Para obter uma melhor experiência web, utilize o IE11+, Chrome, Firefox ou Safari.

Webinar: Simplificando Auditorías y Reportería en Office 365

Infelizmente o evento Webinar: Simplificando Auditorías y Reportería en Office 365 já expirou.

Você também pode se interessar por.

5 critical challenges in identity security
White Paper
5 critical challenges in identity security
5 critical challenges in identity security
Discover five key challenges to effective identity security today — and how Quest Security Guardian can help you overcome all of them.
Read White Paper
Protecting Active Directory from Modern Attacks: How Change Auditor Defends the NTDS.dit File
On Demand Webcast
Protecting Active Directory from Modern Attacks: How Change Auditor Defends the NTDS.dit File
Protecting Active Directory from Modern Attacks: How Change Auditor Defends the NTDS.dit File
Learn how attackers target NTDS.dit and how Quest helps you stay ahead of evolving security threats.
Watch Webcast
Shields Up: Disrupting Identity Attacks in Flight
On Demand Webcast
Shields Up: Disrupting Identity Attacks in Flight
Shields Up: Disrupting Identity Attacks in Flight
Delve into the rising threat landscape, emphasizing the critical need for rapid response mechanisms—akin to a panic button—when an imminent threat is detected.
Watch Webcast
TEC Talk: What's New in Conditional Access Policies and Why You Should Care
On Demand Webcast
TEC Talk: What's New in Conditional Access Policies and Why You Should Care
TEC Talk: What's New in Conditional Access Policies and Why You Should Care
Dive into the significance of configuring a strong conditional access baseline and demonstrate how integrating new features can enhance protection.
Watch Webcast
Change Auditor: Predict, Prevent, Protect – Your Security Shield for AD & Entra ID
On Demand Webcast
Change Auditor: Predict, Prevent, Protect – Your Security Shield for AD & Entra ID
Change Auditor: Predict, Prevent, Protect – Your Security Shield for AD & Entra ID
This webinar will showcase how Change Auditor helps organizations prevent attacks, safeguard critical assets, and strengthen their Zero Trust strategies.
Watch Webcast
TEC Talk: Trust, Verify, and Govern: Advancing Beyond Authentication in the Cloud and AI Era
On Demand Webcast
TEC Talk: Trust, Verify, and Govern: Advancing Beyond Authentication in the Cloud and AI Era
TEC Talk: Trust, Verify, and Govern: Advancing Beyond Authentication in the Cloud and AI Era
Covering the progression of identity governance, moving from traditional on-premises methodologies to contemporary approaches in a technology-driven world.
Watch Webcast
TEC Talk Understanding Power BI Tenant to Tenant Migration Concepts and Component Dependencies
On Demand Webcast
TEC Talk Understanding Power BI Tenant to Tenant Migration Concepts and Component Dependencies
TEC Talk Understanding Power BI Tenant to Tenant Migration Concepts and Component Dependencies
This session provides an understanding of the Power BI Service components and how these link together in order to plan and perform a migration of Power BI Workspaces.
Watch Webcast
TEC Talk: Fantastic Tokens in Microsoft Entra ID and How to Protect Them
On Demand Webcast
TEC Talk: Fantastic Tokens in Microsoft Entra ID and How to Protect Them
TEC Talk: Fantastic Tokens in Microsoft Entra ID and How to Protect Them
Token artifacts take the essential role in the process of verifying identity of the user and obtaining an access to resources in Microsoft Entra. It's important to consider token theft scenarios which allow to steal those artifacts and use them elsewhere.
Watch Webcast