身份威胁防御、检测和响应(ITDR)。
针对勒索软件的AD灾难恢复。
适用于混合环境的统一终端管理。
混合云环境的企业备份。
企业数据建模和数据智能。
适用于不同环境的数据库性能管理
数据库管理和自动化。
适用于内部部署和云环境的异构数据库复制。
AD、Entra ID和Microsoft 365租户迁移。
内部部署AD整合与重组。
SharePoint和Microsoft 365内容和文件迁移。
Enterprise Vault和SourceOne电子邮件存档迁移。
从单一云平台恢复AD和Entra ID
无需花费数周或数月时间,只需数分钟或数小时即可恢复业务运营、数据完整性和客户信任
使企业利益相关方可以战略性地使用数据资产进行数据运营、数据保护和数据监管
保护和恢复所有系统、应用程序和数据,同时降低备份存储成本
在不对最终用户产生影响的情况下轻松完成下一次迁移(无论是现在还是未来
发现、管理并保护不断变化的混合办公环境
通过攻击路径管理、威胁检测和灾难恢复来降低风险
为您的组织配备符合身份威胁检测和响应(ITDR)协议的安全解决方案。
The Experts Conference (TEC) 2020 was a huge success. Our Office 365 learning track sessions were informative, in-depth and practical – and you can experience all of them on-demand, down below!
Teams Adoption can quickly get out of control. In this session, we'll cover best practices and proven techniques on settings, configuration, and customer implementations of Microsoft Teams. We'll explore governance techniques and tactics that work to handle archiving, provisioning, lifecycle management, and successful deployment.
With email being the world’s No. 1 most common exploitation method, system administrators and architects need to understand the scope of the problem. In this session, we will examine the fundamental reasons why email is such a problem in the current security landscape, common exploit methods within cloud or hybrid environments, and what we can do within Office 365 to help protect ourselves and the organizations for which we work.
Before you can use sensitivity labels effectively, you should understand the good and bad points of the technology and build a plan that works for your organization. Following this session, you’ll understand how sensitivity labels work, their relationship with Azure Information Protection and Office 365 apps (including SharePoint Online), and what needs to be done to build a deployment plan.
In this session, we’ll do a deep dive on configuration mistakes that can lead to more attacks, and how you can investigate how you are getting attacked to better protect yourself. We’ll also showcase the CIsecurity.org Office 365 benchmarks and showcase how you compare to best practice recommendations.
In this session, learn how to use the form control, along with many pro tips, such as common form logic functions and curb appeal. You’ll also see Laura Rogers build a Power Apps form in a live demo of a travel request form, which will include examples of form logic, such as showing and hiding fields per data conditions, pre-populating user information fields, and dynamic controls and validation.
Recent “stay-at-home” orders enforced around the world have accelerated the adoption of Teams, and it is easy to make common mistakes that leave exposures and security holes. In this session Quest Software’s Microsoft MVP and Teams expert Curtis Johnstone (MVP) will discuss Teams deployment considerations which affect the security and safe keeping of valuable organizational data in Teams.
Microsoft Cloud App Security (MCAS) is a hugely powerful tool that not only alerts you to bad activity, but also allows you to control what happens next. In this session, we’ll explore MCAS in depth with live demo. Using policies we’ll create here we can manage attacks, use behavior issues and more. I’ll also show how to create MCAS policies from your activity logs, which results in better security and alerting on what’s important to you.
注册前,请选择一个或多个您想参加的相关网络广播。
请稍候……