身份威胁防御、检测和响应(ITDR)。
针对勒索软件的AD灾难恢复。
适用于混合环境的统一终端管理。
混合云环境的企业备份。
企业数据建模和数据智能。
适用于不同环境的数据库性能管理
数据库管理和自动化。
适用于内部部署和云环境的异构数据库复制。
AD、Entra ID和Microsoft 365租户迁移。
内部部署AD整合与重组。
SharePoint和Microsoft 365内容和文件迁移。
Enterprise Vault和SourceOne电子邮件存档迁移。
从单一云平台恢复AD和Entra ID
无需花费数周或数月时间,只需数分钟或数小时即可恢复业务运营、数据完整性和客户信任
使企业利益相关方可以战略性地使用数据资产进行数据运营、数据保护和数据监管
保护和恢复所有系统、应用程序和数据,同时降低备份存储成本
在不对最终用户产生影响的情况下轻松完成下一次迁移(无论是现在还是未来
发现、管理并保护不断变化的混合办公环境
通过攻击路径管理、威胁检测和灾难恢复来降低风险
为您的组织配备符合身份威胁检测和响应(ITDR)协议的安全解决方案。
The Experts Conference (TEC) 2020 was a huge success. Our hybrid Active Directory security learning track sessions were informative, in-depth and practical – and you can experience all of them on-demand, down below!
Hybrid cloud requires integration and communication between the remaining on-prem infrastructure and the new(er) cloud services. Sean Metcalf explores hybrid cloud scenarios highlighting security implications and concerns, as well as providing recommendations. Also covered are scenarios that appear to subvert typical security and protections which involve federation configuration, Identity Access Management (IAM), and interaction between SaaS and IaaS.
Come and hear from someone who lived through the notPetya cyberattack first-hand; Gavin Aston will explore what you need to do to mitigate attacks, cover a more impactful way of achieving the funding required to deploy these security measures, and describe how organizational cohesion, collaboration, and just doing the basics will help protect you in the fight against the rapid rise of cyberattacks.
As organizations embrace digital transformations through the cloud, a hybrid enterprise infrastructure is emerging as mainstream. Come and join the Microsoft Identity Engineering team to learn patterns and best practices from the largest and most complex enterprise scenarios all over the world using Azure Active Directory to simplify, optimize and secure on-premises environments with cloud-powered Identity Services.
Applications – and the way permissions for these applications get granted – are changing. In this session, you’ll understand these new application models and how they can be abused for sustained persistence, how these permissions work, what overprivileged looks like and finally, how to find them in your environment.
In this session, Randy Franklin Smith dives into the arcane and subtle details of security dependencies between DCs, domains, forests, synchronization, replication and the other issues that arise in a global hybrid AD environment.
While the state of cyberattacks are constantly morphing, the environment in which an attack takes place limits activity down to a common set of threat actions. Nick Cavalancia will discuss the recent state of cyberattacks and how using the MITRE ATT&CK Framework as a guide can help to identify where you are most vulnerable and dictate real-world AD security best practices that can be implemented to keep AD from being a cyberattack asset.
With your data in Office 365, how can you control when, where, and how your users access data? Azure AD conditional access is a critical part of Microsoft’s answer to protecting Office 365 tenants and even third-party applications. With conditional access, you can make decisions like ensuring your users are using company issued devices, restricting downloads from SharePoint when using personal devices, inspecting documents in real time with Cloud App Security, or only allowing access to email from approved apps. In this session you’ll learn how the conditional access engine in Azure AD works. We will walk through creating conditional access policies for common scenarios and review how to troubleshoot them when something goes wrong. You’ll walk away with the knowledge you need to start enforcing effective controls to protect Office 365.
Have you ever wondered how Microsoft implements FIDO2 in a hybrid environment? Join Aakashi Kapoor and Pamela Dingle as they tour through everything an architect needs to know about WebAuthn, CTAP2 and the internal workings of Microsoft's hybrid FIDO2 implementation. You'll walk away understanding the security model and the integration steps needed to get you started, with demos and discussion of how FIDO2 can fit in the context of a multi-factor authentication strategy.
注册前,请选择一个或多个您想参加的相关网络广播。
请稍候……