Webcasts


On Demand

Data Security Posture Management 101

Join us to learn more about today's complex cybersecurity landscape and data security posture management (DSPM). DSPM helps IT better understand their data, so IT can be better at protecting it. Get ahead of attackers and modernize how you safeguard your data by registering for this free virtual webinar today!

Duration: 1 Hour


Get In Tune with Your Cloud Cyber Resilience Strategy

Join us to learn how Rubrik Security Cloud can help your organization achieve complete cyber resilience, as well as how to secure your most sensitive data, simplify control and automation, and reduce your cloud bill.

Duration: 1 Hour


Cloud Security Automation Summit: How To Achieve (Almost) Zero-Touch Cloud Security

Join us for this free, expert-led summit where you'll learn the best ways to automate your cloud's security so you stay one step ahead of the attackers.

Duration: 3 hours


Coffee Talk | Expert View: How To Update Your Data Management Strategy for the AI Era

Join our webcast to discover how to harness the power of AI for your data management strategy. Learn to prepare for the challenges of AI integration, from data security and reliability to ethical considerations and automation. Don't miss our expert tips for modernizing your data management in the AI era!

Duration: 1 Hour


Migrating to Microsoft Azure Virtual Desktop with Nerdio 101

Get actionable insights and valuable advice that you can start implementing in your AVD environment today.

Duration: 1 Hour


Navigating the Unstructured Data Maze: Your Journey Starts Here

Hear from top industry experts about what’s really at stake if your unstructured data falls in the wrong hands—and how you can keep it safe. Discover actionable steps and watch a live demo on how you can understand, manage, and secure your unstructured data environment efficiently.


How to Empower IT with Immutable Data Vaults

Cybercriminals are hip to the backup game and routinely target backups. In fact, according to Rubrik Zero Labs, attackers tried to affect the backups in 96% of attacks. Unfortunately, most backup solutions are not up to the task of delivering cyber resilience, as attackers were at least partially successful in 74% of those attempts to affect backups. Legacy backup solutions that may have once-protected data struggle to keep up with modern threats.


Coffee Talk | Microsoft Copilot for Microsoft 365 Best Practices for Maximum Data Protection

Join us to unlock the full potential of Microsoft Copilot within your M365 environment by joining our exclusive webcast! Discover essential insights from Greg Schulz, a renowned author, founder, and Sr. Analyst of Server StorageIO, and Microsoft MVP (CDM). Learn about the security, governance, and data protection strategies you need to safeguard your organization's data while leveraging Copilot.

Duration: 1 Hour


Cloud Migration 101: How To Goof-Proof Your Cloud Journey Summit

Learn how to avoid all of these problems in this free, three-hour summit. Get real-world guidance for your cloud migration straight from the experts, from how to streamline your data transfers, to how to salvage your legacy apps, and more. We’ve got all your cloud migration bases covered – sign up today!

Duration: 3 hours


Coffee Talk | Modern Active Directory Security Best Practices

Join our free 30-minute Coffee Talk to discover how to fortify your Active Directory against evolving threats. With new vulnerabilities emerging daily and attack methods becoming more sophisticated, it's crucial to rethink your protection strategy now. Don't miss this opportunity to stay ahead of potential security breaches!

Duration: 1 Hour


Leveraging Automation to Securely Adopt Next-Gen Firewalls: A Faster, More Efficient Approach

Join Insight experts Kevin Wilson and Cory Peterson, along with Red Hat Ansible expert John Gibson, for a webinar on how organizations can securely automate and speed up the adoption of Next-Gen Firewalls (NGFWs) using the Red Hat Ansible Automation Platform.


Ask Us Anything: Key Pillars to Harnessing the Power of Enterprise AI

Join our webcast to uncover the key elements of a successful Enterprise AI platform, control costs, and deploy AI apps in a cloud-native format. Our experts will help you understand AI integration, agile app deployment, and data security enhancement. Sign up now to transform your AI strategy

Duration: 1 Hour


What to Know About Copilot Studio

Join us to learn more about Copilot Studio, Microsoft's new chatbot authoring tool. Our experts will cover what Copilot Studio is, how it differs from Power Virtual Agents and Azure® AI Studio, and how you can use it to create chatbots with generative AI and natural language capabilities. Don't miss this opportunity to gain insights from top experts and see Copilot Studio in action. Register today and elevate your chatbot experience to the next level!

Duration: 1 Hour


The Journey to AWS Cloud: Overcoming Common Migration Challenges to Achieve Cloud Excellence

Join us to learn how to successfully migrate to AWS! In this webinar with Insight AWS expert Mike Till, you'll explore common challenges and practical solutions, including workload prioritization, migration roadmaps, and cost optimization.

Duration: 1 Hour


Leaders in Tech Series | Mid-Year Cybersecurity Trends Review: Top Threats To Know

Join our free virtual event to learn the latest strategies that attackers are using today, and the most useful tools and best practices you can implement to stop them. Get expert insights from some of the top experts in cybersecurity on how to identify and fix the most exploitable weaknesses in your organization. Don't let down your guard -- register today!

Duration: 2 hours


Delivering 192% ROI with Red Hat Enterprise Linux on Azure

Join us as we uncover the efficiencies and cost-savings achieved from deploying Red Hat® Enterprise Linux® on Microsoft Azure, examined through the lens of Forrester's Total Economic Impact (TEI) framework.

Duration: 1 Hour


Top Threat Monitoring Implementation Strategies

Join Greg Schulz, Author, founder, and Sr. Analyst of Server StorageIO and Microsoft MVP (CDM), as he discusses top threat monitoring implementation strategies. Greg will discuss industry trends, technologies and techniques, best practices, and implementation strategies.

Duration: 1 hour


Detect Early and Detect Often: The Case for Threat Monitoring

In an era when cyber threats evolve at an unprecedented rate, proactive threat monitoring has never been more critical. This webinar will equip IT professionals, IT managers, and business professionals with knowledge and strategies to enhance their organizations' cybersecurity posture. Join us!

Duration: 1 hour


Threat Monitoring for SMBs and Enterprises Summit: The Hows, Whys and Gotchas

Get the answers straight from the experts in this free, three-hour summit, where you'll learn the ins and outs of threat monitoring, how to do it right, and the biggest traps to avoid. Register today!

Duration: 3 hours


Rubrik: A battle of the 2024 data regulation giants: DORA vs. NIS2

In 2024, organizations will prioritize building robust cyber resilience to combat ransomware attacks and adhere to new data regulations. Join experts to gain insights on the Digital Operational Resilience Act (DORA) and Security of Networks & Information Systems Regulations (NIS2).


Rubrik: Zero Trust + Cloud Economics = Too good to be true?

Organizations face challenges with rapidly growing cloud data and seek cost-effective, secure solutions while maintaining Zero Trust principles. Join experts from Rubrik and ESG for insights on managing data growth and cybersecurity resilience.


Empowering Security and Productivity With Microsoft 365 E5: Real-World Solutions for Modern Challenges

Join us to learn about Microsoft 365 E5 and the differences between 3 and 5. We’ll show you how to stay on top with Microsoft E5.

Duration: 1 Hour


Microsoft 365 Resilience Summit

Learn how to make sure that every piece of data that crosses your Microsoft 365 environment is as loss-proof and recoverable as possible.

Duration: 3 hours


Expert Guide to Loss-Proof Microsoft 365 Data

In this exciting webinar, you will have the opportunity to learn about tools and techniques to preserve your M365 environment and best practices for configuration and security, enhancing your skills and knowledge in data protection. Learn more!

Duration: 1 hour


Introduction to Rubrik's Ruby AI

Rubrik introduces Ruby, an interactive tool designed to enhance cyber detection, recovery, and resilience. It provides clear recommendations, accelerates threat identification, guides users through actions, and assists in quarantining and recovering infected data in response to cyber threats.


Tech Talk | Advancing the Cloud: How Distributed Computing Meets Modern User Demands

In this live Tech Talk, cloud computing expert Ari Weil talks with veteran technology journalist John K. Waters about how business and IT leaders are leveraging distributed cloud computing to meet these expectations.

Duration: 1 Hour


Copilot for Security: Overview of the Newest Copilot Offering

Join us to get a detailed walk-through with plenty of visuals for Copilot for Security in this on-demand webcast featuring Insight’s Senior Architect.

Duration: 1 hour


Design a Cost-Efficient AWS Visibility Architecture

Join us to learn how the Gigamon Deep Observability Pipeline provides architectural alternatives to native AWS tools that can eliminate the costs of network gateways and load balancers.

Duration: 1 hour


Building a Directional Business Case for AWS

Looking to improve operational efficiency? Cloud could be your best option. But a transition to AWS may not be quick and easy. Watch this webinar to consider the business case for cloud migration.


Webinar: Microsoft 365 Copilot: Key Readiness Strategies, Best Practices & Beyond

Discover Microsoft 365 Copilot best practices, day-to-day use cases, and how Copilot manages permissions and privacy in this on-demand webcast from Insight.