Para obter uma melhor experiência web, utilize o IE11+, Chrome, Firefox ou Safari.

Retomando o controle do ciclo de vida das contas do Active Directory e Azure Active Directory

Infelizmente o evento Retomando o controle do ciclo de vida das contas do Active Directory e Azure Active Directory já expirou.

Você também pode se interessar por.

Quais itens são essenciais para uma eficiente estratégia de Segurança focada no AD- Active Directory?
Webcast sob demanda
Quais itens são essenciais para uma eficiente estratégia de Segurança focada no AD- Active Directory?
Quais itens são essenciais para uma eficiente estratégia de Segurança focada no AD- Active Directory?
O AD de fato é o principal alvo dos atacantes, estes utilizam diferentes técnicas de ataque para alcançar o objetivo e o acesso as credenciais privilegiadas é quem garantirá o sucesso.
Assista ao webcast
Disaster Recovery for Identity Bootcamp - Utrecht
Events & Seminars
Disaster Recovery for Identity Bootcamp - Utrecht
Disaster Recovery for Identity Bootcamp - Utrecht
Hands On Lab for AD recovery SAAS solution ‘Disaster Recovery for Identities - DRI’!Quest will provide Sandbox for every participant to setup and test!Please bring your laptop for hands-on
Attend Event
Ransomware defense in depth: the attack stops here
On Demand Webcast
Ransomware defense in depth: the attack stops here
Ransomware defense in depth: the attack stops here
Learn how to protect and recover Active Directory and Entra ID from ransomware attacks. Join experts for a live webcast on automated recovery, prevention strategies, and real-world success stories.
Watch Webcast
Cybersecurity Lessons from Maersk’s Former CIO
On Demand Webcast
Cybersecurity Lessons from Maersk’s Former CIO
Cybersecurity Lessons from Maersk’s Former CIO
Cybersecurity Lessons from Maersk’s Former CIO
Watch Webcast
Managing the Invisible Risk of Non Human Identities
E-book
Managing the Invisible Risk of Non Human Identities
Managing the Invisible Risk of Non Human Identities
Learn what risk non-human identities can pose to your organization, and how to mitigate that risk while retaining their usefulness
Read E-book
AD Modernization Without Compromise
On Demand Webcast
AD Modernization Without Compromise
AD Modernization Without Compromise
Discover how to optimize your environment, strengthen your security controls and ensure continuous protection throughout the process.
Watch Webcast
TEC Talk: The Trauma That Binds US: AD Disaster Recovery
On Demand Webcast
TEC Talk: The Trauma That Binds US: AD Disaster Recovery
TEC Talk: The Trauma That Binds US: AD Disaster Recovery
Find out how to stop the damage and respond with purpose in this informative, dynamic and empathetic TEC Talk where the disaster recovery lifecycle will be dissected from the seats of a technical expert, an IT risk consultant and product owner.
Watch Webcast