you will learn about the options you have, their cost impact and structure, and finally best practices for securing your environment. Learn more.


The Top Ransomware Threats You're Facing Right Now

Join us for the first session of summit to learn how ransomware groups are going after the cloud with the same ferocity they have been attacking local networks and learn what you need to do to protect yourself and your cloud providers. Learn more.


Ransomware & Cloud Data Protection Summit

Join us for this half-day summit that will bring together independent ransomware and cloud data security experts to give you real-world, practice advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Learn more.


The European Union's Recommendations to Prevent Cyberattacks on SMEs

After identifying and analyzing the cybersecurity issues faced by SMEs post-pandemic, the EU has developed recommendations that could help SMEs improve their cybersecurity posture. Learn more.


How to Create a Unified Threat Hunting Experience Across Security Portals

This webinar is for you if you’ve been comfortable with the old portal but want to know more about the new environment. Learn more.


Pain Points: When to Consider Switching or Evolving Your Cloud Architecture

Please join us for this session as we discuss tips on how to make your cloud usage more efficient! Learn more.


State of the Cloud Art: The What, When and Why of Public vs. Private vs. Hybrid vs. Multi-Cloud

Remember when managing your network or data center meant constantly updating, upgrading, and shopping for new hardware and new software to constantly keep making your infrastructure better and better? Learn more.


Choosing Your Cloud Summit

Attendees of this Redmond and Virtualization & Cloud Review virtual summit will find out the latest on the key emerging differences of each major approach and for ideas from experts to get more business value out of their architecture. Learn more.


Modern Cloud Data Protection Summit

Join the editors of Virtualization & Cloud Review and Redmondmag.com as they bring together experts in the cloud and Infosec world to make sure their data stays secure in their modern cloud infrastructure. Learn more.


Modern Best Practices for Cloud Data Protection, Collaboration & Compliance

Join IT industry veteran Howard M. Cohen for an in-depth examination of best practices around managing both your people and your tech to achieve maximum security, and maximum regulatory compliance, too! Learn more.


Top 10 Threats to Your Cloud Data in 2021

Join Ian Thornton-Trump CD for a blunt assessment of the ten threats to your cloud data, how Digital Transformation projects can derail organizational security and how to introduce new attack surfaces for malicious actors to pray upon. Learn more.


Integration Between Microsoft’s EDR Technology and Incident Response Across the Productivity and Collaboration Layer

Join this webcast and you’ll walk away understanding how to balance the needs around organizational security with your user’s quality of work life. Learn more.


Ransomware Defense & Recovery Summit

Join editors and experts of Virtualization & Cloud Review to find out what you need to know to defend, protect and recover when ransomware comes after you. Learn more.


How to Reduce Alert Fatigue, Optimize Logs, and Concentrate on High Value Sources of Information

Join us for this webcast as we discuss Attack Surface Reduction, creating valuable Identity Protection Policies, and managing your end user’s experience in the process. Learn more.


#1 Office 365 Backup: Technical Deep Dive

Join this webcast and learn about the infrastructure components, and how simple it is to use Veeam Backup for Microsoft Office 365 — from the early planning stage all the way to performing restores. Learn more.


Implement DMARC the Right Way to Keep Phishing Attacks Out of Your Inbox

​​​​​​​Get the details you need to know now to protect your organization from phishing and social engineering attacks. Learn more.


Expert Hybrid Cloud Data Tips & Infrastructure Best Practices

Join us as Howard M. Cohen examines how to approach data management and protection in today’s hybrid environments. Learn more.


Top Hybrid Cloud Data Dos and Don'ts

Join this session of summit to learn about networking, authentication, security, and monitoring concerns, and techniques for resolving them. Learn more!


Hybrid Cloud Data Summit

To help guide you the editors of Virtualization & Cloud Review, AWSinsider.net and Redmondmag.com have teamed up with independent cloud experts to show you how architecture, best practices, security protocols, new tools and much more can make your job managing these systems so much easier. Learn more!


Best Practices for Implementing, Managing and Optimizing Office 365/Microsoft 365

This informative presentation provides practical tips that administrators can use to make sure that they deploy Microsoft 365 in a way that truly meets the organization’s needs. Learn more.


Top Security Concerns Every Enterprise Must Know for Office 365/Microsoft 365

This session will provide expert advice and insight on optimizing and securing your organization’s Office 365 infrastructure today and preparing and upgrading it for tomorrow. Learn more.


Microsoft Office 365 for Enterprises Summit

This half-day summit brings together the editors of Redmondmag.com plus independent experts to show IT pros how they can maximize Microsoft Office 365 in their enterprise environment. Learn more.


Protecting Your Organization Against Zero-Day Vulnerabilities

Join us as we take a deep dive into the process of these Proxylogon attacks and use this information to establish steps you can take to keep your organization secure from similar zero-day attacks using a strong SIEM framework. Learn more.


The New Reality: How Covid-19 Changed Everything

Join us for this session of summit to learn how others are evaluating and planning how and where work will be happening going forward.  Learn more.


Transforming Your Remote Workforce Summit

The editors of Redmondmag.com and Virtualization & Cloud Review, along with independent experts, will provide expert advice and insight on optimizing and securing your prospect's infrastructure today and preparing and upgrading it for tomorrow.  Learn more.


4 Hybrid Identity Security Pitfalls You Probably Already Forgot About

Over the past 18 months, it’s likely you’ve forgotten about potential risks that existed when expanding to the cloud. Learn more.


Secure and Extend Your AD Environments: Starling CertAccess + Active Roles

Join us for this webcast from IAM Security analyst experts to hear the top considerations and pitfalls to avoid when determining your IAM Active Directory (AD) security and management strategy. Learn more.


The Good, Bad, and the Ugly of the Rush to Remote Work

For this session Tom Fenton reached out to his friends in the industry to get their insights and he will go over what they and he has learned over the last year: the good, the bad and, of course, the ugly of enabling remote workers. Get the useful details.


Next-generation Approaches to End-User Computing in 2021

Join us for this session as we discuss how the pandemic began to grip the world in early 2020 and kicked off a forced march to remote work. Learn more.


Future of Desktop Infrastructure Summit

Join the editorial staff of Virtualization & Cloud Review and Redmondmag.com as well as independent experts for this half-day informational summit packed with real-world advice and insights you can't afford to miss! Learn more.


VDI or Daas? The Future of EUC is Hybrid

In this 30 minute discussion, we'll cover the advantages of a hybrid and multi-cloud EUC solution. Learn more.


Empowering Today’s DBAs: The New Backup & Recovery Best Practices

Join us for this crucial webinar that will walk you through the new backup & recovery best practices every DBA needs to know to make sure their data is secure and recoverable in today's cloud landscape. Learn more.


Applying the MITRE ATT&CK Framework to Your Active Directory

With the accelerating pace and increasing sophistication of cyberattacks, having a common framework for your security strategy helps you cope with the changing threat landscape. Learn more.


Microsoft Azure Stack HCI Summit

IT decision-maker attendees of this Redmondmag.com Microsoft Azure Stack HCI Summit will find out about key advantages of the Microsoft hybrid cloud approach for HCI, and best practices and use cases involving Azure Stack HCI.


Threat Detection Tuesday - What's In Your Toolbox?

Join BlueVoyant’s Owen Allen and Mike Scutt for a deep dive into some of the tools and techniques used by BlueVoyant Threat Hunters to identify breaches and threats more quickly. Learn more.


Managing Your Microsoft Dynamics 365 Data: Retain, Recover, and Be Ransomware-Ready

During this session, they’ll discuss how Microsoft Dynamics 365 is transforming business operations in the cloud and how the newest Metallic SaaS offering extends native capabilities for purpose-built protection, rapid recovery from attack, and long-term data retention to meet SLA compliance. Learn more.


Top Cloud Backup & Recovery Best Practices for Every IT Pro

In this session, we will look at best practices, tips, trends and techniques pertaining to cloud backup and recovery so you can be prepared when something happens. Learn more.


Modern Cloud Backup & Recovery Summit

This free, half-day summit is for every IT pro who isn't 100 percent confident their cloud backup recovery can withstand natural (or not-so-natural) disasters, ransomware, other hacks, or even just the weakness of the cloud systems themselves. Learn more.


A Master Class on IT Security: Roger Grimes Teaches Ransomware Mitigation

Join Roger for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware. Learn more.


Administrative Delegation and Policy Control in Microsoft 365

In this Webinar, you will learn how Microsoft 365 delegation differs from that of on premises environments, what Microsoft recommends with regard to administrative, and strategies for managing multi-tenant environments. Learn more.


My Top 5 Data Protection Tips

In this presentation, Karen Lopez shares her top 5 ways to protect data and the systems that house it. She’ll even throw in one or two that aren’t typically covered under this topic.


Prevent Active Directory Password Attacks: Steps and Tools

Password attacks are one of the most common reasons for data breaches even in 2021. The best way to get ahead of cybercriminals is to think like them. In this webinar, we'll show you how. Learn more!


Azure AD & Active Directory Security Summit

This half-day summit brings together the editorial staff of Redmondmag.com and independent experts to educate IT pros on what they need to know to protect their enterprise. Learn more.


Ransomware in 50 Minutes: Top Current Threats & What Experts Expect in 2021

Join Ian Thornton-Trump CD for the first session of our Azure AD & Active Directory Security Summit for a walk-through of a recent US Government Agency compromise and how monitoring of the Windows Security Event log could have revealed the unauthorized activity - on many occasions. Learn more.


Threat Detection Thursday - Breaking All The Rules!

This session will provide an overview of detection types, applicability, and rule aggregation to help you better focus on events that matter. If you can't tell your RBA from your UBA, join us on our journey to detection excellence! Learn more.


Enabling Digital Transformation with Windows Embedded IoT Solutions

Join us at this interactive and engaging webinar to learn how Microsoft Windows Embedded IoT and Azure cloud enable digital transformations helping partners to accelerate their delivery goals. Find out more now.


Addressing Endpoint and Data Insecurity in a Post-COVID World

The shifts that have occurred in the last 12 months in the way your organization operates have resulted in a drastically different working environment than what previously existed. Learn how you should go about addressing post-COVID insecurity? Register now.


Active Directory Hybrid Cloud Management: Top Security Risks to Watch For

In this webinar, we'll will discuss the top three security considerations when shifting to a hybrid identity model. Learn more.


Microsoft Teams Summit

It's time for your IT department to become your company's Microsoft Teams hero! Join the editors of Redmondmag.com plus independent experts in this half-day summit that will walk you through what you need to know about configuration, optimization, security, tips and tricks plus more. Learn more.


Simplifying Microsoft 365 Tenant Migrations When M&A Makes it Complicated

The pandemic has created opportunity for plenty of M&A/Divestiture activity. Learn more.


Don’t Do This With Your VM, Physical or NAS Backups: Worst Practices Gallery

So, you think you’ve seen it all? Think again. Join this webcast and learn more.


Hybrid Cloud 102: Best Practices for Hybrid Cloud Enterprise Configuration

Join us for session two of this summit as we look at best practices for Enterprise Hybrid Cloud Configuration and associated topics. Learn more.


Hybrid Cloud 101 Summit

Do you know the best practices for setup and configuration? What about the tools that can help? Join the editors of Virtualization & Cloud Review along with independent experts for this information-packed half-day seminar. Learn more.


Digital Transformation & The Cloud: Expert Best Practices for Transforming Your Enterprise

In this special editorial webcast, experts from Redmondmag.com will walk you through basic steps for considering a major Digital Transformation project. We'll look at everything from identifying stakeholders, rallying organizational support, to determining and securing budget and executing the project. Learn more.


How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches

Active Directory Exploitation Is the Common Thread in Recent High-Profile Attacks. Colonial Pipeline, SolarWinds, Hafnium - every day we hear about a new attack, a new vulnerability, and devastating consequences. Learn more.


Calculating the Impact of Cloud PBX for Microsoft Teams

Join us for this informative webinar to understand the critical nature and impact of selecting the right telephony partner for your Microsoft Teams direct routing deployment. Learn more.


Threat Detection Thursday

Based on methodologies developed though BlueVoyant's continuous research into attacker TTPs and real-world experience in countering espionage and financial crimes, our Threat Hunters will expose expert perspectives on human-driven defense. Learn more.


Enterprise Cloud Wars 2021 Summit

Join for this fun and fast-paced half-day summit where the editors of Redmondmag.com and Virtualization & Cloud Review bring together independent experts to discuss the pros and cons of many of today's top cloud solutions as well as what's working for organizations like yours.  Learn more.


AWS vs. Azure vs. GCP: Public Cloud Smackdown

In this tongue-in-cheek but informative roundtable session, public cloud experts will review what makes different public cloud systems great but also the weaknesses of each and what you might want to watch out for.  Learn more.


Best Practices for Making AWS and Azure Work Together

Join the second session of our Enterprise Cloud Wars 2021 Summit and get insights on what you need to do in your enterprise to make them work well together. Learn more.


Top 5 Identity and Access Management Challenges of 2021 and How to Overcome Them

In this webinar, we'll discuss top five identity and access management challenges IT admins will likely face in 2021 and how to overcome these challenges. Learn more.


A Master Class on IT Security: Roger Grimes Teaches You Phishing Mitigation

Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist where he’ll share a comprehensive strategy for phishing mitigation and how securing your users can become your best, last line of defense. Learn more.


Top Security and Compliance Issues with Office 365

In this session, we'll look at 5 of the top security and compliance issues with Microsoft 365 and what you can do to make sure your company doesn't fall victim to data compromises using Microsoft 365 services. Learn more.


What's New/What's Hot/What's Not with Office 365/Microsoft 365 Security

In this session, you will learn about the security features that you should be using and about some new features that you might not yet be familiar with. Learn more.


Office/Microsoft 365 Security Summit

Stay up to date on the latest features and security issues with Office 365/Microsoft 365 in this information-packed half-day seminar.  Learn more.


Microsoft Teams Backup: 8 Facts you NEED to Know!

Microsoft Teams is now the center of our productivity universe — but should you back it up? Learn more.


Getting More From Your Microsoft Teams Investment

In this webcast we'll cover the obstacles you will likely encounter on your way to a full Teams deployment and tips for how to overcome those obstacles. Learn more.


Top Do's and Don'ts of Enterprise Cloud Migration

Join cloud solution architect and technical trainer Tim Warner for a content-rich, “no fluff” breakdown of proven “do this, not that” cloud migration approaches.  Learn more.


Enterprise Cloud Migration Summit

Join us for this half-day summit brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com to learn what you need to know to get your enterprise safely cloud-enabled. Learn more.


Enterprise Cloud Migration Best Practices

Join this session as we look into topics including having a plan, being prepared, and understanding your application and data infrastructure environment.   Learn more.


What You Need to Know About Securing Active Directory

In this web seminar, we will discuss AD access points used in recent cyberattacks, how to look for warning signs that AD has been compromised, and steps to take in the event of an attack. Learn more.


Understanding the Hybrid and Private Cloud Dynamics

Cloud computing technology is evolving fast! Join this session as we answer your top questions and learn what the best solution for your business needs are. Learn more.


Best Practices for Architecting and Securing Your Hybrid and Private Clouds

During this session, we will examine several best practices for architecting your hybrid and private cloud environment so it will be as secure and resilient as possible. Learn more.


Cloud Architecture & Security Summit

The enterprise most likely has a mix of hybrid/private cloud infrastructure —or is striving to achieve it. Join this summit and learn more.


Microsoft 365 Data Protection – It’s Not Just Backup

Join Redmondmag.com Editor-in-Chief Scott Bekker, 14-time Microsoft Office Apps and Services MVP Matthew McDermott, and Spanning Director of Product Marketing Dave Wallen for a lively discussion around Microsoft 365 Data Protection. Learn more.


Best Practices for Multi-Cloud Environments

Join IT industry veteran Howard M. Cohen in exploring some of these best practices, why they’re each critical to your success, and how they enable you to recognize the full value of your multi-cloud strategy. Learn more.


Multi-Cloud Management Summit

Join this half-day virtual event to learn from topics like: Recent events have highlighted the value of public clouds, hybrid clouds and the entire multi-cloud approach for organizations. Learn more.


How to Apply the Cyber Kill Chain Framework to Identify and Combat Cyberattacks

Join us to learn how the cyberattack chain model can help IT security teams put in place strategies to “kill” or contain the attack at various stages, and how to better protect their IT ecosystem.


Navigate your Hybrid Workplace Strategy with Microsoft Teams and BlueJeans

In this webcast you will learn about key predications regarding the future of the workplace, the next of Microsoft Teams for collaboration and how to get the office ready for a productive hybrid workforce. Find out more.


Living the DReam: Rapid Ransomware Recovery with VMware Cloud DR

Join us for this session, where we explore why you should care about ransomware, how to take control of your data and what ransomware can do to businesses. Learn more.


Hacking Multifactor Authentication: An IT Pro’s Lessons Learned After Testing 150 MFA Products

Join Roger as he discusses the good, the bad, and the ugly lessons he learned from his research. He’ll share with you what works, what doesn’t, and what you should absolutely avoid. Learn more.


Migrating Your Microsoft 365 Tenant Through Mergers & Acquisitions

Mergers, acquisitions, and divestitures are common business activities that can have a huge impact on your Microsoft 365 tenant. Learn more.


How to Apply the Cyber Kill Chain Framework to Identify and Combat Cyberattacks

Join us to learn how the cyberattack chain model can help IT security teams put in place strategies to “kill” or contain the attack at various stages, and how to better protect their IT ecosystem.


Would Your Organization Fail the Active Directory Security Assessment?

Join Microsoft identity experts as they walk through the most common weak spots in Active Directory configurations—and how to fix them. Learn more.


Building Your Distance Learning Experience

In the era of distance learning, education institutions have been forced to quickly adapt how their students learn as well as how their educators teach into a completely digital experience. Learn more.


The Changing Role of Active Directory Engineers in a Cyber-Resilient Organization

Join this webcast for a discussion on how AD engineers and architects can expand their roles and add value to the company by focusing on developing and implementing a strategy to ensure that AD is secure from malicious intruders. Learn more.


Why PSTs are Such a Bad Idea in the Cloud

Join us for a discussion about why we think PSTs are an obsolete and potentially dangerous storage location for email. Learn more.


Migrating Active Directory in a Work-From-Anywhere World

There can be many reasons why your organization might need to do an Active Directory migration. No matter the reason, you are going to have to make a decision about what tools to use. Learn more.


The FBI's Recommendations to Prevent BEC Attacks on Office 365 Users

Join this webinar as our cybersecurity expert explains how you can implement the FBI's recommendations to mitigate BEC scams. Learn more.


The War on Ransomware Continues: Tips and Best Practices with Veeam v11

In this webinar, we'll share the latest tips for beating ransomware by assessing the threatscape and steps you can take to protect your data. Learn more.


The Modern SOC and the optimization of Microsoft Security

Company exposure today can appear in many sizes and forms. As a business ecosystem expands so do the risks, whatever the size of the company. By using the latest thinking from Microsoft, BlueVoyant is helping customers optimize their Microsoft 365 E5 license. By working with an expert to unite the security tools from one manufacturer, you can not only save money, time and resources but concentrate on managing those risks that actually have the potential to disrupt your business. Learn more.


Public vs. Private vs. Hybrid: Enterprise Pros and Cons

Join Greg Schulz of Server StorageIO as he looks at various cloud options and scenarios including pro’s, con’s and scenarios for Public vs. Private vs. Hybrid, from core to edge and other points in between. Learn more.


Best Practices for Managing a Hybrid Cloud Environment

In this practical, hands-on session, Microsoft MVP Tim Warner reviews the most important proven practices in hybrid cloud computing. Learn more.


Modern Enterprise Hybrid Cloud Summit

This free three-hour virtual event brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com will make sure you have what you need to know about best practices for making the most of a hybrid cloud infrastructure. Learn more.


The Latest on the Microsoft 365 E5 Security Licensing Journey

Join BlueVoyant’s Director of Microsoft Security Solutions, Micah Heaton, as he recaps their M365 E5 license bundle conversation from last October and shares insights on announcements made at Microsoft Ignite around Endpoint Management, Information Protection, and Identity and Access Management. Learn more.


Remote Workforce & Digital Workplaces: Why Infrastructure Matters Even More

Join the editors of Redmondmag.com plus independent technology experts as they share their insights to guide you through the top tips you need to know when considering your infrastructure of a remote future. Learn more.


Transforming the Enterprise: The Remote Workforce and Digital Workplaces Summit

Join the editors of Redmondmag.com along with independent experts who will share their insights on what you need to do NOW to make sure your remote workforce and digital workplace is protected for the future. Learn more.


Security, Security and Security: The Top 3 Concerns of a Remote Workforce & Digital Workplaces

Hear from independent infosec experts and the editors of Redmondmag.com on the top security concerns you need to be concerned about now and the best practices you can implement to mitigate them. Learn more.


Solving the Insecurity of Education in the Remote Workforce Era

Join us for this webcast to learn how can educational institutions better manage the security of their remote workforce. Learn more.


Protect, Detect, and Respond to Supply Chain Cyber Attacks (e.g. Solarwinds) Using Splunk Enterprise Managed Security Services

Join this webcast for an in-depth discussion about the SolarWinds attack, and learn best practices and strategies to strengthen your defenses. Learn more.