On Demand
In this live Tech Talk industry expert Andrew Gibson speaks to veteran technology journalist John K. Waters about the challenges of providing application access across hybrid/multi-cloud environments and how this can be efficiently streamlined, regardless of the traffic layer or platform.
Duration: 1 hour
Join industry experts as they analyze the potential impacts of the acquisition on VMware customers, including pricing and packaging changes, shifting support levels and Broadcom’s partner program changes, and product changes due to planned divestments. They will also discuss strategies to mitigate risk, including adopting a dual-vendor virtualization strategy, migrating to a new infrastructure platform, or migrating to the public cloud in case that is your goal.
Duration: 1 hour
Get a detailed walk-through with plenty of visuals for Copilot for Microsoft 365 in this on-demand webcast featuring Insight’s Copilot product manager. You’ll explore everything from architecture and data flow to best practices for rollout, use cases across your everyday apps and much more.
Let us help you navigate these issues and more. Join us for this free, three-hour summit where top experts will help you identify the biggest remote work security pitfalls in your organization, and the best ways to mitigate them.
Duration: 3 hours
Let us help you navigate these issues and more. Join us for this free, three-hour summit where top experts will help you identify the biggest remote work security pitfalls in your organization, and the best ways to mitigate them.
Duration: 1 hour
Learn how Clumio’s award-winning backup and recovery solution can help you automate the resilience of your cloud applications and reduce cost for your organization.
Duration: 1 hour
This webinar offers expert insights and real-world examples of architectures and decision points to help you in your journey to unify under 1 platform with Red Hat® OpenShift® Virtualization.
Join some of the industry's top security experts for this three-hour crash course on how to foster a culture of cybersecurity vigilance in your organization.
Duration: 1 hour
Join this webinar for a new approach to building cyber resilience for the employees on the front lines of your organization.
Duration: 1 hour
Join some of the industry's top security experts for this three-hour crash course on how to foster a culture of cybersecurity vigilance in your organization.
Duration: 3 hours
Join this free, three-hour summit to get the expert guidance and insight you need to start modernizing your organization’s security infrastructure. Learn more!
Duration: 3 hours
Join Greg Schulz, Author and senior analyst at Server StorageIO and Microsoft MVP Cloud Data Center Management, as he discusses moving beyond the what and why to zero trust-focused end-user training, tips, best practices, and what to watch out for.
Duration: 1 hour
Join this free mini-summit to understand how 11:11 Systems and HPE solutions set the groundwork for a zero trust cloud. You’ll learn straight from the experts the benefits of securing your cloud assets using a zero trust approach, the best strategies for enforcement and the hidden pitfalls you should be aware of.
Duration: 2 hours
Join Insight for a webinar where our experts will share use cases for automation with Ansible. You’ll learn how organizations are using this technology to transform their enterprise operations, streamline security and overcome the complexity of hybrid infrastructures.
Don’t let down your guard down! Register for this free, expert-led summit to hear top independent experts share the biggest security trends affecting the multicloud today, the quickest ways to secure your cloud data against attacks, real-world multicloud best practices, and the newest tools available to ensure your multicloud environment doesn’t get compromised.
Duration: 3 hours
Learn how to evaluate your migration readiness, factor in cloud economics and plan for a future cloud state to ultimately assign business value and determine if you should move forward.
Join Ian Thornton-Trump CD, CISO for Cyjax Ltd. as he ponders strategic level threats and tactical threats based on what has manifested in 2023. Don't miss it!
Duration: 1 hour
Join Insight for a webinar and hear experts share information about Managed Security Services (MSS) available to help you fight the battle to keep data secure. You’ll learn about how to manage security without sacrificing productivity, governance or compliance.
This webinar describes how setting a foundation on Red Hat Enterprise Linux for both on-site datacenter and AWS environments can help you improve productivity, security, and operations as you move to the cloud and adapt to an increasingly digital world. Join in to learn more!
In this webinar, we’ll take you through how to get the most out of open source AI, introduce you to OpenShift Data Science, and provide a roadmap for planned future investments by Red Hat for AI on Red Hat OpenShift. Join to learn more!
This webinar is essential for anyone managing an AWS environment, offering actionable insights and best practices that will transform your approach to AWS architecture. Don't miss it!
Duration: 1 hour
The editors of AWSInsider.net and Virtualization & Cloud Review have brought together independent AWS architects and experts for this free half-day summit who will share their insights on the new best practices for architecting, securing and recovering your enterprise AWS installations. If you're responsible for AWS anywhere in your organization, this is the summit you don't want to miss!
Duration: 3 hours
In this session, you will learn how Rubrik helps its customers secure data in the cloud, reduces operational complexity of multi-cloud and hybrid, and controls costs in the cloud.
Deception technology has been around since the 1960s, well before Lance Spitzer created The Honeynet Project. Security professionals are very familiar with early forms of deception technology (honeypots, honeynets, honeytokens) and while the techniques are the same, modern deception has moved well beyond these early technologies.
MITRE Engenuity conducts independent evaluations of cybersecurity products to help institutions make better decisions to combat security threats and improve their threat detection capabilities. MITRE recently released results from the latest Engenuity ATT&CK Evaluation covering the adversary Turla, and SentinelOne will be breaking down the results during a special webcast. Join our product experts as we discuss what the ATT&CK Evaluation means for enterprises, what the Turla adversary is about, and how the Singularity Platform combats sophisticated threat actors.
Join us as we explore how Rubrik is giving database teams the speed and confidence to protect their largest SAP HANA databases. Come and learn how Rubrik can keep your SAP HANA data available in the face of any threat.
Join Ian Thornton-Trump CD for his latest analysis on threat actor’s motivations, the macro and micro trends to watch out for in 2023. The double edge sword of AI is leading the charge for the forces of good against the forces of evil. Both sides are gearing up for massive cyber battles with your cloud (and on premise) infrastructure in the way.
Duration: 1 hour
In this webinar you will learn best practices that have been learned through many successful cloud migrations, as well some unsuccessful efforts. Sign up today!
Duration: 1 hour
Register for this free, three-hour summit to learn everything you need to know today about the biggest cloud data management trends and challenges. From modern best practices to the biggest emerging threats, our panel of cloud experts will share their most actionable real-world insights and effective tips so your organization’s data doesn’t fall through the cracks. Sign up today!
Duration: 3 hours
You’ll walk away with the knowledge you need to strengthen your data protection program both on-premises and in the cloud. Join to learn more.