Identity threat prevention, detection and response (ITDR).
AD disaster recovery from ransomware.
Unified endpoint management for hybrid environments.
Market-leading data modeling and data intelligence solutions.
Database performance management for diverse environments.
Oracle development and database admin tools.
AD, Entra ID and Microsoft 365 tenant migration.
On-premises AD consolidation and restructuring.
Heterogeneous database replication for on-prem & cloud.
Hybrid AD security with unified identity threat detection and response (ITDR) capabilities.
Restore business operations, data integrity and customer trust in minutes or hours instead of weeks or months
Empower enterprise stakeholders to use data assets strategically for data operations, data protection and data governance
Protect and recover all your systems, applications and data while reducing backup storage costs
Achieve identity-centric cybersecurity to protect the people, applications and data that are essential to business
Conquer your next migration (now and in the future) by making it a non-event for end users
Discover, manage and secure evolving hybrid workforce environments
Mitigate risk with attack path management, threat detection and disaster recovery
Equip your organization with security solutions that align with Identity Threat Detection and Response (ITDR) protocols.
The Experts Conference (TEC) 2020 was a huge success. Our Office 365 learning track sessions were informative, in-depth and practical – and you can experience all of them on-demand, down below!
Teams Adoption can quickly get out of control. In this session, we'll cover best practices and proven techniques on settings, configuration, and customer implementations of Microsoft Teams. We'll explore governance techniques and tactics that work to handle archiving, provisioning, lifecycle management, and successful deployment.
With email being the world’s No. 1 most common exploitation method, system administrators and architects need to understand the scope of the problem. In this session, we will examine the fundamental reasons why email is such a problem in the current security landscape, common exploit methods within cloud or hybrid environments, and what we can do within Office 365 to help protect ourselves and the organizations for which we work.
Before you can use sensitivity labels effectively, you should understand the good and bad points of the technology and build a plan that works for your organization. Following this session, you’ll understand how sensitivity labels work, their relationship with Azure Information Protection and Office 365 apps (including SharePoint Online), and what needs to be done to build a deployment plan.
In this session, we’ll do a deep dive on configuration mistakes that can lead to more attacks, and how you can investigate how you are getting attacked to better protect yourself. We’ll also showcase the CIsecurity.org Office 365 benchmarks and showcase how you compare to best practice recommendations.
In this session, learn how to use the form control, along with many pro tips, such as common form logic functions and curb appeal. You’ll also see Laura Rogers build a Power Apps form in a live demo of a travel request form, which will include examples of form logic, such as showing and hiding fields per data conditions, pre-populating user information fields, and dynamic controls and validation.
Recent “stay-at-home” orders enforced around the world have accelerated the adoption of Teams, and it is easy to make common mistakes that leave exposures and security holes. In this session Quest Software’s Microsoft MVP and Teams expert Curtis Johnstone (MVP) will discuss Teams deployment considerations which affect the security and safe keeping of valuable organizational data in Teams.
Microsoft Cloud App Security (MCAS) is a hugely powerful tool that not only alerts you to bad activity, but also allows you to control what happens next. In this session, we’ll explore MCAS in depth with live demo. Using policies we’ll create here we can manage attacks, use behavior issues and more. I’ll also show how to create MCAS policies from your activity logs, which results in better security and alerting on what’s important to you.
Select one or more relevant webcast(s) you wish to attend before you register.
Please wait...