On Demand
Join Ian Thornton-Trump CD, CISO for Cyjax Ltd. as he ponders strategic level threats and tactical threats based on what has manifested in 2023. Don't miss it!
Duration: 1 hour
Join Insight for a webinar and hear experts share information about Managed Security Services (MSS) available to help you fight the battle to keep data secure. You’ll learn about how to manage security without sacrificing productivity, governance or compliance.
This webinar describes how setting a foundation on Red Hat Enterprise Linux for both on-site datacenter and AWS environments can help you improve productivity, security, and operations as you move to the cloud and adapt to an increasingly digital world. Join in to learn more!
In this webinar, we’ll take you through how to get the most out of open source AI, introduce you to OpenShift Data Science, and provide a roadmap for planned future investments by Red Hat for AI on Red Hat OpenShift. Join to learn more!
This webinar is essential for anyone managing an AWS environment, offering actionable insights and best practices that will transform your approach to AWS architecture. Don't miss it!
Duration: 1 hour
The editors of AWSInsider.net and Virtualization & Cloud Review have brought together independent AWS architects and experts for this free half-day summit who will share their insights on the new best practices for architecting, securing and recovering your enterprise AWS installations. If you're responsible for AWS anywhere in your organization, this is the summit you don't want to miss!
Duration: 3 hours
In this session, you will learn how Rubrik helps its customers secure data in the cloud, reduces operational complexity of multi-cloud and hybrid, and controls costs in the cloud.
Deception technology has been around since the 1960s, well before Lance Spitzer created The Honeynet Project. Security professionals are very familiar with early forms of deception technology (honeypots, honeynets, honeytokens) and while the techniques are the same, modern deception has moved well beyond these early technologies.
MITRE Engenuity conducts independent evaluations of cybersecurity products to help institutions make better decisions to combat security threats and improve their threat detection capabilities. MITRE recently released results from the latest Engenuity ATT&CK Evaluation covering the adversary Turla, and SentinelOne will be breaking down the results during a special webcast. Join our product experts as we discuss what the ATT&CK Evaluation means for enterprises, what the Turla adversary is about, and how the Singularity Platform combats sophisticated threat actors.
Join us as we explore how Rubrik is giving database teams the speed and confidence to protect their largest SAP HANA databases. Come and learn how Rubrik can keep your SAP HANA data available in the face of any threat.
Join Ian Thornton-Trump CD for his latest analysis on threat actor’s motivations, the macro and micro trends to watch out for in 2023. The double edge sword of AI is leading the charge for the forces of good against the forces of evil. Both sides are gearing up for massive cyber battles with your cloud (and on premise) infrastructure in the way.
Duration: 1 hour
In this webinar you will learn best practices that have been learned through many successful cloud migrations, as well some unsuccessful efforts. Sign up today!
Duration: 1 hour
Register for this free, three-hour summit to learn everything you need to know today about the biggest cloud data management trends and challenges. From modern best practices to the biggest emerging threats, our panel of cloud experts will share their most actionable real-world insights and effective tips so your organization’s data doesn’t fall through the cracks. Sign up today!
Duration: 3 hours
You’ll walk away with the knowledge you need to strengthen your data protection program both on-premises and in the cloud. Join to learn more.
Join Insight for a webinar where our experts share the core components of the modern data estate. You’ll learn the steps involved in building a foundation for modern data management to maximize your use of data intelligence — no matter where you are on the maturity curve.
Join this free, three-hour summit to learn the bases you need to cover so your organization’s data is as insulated against compromise as possible, the exact steps to take as soon as a ransomware attack makes itself known, and the post-attack process to make sure another one doesn’t happen again.
Duration: 3 hours
Learn how automation can level up your cloud infrastructure, real-world use cases, top configuration and management secrets, and much more. The right automation strategy can expand the possibilities for your IT team – register today and let us show you how!
Duration: 3 hours
Join this webinar to learn about new strategies attackers are using to steal your most valuable asset - your data.
Join experts from Insight for a five-part webinar series where you’ll explore how to Power Modern Work to best deliver secure, modern experiences and keep your teams engaged. During this deep-dive series, we’ll discuss best practices for modernization from device management to end-user support, and workplace IT adoption and optimization.
Join Greg Schulz, Author and senior analyst at Server StorageIO and Microsoft MVP Cloud Data Center Management, as he discusses the issues, challenges, and opportunities for AI and other automated tools to detect and protect your cloud data infrastructure, apps, and data.
Duration: 1 hour
Now's the time to get up to speed on the latest emerging threat actors and, when it comes to AI, learn how to fight fire with fire with intelligence-driven security. Join this free summit to learn straight from the experts how to modernize your security posture to meet modern threats to your cloud data.
Duration: 3 hours
In this session, you will learn about the potential pitfalls of keeping older systems around, strategies for modernization, and approaches for mitigation if you are stuck where you are.
Duration: 1 hour
In this free, three-hour summit, our panel of experts will share their real-world insights, best practices, and hacks for adopting a more cloud-centric strategy for your enterprise infrastructure. Learn how to plan a hassle-free data migration, smooth over system integration bumps, stay compliant, cover all your security bases and more. Don’t start your digital transformation journey before tuning in for this valuable guidance -- register today!
Duration: 3 hours
Join experts from Insight to explore how to Power Modern Work to best deliver secure, modern experiences and keep your teams engaged.
Register for this free, half-day summit organized by the editors of AWSInsider.net and Virtualization & Cloud Review to get first-hand insights and advice from the top AWS independent experts today.
Duration: 2 hours
Join this free, three-hour summit to learn straight from the experts the biggest mistakes you can make with your data, the top ways to make that data resilient, and how to make sure your organization stays ahead of the threats.
Duration: 3 hours
Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSinsider.net for this free, expert-led half-day summit featuring independent advice and best practices for keeping your remote/hybrid workforce secure and recoverable today and in the future -- don't miss it.
Duration: 3 hours
Are your teams too caught in the day-to-day of infrastructure management to focus on strategic business priorities? Join Insight for a webinar to learn how you can have more time for what matters with a predictable, flexible networking consumption solution: networking as a service (NaaS).
We’re here to help! Register for our free expert-led Summit to learn the most critical differences between the Big 3’s various cloud offerings, from pricing to capabilities to the fine print, so you can make the best decision for your organization.
Duration: 3 hours
Join Insight for a webinar where our experts will share a framework for removing innovation barriers. You’ll learn about the seven phases of innovation and the generative AI lifecycle and walk away with real strategies for success — from building models to deploying and operationalizing them, and how to pinpoint your highest-ROI use cases.