For the best web experience, please use IE10+, Chrome, Firefox, or Safari

Het is weer zover Quest X-pert Day! op 8 november 2018

We are sorry, the event " Het is weer zover Quest X-pert Day! op 8 november 2018" has already expired.

You may also be interested in.

On Demand Webcast

Microsoft ATA and Azure ATP – How they fit in your defense in depth security strategy?
Microsoft ATA and Azure ATP – How they fit in your defense in depth security strategy?

According to the 2018 Verizon Data Breach Investigations Report, 68% of investigated data breaches went undetected for 60 or more days. Fortunately, platform providers, such as Microsoft, are

White Paper

What Is Azure ATP and How Does It Fit into Your Security Strategy?
What Is Azure ATP and How Does It Fit into Your Security Strategy?

Being able to quickly detect and respond to threats is essential for both security and regulatory compliance. But it’s not an easy task. On the one hand, you have hackers battering your netwo

On Demand Webcast

Deciding Which Security Event Logs to Collect and How to Process Them in Your SIEM and Beyond
Deciding Which Security Event Logs to Collect and How to Process Them in Your SIEM and Beyond

Using SIEM to check every log with security value can be overwhelming and costly. Collecting logs is vital to detecting, analyzing and preventing security breaches, but not every log has to be sent

On Demand Webcast

Cybersecurity and Breaches in 2018: The Year in Review
Cybersecurity and Breaches in 2018: The Year in Review

Get this year's review for cyber attacks, from the totally new spectre & meltdown to pathetically old flash. There's plenty to learn from 2018.

On Demand Webcast

Top Nine Insider Attacks and How to Spot Them
Top Nine Insider Attacks and How to Spot Them

Data breaches, threats and loss of data is at an all-time high. In 2017 the number of data breaches hit an all-time high, a drastic 44.7% increase over the 2016 record, according to the 2017 Data Breach Year-End Review by the Identity Theft Resource Cente

On Demand Webcast

Partner Circle to now include Metalogix partners
Partner Circle to now include Metalogix partners

Partners with industry and customer expertise play a fundamental role in how we do business by helping expand our ecosystem and drive deeper into industry verticals.

On Demand Webcast

The 9 Top Insider Attacks and How to Spot Them
The 9 Top Insider Attacks and How to Spot Them

Data breaches and cybersecurity threats are at an all-time high. Insider threats, whether malicious or accidental, account for a large portion of those breaches — and it’s becoming increasingly difficult to proactively detect if insider behavior is a true

On Demand Webcast

Four Threat Detections Using AD Authentication Events
Four Threat Detections Using AD Authentication Events

Proactively detect threats in your Active Directory from both inside and outside your environment. Explore four threat detection tactics in our webcast.

Related products

Change Auditor Threat Detection
Change Auditor Threat Detection

Proactive user behavior-based threat detection for Microsoft environments

Download Free Trial

Recovery Manager for Active Directory
Recovery Manager for Active Directory

Reduce backup recovery time and costs to reduce user impact

Download Free Trial