On Demand

DevOps & Your Cloud Infrastructure: Getting Started with Digital Transformation Summit

Join the editors of Virtualization & Cloud Review, Redmondmag.com, AWSinsider.net and ADTmag.com have created this free mini-summit featuring independent experts with real-world advice on how you can transform your enterprise with the cloud and DevOps. Don't miss it!

Duration: 2 hours

Digital Transformation, DevOps & the Cloud 101: Transformation Basics

In this fundamental session, Senior Resultant Howard M. Cohen will guide attendees down the path that goes beyond continuous improvement to achieve desirable transformation of the platforms, the processes, and the people that comprise an effective DX program.

Duration: 1 hour

The Key to Incredible Customer Experiences Comes From Controlling Communications at the Core

In this session, we’ll explore what a robust customer interaction suite looks like, how metrics reflect success, and how to integrate real-time communication into your app to reduce the cost of legacy channels like SMS offered by traditional Communications Platforms as a Service (CPaaS) vendors like Twilio.

Ransomware Top Threats & Best Practices for 2023 Summit

Join the editors of Redmondmag.com, Virtualization & Cloud Review and AWSInsider.net for this half-day summit that will bring together independent ransomware and security experts to give you real-world, practical advice, tips and best practices that will help you harden your infrastructure today for tomorrow. Don't miss out!

Duration: 3 hours

Top Enterprise Ransomware Threats

This talk will look at the most active ransomware groups, what they are going after once they are in your organization and, most importantly, how they do it. Not only will this talk help you prepare for what ransomware groups are doing, it will include practical tips for improving your defenses and keeping the ransomware actors out, or, at the very least, stopping them before they can do any damage to your organization.

Duration: 1 hour

The State of Data Security: The Human Impact of Cybercrime

Join this webinar to learn more from this in-depth global study commissioned by Rubrik and conducted by Wakefield Research, including how cybercrime affects their organizations, it’s impact on their IT and security teams, and more!

Filling the Gaps in Your Data Protection and Ransomware Strategies with Zerto and AWS

In this Tech Talk, John K. Waters, editor in chief in the Converge360 Group of 1105 Media, talks with Anthony Dutra, Technical Marketing Engineer at Zerto, about the challenges organizations face, and strategies they can employ to protect their applications and data in AWS.

Duration: 1 Hour

Coffee Talk: Controlling Your Multi-Cloud Costs: Top 5 Tips

Cloud costs is such a big headache for many IT leaders that the editors of Redmondmag.com, Virtualization & Cloud Review & AWSInsider.net have come together to present to you this free coffee talk event featuring Greg Schulz, founder, and IT analyst with Server StorageIO, who will offer his top 5 tips for controlling multi-cloud costs. Don't miss it -- register today!

Duration: 1 hour

Streamline Your Digital Transformation Journey: Here's How

In this webinar, we will cover how Product managers and developers (pro code and low code) can use Sendbird in the digital transformation journey. Learn more!

Real-World Ransomware Defense & Remediation Summit

Get your defense and recovery plans in place with this free half-day summit brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com.

Duration: 3 hours

2023 Ransomware Threat Outlook

This talk will look at the techniques used by ransomware groups in 2023 and how you can stop those attacks, even without a multimillion dollar security budget. Learn more.

Duration: 1 hour

Real-World Best Practices for Ransomware Defense & Remediation

You do not want to be in the headlines for having a ransomware attack. Thankfully, 90% of ransomware attacks haven’t resulted in any loss. During this session, we will discuss some concrete, real-world tactics for presenting your best defense against ransomware as well as how to remediate an attack when one does occur. Join us to learn more!

Duration: 1 hour

Remote Workforce & Microsoft Teams Summit

Join the editors of Redmondmag.com will bring together independent experts to walk you through what's new in Microsoft Teams for remote workforce management plus best practices you need to know surrounding management, security and recovery.

Duration: 3 hours

Top Microsoft Teams Remote Workforce Best Practices

To learn various best practices that you can implement as a way of helping your users to work more efficiently in Microsoft Teams.

Duration: 1 hour

Buckle In for a SASE Test Drive

Preparing to adopt a Secure Access Service Edge (SASE) approach starts with understanding why you’re choosing what you’re choosing. This webcast will walk you through the basics of SASE, answer the most commonly asked questions and uncover the market-leading benefits of Palo Alto Networks® Prisma® Access for cloud-native security. You’ll also learn about the hands-on SASE Ultimate Test Drive opportunity, including benefits, takeaways and how to sign up.

Securing the Modern Workplace with SASE for Zero Trust

Network and security pain points proliferate in the work-anywhere environment, driving risk and decreasing efficiency. Secure Access Service Edge (SASE) solutions like Prisma Access offer a unified approach to solving common network and security challenges, improving performance, enhancing user experiences and reducing risk through a Zero Trust Network Access (ZTNA) approach. Discover how Prisma Access prioritizes visibility, shared data and consistent policies to support a ZTNA 2.0 framework for ground-up protection against evolving modern workplace threats.

As a Service: Changing the Narrative on Traditional IT

Managing multiple IT platforms and components across on-premises and hybrid cloud environments can get complicated quickly. So it makes sense that more IT decision-makers are leveraging as a service. From infrastructure to security, learn what the experts have to say about these flexible solutions.

The Future is XDR: How to Conquer the SOC Transformation

Organizations are quickly catching on to the value of XDR as a must-have solution for successful SOC transformations. Embrace a secure future and stay ahead of malicious threats with SentinelOne Singularity XDR.

The Road to Digital Resilience: Right-Sizing Hybrid Cloud Application Deployments

This phase of the hybrid cloud evolution demands is a strategic approach to the tools and services that provide a critical level of digital resilience. In this Tech Talk, Paul Nicholson, Sr. Director of Product Marketing at A10 Networks, breaks down the increasingly complex challenge of providing digital resilience for modern hybrid cloud application deployments. Don't miss it!

Modern Cloud Data Protection Summit

Make sure you're ready for all things cloud data protection with this free half-day summit from the editors of Virtualization & Cloud Review and Redmondmag.com.

Duration: 3 hours

Recent Breaches: The Role of an Identity Compromise

Google's cybersecurity outlook for 2023 is a stark reminder that organizations must remain vigilant against identity and authentication attacks. In the last year, 84% of businesses fell victim to identity-related breaches, and 78% felt their bottom line from these attacks. To help combat this crisis, SentinelOne recently amplified its XDR solution with Identity Threat Detection & Response and Deception Technology. This fortress-like addition to SentinelOne's solution repertoire creates an extra layer of vigilance against potential malicious activity.

Endpoint Credential Theft: How to Prevent and Tackle the Adversary Head On

Endpoint Credentials remain High-Value Targets for cybercriminals. The 2022 Verizon Data Breach Investigations Report found that nearly 50% of all data breaches are caused by stolen credentials and cost an average 4M dollars per attack. Regardless of the credential type or stored location, A myriad of tools make it possible to access these high-value targets, providing cybercriminals with a potentially clear path for exposure.

IR Playbook: Top 5 Ways to Revolutionize Incident Response

When faced with a cyber-security incident, time is of the essence. Organizations must remain agile and proactive to stay ahead of potential threats. Utilizing sophisticated security tools can help teams swiftly detect, evaluate, and contain vulnerabilities before they cause any permanent harm. Join us for a virtual discussion as experts explore five use cases that make incident response faster and more comprehensive than ever before—enabling security analysts to respond quickly and efficiently while protecting their organization from developing threats.

Supply Chain Attacks: How to Protect Against Infiltration and Sabotage

Threat actors are turning to supply chain-based attacks as a means of exploiting customer-supplier relationships to infiltrate organizations. According to Gartner predictions, nearly half the world's businesses could be affected by 2025 - a stark reminder that security measures need constant reinforcement.

AWS Cloud Performance Mini Summit

With so much to keep up on, the editors of AWSinsider.net and Virtualization & Cloud Review have created this two-hour free mini-summit covering modern real-world cloud performance best practice tips and tricks (as well as what not to do) from independent AWS cloud experts. Don't miss it!

Duration: 2 hours

Best Practices for Enterprise AWS Cloud Performance

Join Carlos Rivas, Sr. Solutions Architect, to discuss performance around Compute, Storage, and Database in AWS as it relates to the Well-Architected framework.

Duration: 1 hour

Identity, Access Management & Endpoint Protection Mini-Summit

Join the editors of Redmondmag.com have created this free, two-session mini-summit featuring real-world insights on how you can keep your organization secure. From new approaches with Zero Trust and Continuous Adaptive Risk and Trust Assessment (CARTA) to compliance issues around IAM, authentication and endpoint protection, you'll get real-world insights you don't want to miss. Register now!

Duration: 2 hours

Understanding Modern Data Analytics Platforms

What are the key components of a modern data analytics platform? Watch the webinar to learn what areas businesses are focusing on as keys for modernization and how they’re benefitting.

Speaking to the Board about Cloud Security

Whilst security leaders naturally know cloud security very well, the board and other senior leadership may not. According to the 2021 Global CISO Survey 90% of CISO’s present directly to the board. Therefore, the ability to articulate business risk to decision-makers is paramount to securing the appropriate investment in the right cybersecurity tool.

Cloud-Native Defense in Depth

Practically every organization is increasing their use of cloud infrastructure. Despite the proliferation of image scanning solutions, security remains the #1 concern. Cloud security is made difficult because it doesn’t fit into the more common perimeter-focused security model. In today’s cloud-enabled world, the perimeter of the network is an increasingly blurry line, making cloud defense in depth key to keeping your organization safe and secure from cyber threats.