Webcasts


On Demand

Accelerate Your Cloud Adoption Journey

In this session, we’ll talk about how organizations can adopt a strong cloud migration strategy for improved service levels, enhanced ability to meet workload demands and faster revenue growth. You can move to the managed cloud platform and accelerate your cloud adoption journey with Insight’s workload, data and app migration services.

Duration: 1 hour


Is Managed Cloud Right for Your Organization? Key Considerations for Success.

You’ll gain a deeper understanding of Insight’s cloud offerings, including InsightCloud® Care, licensing, assessments and migration support, designed to simplify your AWS cloud journey and enhance your cloud management strategy.

Duration: 1 hour


Copilot for Microsoft 365: Key Readiness Strategies, Best Practices & Beyond

You’ll explore everything from architecture and data flow to best practices for rollout, use cases across your everyday apps and much more.

Duration: 1 hour


Secure Your Unstructured Financial Services Data

Join our upcoming webinar, where we'll delve deep into strategies to enhance cyber resilience of your unstructured financial data in today's ever-evolving threat landscape.

Duration: 1 hour


Navigating Hybrid and Multi-Cloud Complexity: A Smarter Path to Secure Application Delivery

In this live Tech Talk industry expert Andrew Gibson speaks to veteran technology journalist John K. Waters about the challenges of providing application access across hybrid/multi-cloud environments and how this can be efficiently streamlined, regardless of the traffic layer or platform.

Duration: 1 hour


Finding the Calm Amidst the Storm: Insights into the Impact of Broadcom’s Acquisition of VMware and Potential Paths Forward

Join industry experts as they analyze the potential impacts of the acquisition on VMware customers, including pricing and packaging changes, shifting support levels and Broadcom’s partner program changes, and product changes due to planned divestments. They will also discuss strategies to mitigate risk, including adopting a dual-vendor virtualization strategy, migrating to a new infrastructure platform, or migrating to the public cloud in case that is your goal.

Duration: 1 hour


Copilot for Microsoft 365: Key Readiness Strategies, Best Practices & Beyond

Get a detailed walk-through with plenty of visuals for Copilot for Microsoft 365 in this on-demand webcast featuring Insight’s Copilot product manager. You’ll explore everything from architecture and data flow to best practices for rollout, use cases across your everyday apps and much more.


Crash Course: Hybrid Workforce Security Summit

Let us help you navigate these issues and more. Join us for this free, three-hour summit where top experts will help you identify the biggest remote work security pitfalls in your organization, and the best ways to mitigate them.

Duration: 3 hours


The Security Dos and Don’ts of BYOD and Endpoint Management

Let us help you navigate these issues and more. Join us for this free, three-hour summit where top experts will help you identify the biggest remote work security pitfalls in your organization, and the best ways to mitigate them.

Duration: 1 hour


Understanding Your Cloud-Native Data Protection and Disaster Recovery Options for AWS

Learn how Clumio’s award-winning backup and recovery solution can help you automate the resilience of your cloud applications and reduce cost for your organization.

Duration: 1 hour


One Platform for All of Your Container and Virtualization Needs

This webinar offers expert insights and real-world examples of architectures and decision points to help you in your journey to unify under 1 platform with Red Hat® OpenShift® Virtualization.


Strategies for Implementing Simulation Training

Join some of the industry's top security experts for this three-hour crash course on how to foster a culture of cybersecurity vigilance in your organization.

Duration: 1 hour


End User Ransomware Training Tips, Tricks and Pitfalls

Join this webinar for a new approach to building cyber resilience for the employees on the front lines of your organization.

Duration: 1 hour


Why You Need End User Ransomware Training (and How To Do It So They Listen) Summit

Join some of the industry's top security experts for this three-hour crash course on how to foster a culture of cybersecurity vigilance in your organization.

Duration: 3 hours


Trust No One Summit: Why You Should Modernize Your Security Posture with Zero Trust (and How To Do It)

Join this free, three-hour summit to get the expert guidance and insight you need to start modernizing your organization’s security infrastructure. Learn more!

Duration: 3 hours


Zero Trust-Focused End User Training Tips, Tricks and Pitfalls

Join Greg Schulz, Author and senior analyst at Server StorageIO and Microsoft MVP Cloud Data Center Management, as he discusses moving beyond the what and why to zero trust-focused end-user training, tips, best practices, and what to watch out for.

Duration: 1 hour


Level Up Your Cloud Security with Zero Trust Summit

Join this free mini-summit to understand how 11:11 Systems and HPE solutions set the groundwork for a zero trust cloud. You’ll learn straight from the experts the benefits of securing your cloud assets using a zero trust approach, the best strategies for enforcement and the hidden pitfalls you should be aware of.

Duration: 2 hours


Ansible: Your “All-in-One Tool” for Enterprise Automation

Join Insight for a webinar where our experts will share use cases for automation with Ansible. You’ll learn how organizations are using this technology to transform their enterprise operations, streamline security and overcome the complexity of hybrid infrastructures.


Building a Directional Business Case for AWS: Tips and Best Practices for Success

Learn how to evaluate your migration readiness, factor in cloud economics and plan for a future cloud state to ultimately assign business value and determine if you should move forward.


Maximize Your Cloud Security

Join Insight for a webinar and hear experts share information about Managed Security Services (MSS) available to help you fight the battle to keep data secure. You’ll learn about how to manage security without sacrificing productivity, governance or compliance.


Optimize your IT Environment with Red Hat and AWS

This webinar describes how setting a foundation on Red Hat Enterprise Linux for both on-site datacenter and AWS environments can help you improve productivity, security, and operations as you move to the cloud and adapt to an increasingly digital world. Join in to learn more!


Getting the Most Out of AI with Open Source and Kubernetes

In this webinar, we’ll take you through how to get the most out of open source AI, introduce you to OpenShift Data Science, and provide a roadmap for planned future investments by Red Hat for AI on Red Hat OpenShift. Join to learn more!


AWS Architecture Best Practices

This webinar is essential for anyone managing an AWS environment, offering actionable insights and best practices that will transform your approach to AWS architecture. Don't miss it!

Duration: 1 hour


Architecting & Securing AWS Cloud Summit

The editors of AWSInsider.net and Virtualization & Cloud Review have brought together independent AWS architects and experts for this free half-day summit who will share their insights on the new best practices for architecting, securing and recovering your enterprise AWS installations. If you're responsible for AWS anywhere in your organization, this is the summit you don't want to miss!

Duration: 3 hours


How to Secure Hybrid, Multi-Cloud, and SaaS++

In this session, you will learn how Rubrik helps its customers secure data in the cloud, reduces operational complexity of multi-cloud and hybrid, and controls costs in the cloud.


The Art of Cyber Deception: Strengthening Modern Defenses

Deception technology has been around since the 1960s, well before Lance Spitzer created The Honeynet Project. Security professionals are very familiar with early forms of deception technology (honeypots, honeynets, honeytokens) and while the techniques are the same, modern deception has moved well beyond these early technologies.


Decoding the 5th Round of MITRE ATT&CK Enterprise Evaluations 2023

MITRE Engenuity conducts independent evaluations of cybersecurity products to help institutions make better decisions to combat security threats and improve their threat detection capabilities. MITRE recently released results from the latest Engenuity ATT&CK Evaluation covering the adversary Turla, and SentinelOne will be breaking down the results during a special webcast. Join our product experts as we discuss what the ATT&CK Evaluation means for enterprises, what the Turla adversary is about, and how the Singularity Platform combats sophisticated threat actors.


Never Leave Your SAP HANA Database Unprotected Again

Join us as we explore how Rubrik is giving database teams the speed and confidence to protect their largest SAP HANA databases. Come and learn how Rubrik can keep your SAP HANA data available in the face of any threat.


What’s New, Upcoming and Notable in Multicloud Data Threats

Join Ian Thornton-Trump CD for his latest analysis on threat actor’s motivations, the macro and micro trends to watch out for in 2023. The double edge sword of AI is leading the charge for the forces of good against the forces of evil. Both sides are gearing up for massive cyber battles with your cloud (and on premise) infrastructure in the way.

Duration: 1 hour


Compliance, Security, Resilience and More: Top Hurdles in Cloud Data Management

In this webinar you will learn best practices that have been learned through many successful cloud migrations, as well some unsuccessful efforts. Sign up today!

Duration: 1 hour