On Demand
Join the editors of Redmondmag.com, Virtualization & Cloud review and AWSinsider.net will bring together independent cloud and security experts that will cover best practices for managing and securing your modern hybrid cloud infrastructure. Register today!
Duration: 3 hours
Identity misuse is involved in virtually every successful cybersecurity incident. Because of this, Identity Threat Detection and Response (ITDR) has emerged to encompass the tools and processes that protect identity infrastructures. When combined with XDR (eXtended Detection and Response), this joint solution is the most modern, effective, and efficient approach to protect against cyber adversaries. Join SentinelOne and Gartner for a webinar as we address current adversary techniques driving the need for combined XDR and ITDR, and best practices for implementation.
In this Tech Talk, industry expert Paul Nicholson talks with veteran technology journalist John K. Waters about meeting this vexing challenge and the conversation will cover building a better hybrid cloud operating model. Learn more!
Please join us in this session as we discuss several best practices and patterns that will make your application ready for the cloud and ready for DevOps. We'll discuss CI/CD, Microservices, Security Vulnerability checks, and more!
Duration: 1 hour
In this session we’ll explore some of the available architectures and talk about how applying best practices in building software benefits everyone across the enterprise.
Duration: 1 hour
Join this this free, half-day summit covering what's new in application architecture best practices and learn some real-word advice for implementing these best practices. Make sure you're caught up and your apps can be everything they should be -- sign up today!
Duration: 3 hours
Join this session to learn different considerations on how to best keep large organizations aligned on a hybrid cloud strategy and best practices for working with multicloud environments.
Duration: 1 hour
ChatGPT has opened new doors for organizations and enabled many teams to increase efficiency and productivity in previously unimaginable ways. But how does generative AI usage in the workplace impact security leaders, and are there ways for enterprises to safely harness its power?
Join the editors of AWSInsider.net and Virtualization & Cloud Review plus cloud and infosec experts for an inside look at the current threats attacking your cloud plus real-word advice and best practices on what you need to do if you fall victim to ransomware, DDOS attacks, internal threats, disasters, or any of the myriad of other attacks that could put your AWS cloud infrastructure and data at risk.
Duration: 3 hours
Don't miss this free half-day summit, where the editors of Redmondmag.com, Virtualization & Cloud review and AWSinsider.net will bring together independent cloud management and security experts that will cover modern best practices for managing and securing your modern hybrid cloud infrastructure in 2023.
Duration: 3 hours
In this session, we’ll talk about how organizations can adopt a strong cloud migration strategy for improved service levels, enhanced ability to meet workload demands and faster revenue growth. You can move to the managed cloud platform and accelerate your cloud adoption journey with Insight’s workload, data and app migration services.
Join this free half-day summit from the editors or AWSInsider.net and Virtualization & Cloud Review to find out how to keep your AWS cloud setup secure.
Duration: 3 hours
In this half-day virtual summit you'll learn straight from the experts how to deploy the right automation solution for your hybrid cloud infrastructure, how to secure and optimize it, the benefits to your DevOps teams, what the top best practices are, and what to absolutely never do.
Duration: 4 hours
Join the editors of Virtualization & Cloud Review, Redmondmag.com, AWSinsider.net and ADTmag.com have created this free mini-summit featuring independent experts with real-world advice on how you can transform your enterprise with the cloud and DevOps. Don't miss it!
Duration: 2 hours
In this fundamental session, Senior Resultant Howard M. Cohen will guide attendees down the path that goes beyond continuous improvement to achieve desirable transformation of the platforms, the processes, and the people that comprise an effective DX program.
Duration: 1 hour
In this session, we’ll explore what a robust customer interaction suite looks like, how metrics reflect success, and how to integrate real-time communication into your app to reduce the cost of legacy channels like SMS offered by traditional Communications Platforms as a Service (CPaaS) vendors like Twilio.
Join this webinar to learn more from this in-depth global study commissioned by Rubrik and conducted by Wakefield Research, including how cybercrime affects their organizations, it’s impact on their IT and security teams, and more!
In this Tech Talk, John K. Waters, editor in chief in the Converge360 Group of 1105 Media, talks with Anthony Dutra, Technical Marketing Engineer at Zerto, about the challenges organizations face, and strategies they can employ to protect their applications and data in AWS.
Duration: 1 Hour
In this webinar, we will cover how Product managers and developers (pro code and low code) can use Sendbird in the digital transformation journey. Learn more!
You do not want to be in the headlines for having a ransomware attack. Thankfully, 90% of ransomware attacks haven’t resulted in any loss. During this session, we will discuss some concrete, real-world tactics for presenting your best defense against ransomware as well as how to remediate an attack when one does occur. Join us to learn more!
Duration: 1 hour
Get your defense and recovery plans in place with this free half-day summit brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com.
Duration: 3 hours
This talk will look at the techniques used by ransomware groups in 2023 and how you can stop those attacks, even without a multimillion dollar security budget. Learn more.
Duration: 1 hour
Join the editors of Redmondmag.com will bring together independent experts to walk you through what's new in Microsoft Teams for remote workforce management plus best practices you need to know surrounding management, security and recovery.
Duration: 3 hours
To learn various best practices that you can implement as a way of helping your users to work more efficiently in Microsoft Teams.
Duration: 1 hour
Organizations are quickly catching on to the value of XDR as a must-have solution for successful SOC transformations. Embrace a secure future and stay ahead of malicious threats with SentinelOne Singularity XDR.
This phase of the hybrid cloud evolution demands is a strategic approach to the tools and services that provide a critical level of digital resilience. In this Tech Talk, Paul Nicholson, Sr. Director of Product Marketing at A10 Networks, breaks down the increasingly complex challenge of providing digital resilience for modern hybrid cloud application deployments. Don't miss it!
Endpoint Credentials remain High-Value Targets for cybercriminals. The 2022 Verizon Data Breach Investigations Report found that nearly 50% of all data breaches are caused by stolen credentials and cost an average 4M dollars per attack. Regardless of the credential type or stored location, A myriad of tools make it possible to access these high-value targets, providing cybercriminals with a potentially clear path for exposure.
Join Carlos Rivas, Sr. Solutions Architect, to discuss performance around Compute, Storage, and Database in AWS as it relates to the Well-Architected framework.
Duration: 1 hour
With so much to keep up on, the editors of AWSinsider.net and Virtualization & Cloud Review have created this two-hour free mini-summit covering modern real-world cloud performance best practice tips and tricks (as well as what not to do) from independent AWS cloud experts. Don't miss it!
Duration: 2 hours
Join the editors of Redmondmag.com have created this free, two-session mini-summit featuring real-world insights on how you can keep your organization secure. From new approaches with Zero Trust and Continuous Adaptive Risk and Trust Assessment (CARTA) to compliance issues around IAM, authentication and endpoint protection, you'll get real-world insights you don't want to miss. Register now!
Duration: 2 hours