Join experts Sean Metcalf and Brian Desmond as they discuss the best practices for quickly dealing with and recovering from AD security breaches.
Duration: 04:15
Learn how you can prepare for – and recover from – a destructive attack on your Active Directory.
Duration: 10:59
Organizations like yours are sprinting to Microsoft cloud services, such as Office 365 and Azure Active Directory (AD). But as your cloud — and hybrid — footprint expands, so does your security risk. That’s because in a hybrid AD environment, you face all the security limitations of native AD plus those of Azure AD. That means you need to manage double the surface area to overcome potential data breaches and insider threats caused by hackers like the star of the video above — Hank. Hank’s big prize? Your Active Directory environment. It’s his crown jewel, and, if he cracks it, he controls your network, its data, the devices on it — the whole shebang. So, are you ready to do what’s necessary to stop Hank the Hacker and a million others like him?
Duration: 01:22
Join Sean Metcalf, Microsoft Certified Master, as he discusses the most common mistakes organizations make when it comes to Active Directory security.
Duration: 03:21
See how Quest Software and One Identity can protect your organization from Hank the Hacker and other forces poised to steal AD-controlled credentials and your valuable data.
Duration: 03:10
Hank the Hacker is back and he's ready to attack your Active Directory (AD) environment, whether on-premises or in the cloud. Worse yet, this time he brought friends. With Disgruntled Dan and Careless Craig, he has even more leverage to take control. That's why it's so important to get protected.
Read this informative e-book, Nine Best Practices for AD Security, and discover what you can do to protect your environment from insider threats. Explore:
Duration: 01:32
Hank el Hacker ha vuelto dispuesto a atacar su entorno de Active Directory (AD) local o en la nube. Y lo que es peor, esta vez se ha traído a sus amigos. Con Dan el Descontento y Craig el Descuidado, tiene más oportunidades de hacerse con el control. Por eso es importante que se proteja. Lea el libro electrónico informativo Las nueve mejores prácticas de seguridad de Active Directory y descubra lo que puede hacer para proteger su entorno de las amenazas internas. Aprenderá lo siguiente: - Por qué los atacantes apuntan a AD como objetivo y cómo la creciente popularidad de Office 365 aumenta el nivel de amenaza. - Qué significa una infracción de seguridad de AD para la organización. - Por qué es difícil proteger Active Directory solo mediante la auditoría nativa. - Cómo se desarrolla una amenaza interna típica y cómo identificar indicadores comunes de amenazas internas. - De qué manera el seguimiento de las nueve prácticas recomendadas de seguridad esenciales le ayuda a minimizar el riesgo que suponen las amenazas internas para la disponibilidad, la confidencialidad y la integridad de AD.
Duration: 01:32