Prevenção, detecção e resposta a ameaças à identidade (ITDR).
Recuperação de desastres do AD contra ransomware.
Gerenciamento unificado de endpoints para ambientes híbridos.
Backup corporativo para ambientes de nuvem híbrida.
Modelagem de dados corporativos e inteligência de dados.
Gerenciamento de desempenho de banco de dados para diversos ambientes
Gerenciamento, administração e automação de bancos de dados.
Replicação para banco de dados heterogêneo no local e na nuvem.
AD, Entra ID e migração de locatário do Microsoft 365.
Consolidação e reestruturação do AD no local.
Migração de arquivos e conteúdo do SharePoint e do Microsoft 365.
Migração de arquivos de e-mail do Enterprise Vault e do SourceOne.
Recuperação do AD e do Entra ID em uma única plataforma de nuvem
Restaure as operações de negócios, a integridade dos dados e a confiança do cliente em minutos ou horas, em vez de semanas ou meses
Capacite as partes interessadas da empresa para que utilizem estrategicamente ações de dados para operações, proteção e governança de dados.
Proteja e recupere todos os seus sistemas, aplicativos e dados enquanto reduz os custos de armazenamento de backup
Conquiste a cibersegurança centrada em identidade para proteger pessoas, aplicações e dados que são essenciais para os negócios
Conquiste sua próxima migração (agora e no futuro) tornando-a um não evento para o usuário final
Descubra, gerencie e proteja ambientes híbridos de equipe de trabalho em evolução
Mitigue o risco com o gerenciamento do caminho de ataque, a detecção de ameaças e a recuperação de desastres
Equipe sua organização com soluções de segurança que se alinham aos protocolos de detecção e resposta a ameaças à identidade (ITDR).
The Experts Conference (TEC) 2020 was a huge success. Our Office 365 learning track sessions were informative, in-depth and practical – and you can experience all of them on-demand, down below!
Teams Adoption can quickly get out of control. In this session, we'll cover best practices and proven techniques on settings, configuration, and customer implementations of Microsoft Teams. We'll explore governance techniques and tactics that work to handle archiving, provisioning, lifecycle management, and successful deployment.
With email being the world’s No. 1 most common exploitation method, system administrators and architects need to understand the scope of the problem. In this session, we will examine the fundamental reasons why email is such a problem in the current security landscape, common exploit methods within cloud or hybrid environments, and what we can do within Office 365 to help protect ourselves and the organizations for which we work.
Before you can use sensitivity labels effectively, you should understand the good and bad points of the technology and build a plan that works for your organization. Following this session, you’ll understand how sensitivity labels work, their relationship with Azure Information Protection and Office 365 apps (including SharePoint Online), and what needs to be done to build a deployment plan.
In this session, we’ll do a deep dive on configuration mistakes that can lead to more attacks, and how you can investigate how you are getting attacked to better protect yourself. We’ll also showcase the CIsecurity.org Office 365 benchmarks and showcase how you compare to best practice recommendations.
In this session, learn how to use the form control, along with many pro tips, such as common form logic functions and curb appeal. You’ll also see Laura Rogers build a Power Apps form in a live demo of a travel request form, which will include examples of form logic, such as showing and hiding fields per data conditions, pre-populating user information fields, and dynamic controls and validation.
Recent “stay-at-home” orders enforced around the world have accelerated the adoption of Teams, and it is easy to make common mistakes that leave exposures and security holes. In this session Quest Software’s Microsoft MVP and Teams expert Curtis Johnstone (MVP) will discuss Teams deployment considerations which affect the security and safe keeping of valuable organizational data in Teams.
Microsoft Cloud App Security (MCAS) is a hugely powerful tool that not only alerts you to bad activity, but also allows you to control what happens next. In this session, we’ll explore MCAS in depth with live demo. Using policies we’ll create here we can manage attacks, use behavior issues and more. I’ll also show how to create MCAS policies from your activity logs, which results in better security and alerting on what’s important to you.
Selecione um ou mais webcast(s) que você tenha interesse em participar antes de se registrar.
Por favor, aguarde...