For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Sind Sie auf eine AD-Katastrophe vorbereitet?

We are sorry, the event "Sind Sie auf eine AD-Katastrophe vorbereitet?" has already expired.

You may also be interested in.

Online Event

Invitación: ¿Estás preparado para recuperar tu AD de un ciberataque?
Invitación: ¿Estás preparado para recuperar tu AD de un ciberataque?

El daño colateral de un ataque al AD es expansivo y extremadamente destructivo, ya que se trata del corazón de la infraestructura Microsoft de una empresa: si el AD se ve afectado, todos los servicios dependientes estarán afectados. Los procedimientos nativos de recuperación son complejos, provocando que la organización no se recupere en un periodo de tiempo corto y que el coste derivado de una parada productiva pueda ser elevado. 

On Demand Webcast

How to Audit Remote and VPN logon activity during the WFH surge
How to Audit Remote and VPN logon activity during the WFH surge

VPNs are overloaded due to the work from home surge, and the number of daily remote logon sessions is skyrocketing. Bad actors are taking advantage of this chaos by trying to exploit VPN vulnerabiliti

On Demand Webcast

Extra Vigilance: Top 3 Ways to Adapt Your Security Log Monitoring for the Surge in Working from Home
Extra Vigilance: Top 3 Ways to Adapt Your Security Log Monitoring for the Surge in Working from Home

With the rapid increase of employees working from home, you will need to throw out your old baseline of normal audit activity – especially on the network plane. Users are working on insecure

E-book

Three ways a privileged user can hose your Active Directory
Three ways a privileged user can hose your Active Directory

This eBook reviews insider threats and eight AD security best practices to reduce risk and recovery time.

On Demand Webcast

Top 5 Office 365 and Azure AD Security Events to Monitor During the COVID-19 Crisis
Top 5 Office 365 and Azure AD Security Events to Monitor During the COVID-19 Crisis

Increase in remote workers means explosive adoption and utilization of Office 365 workloads such as Teams, SharePoint Online, OneDrive for Business and Exchange Online. Malicious actors can tr

Online Event

New Rules for Security Automation in Education
New Rules for Security Automation in Education

IT professionals in the .edu community – especially colleges – have just been through the most dramatic sea change in history, taking employees and many students remote.As this niche workforce becomes “flexible,” some will return to campus, others staying remote, some doing both. So, there are new rules for securely managing your Active Directory now an into the future. First, automate. Secondly, be able to enable decision makers in different department

On Demand Webcast

Effectively Consolidate File Shares during the Work from Home Surge
Effectively Consolidate File Shares during the Work from Home Surge

For years, users have maintained their own file shares in whatever place made sense to/for them. But with so many of

On Demand Webcast

Office 365 Security and Active Directory — From On Premises to the Cloud
Office 365 Security and Active Directory — From On Premises to the Cloud

In this webcast, explore why Active Directory plays a critical part in your cloud environment and how to determine how secure your cloud data truly is.