Active Directory security fundamentals-12.08.2020

Why attend this webinar?

Tried and true, Active Directory (AD) is solely responsible for controlling access to all the networked resources in an organization. Being the single authority for authentication and authorization, AD is the backbone of most enterprises. However, with great power comes great responsibility, right? If not configured properly and handled efficiently, AD can cause serious damage to your organization’s security posture.

In this webinar, we’ll:

  • Observe the problems associated with password creation rules in traditional in-house environments and custom cloud-based applications.

  • Eliminate password reuse, and maintain a security baseline by enforcing a uniform password policy across all logon modes.

  • Mitigate password chaos for your end users by establishing a single point of logon with single sign-on (SSO).

Top five identity management hacks for a modern IAM system-18.08.2020

Why attend this webinar?

Sign up for our webinar to learn the benefits of overhauling legacy identity and access management (IAM) practices, and moving forward with a latter-day approach.

In this webinar, you’ll learn about:

  • Improve the efficiency of the hiring and offboarding process

  • Handle employee modifications in bulk

  • Eliminate dependency on HR teams

  • Align your business needs with IT processes

  • Automate the process to reduce data entry errors

Tips and tricks for deploying a SIEM solution-19.08.2020

Why attend this webinar?

Even though security information and event management (SIEM) solutions have been around for many years, organizations still struggle to achieve effective security monitoring. SIEM solutions have certainly evolved over time, but even the most advanced AI-powered analytics won’t get the job done unless basic log management practices are in place. This webinar will help you successfully plan your SIEM deployment and ensure your plans come to fruition.

We’ll cover:

  • Important considerations while deploying a SIEM solution.

  • Fundamental capabilities of a SIEM solution.

  • The data that must be collected from your infrastructure.

  • Analytical techniques you must employ to gain actionable insights.

Secure endpoints with two-factor authentication (2FA)-25.08.2020

Why attend this webinar?

Social engineering attacks have increased and the advancements in these attacking techniques sure cause a concern about organization’s security. The easiest way to break into a network is by misusing a user’s identity. A strong password can also be compromised and we have to come to terms with password strengthening not being the only answer to protecting user accounts from these attacks.

Join our product expert in this session to learn how to boost your organization’s security with an additional layer of authentication.

In this webinar, you’ll learn how to:

  • The security incident life cycle.

  • Advanced incident detection.

  • Incident response and management.

Identifying security misconfigurations that can lead to breaches-26.08.2020

Why attend this webinar?

Sophisticated, high profile breaches often get the most attention, and rightfully so. After all, traversing between multiple systems, and stealing user credentials to access sensitive data hosted on a critical machine does demand attention. But more often than not, when we start to investigate a breach, we often tend to oversee the simple configuration mistakes and management mishaps. These simple mistakes could be the root causes of the breach, or at the very least a propagation factor.

In this webinar, we’ll:

  • Go behind-the-scenes some of the most devastating breaches on hybrid IT environments in 2020.

  • Replicate the breaches live, to analyze and determine the possible configuration errors and management practices that could’ve facilitated the breach.

  • Create a security and monitoring plan to identify misconfigured permissions, and detect and alert on anolamous activities performed under the context of the permissions.

Azure Active Directory

Why attend this webinar?


Do the right people have the right access to resources? What are the users doing with their access? Are there sufficient methods to control access? Whether your environment is a cloudless ecosystem, in the cloud, or a hybrid of both, it’s crucial to choose the right identity and access governance approach.

In this webinar, you’ll learn to:


  • Learn about various identity and access management (IAM) strategies offered by Active Directory (AD) and Azure AD.

  • Determine possible limitations of IAM approaches in AD and Azure AD.

  • Choose the right IAM strategy for on-premises, cloud, and hybrid deployments with AD360.


      Register for this webinar       

Alternatively you may call the number +35722256811 in Cyprus and in Greece +302109340288 for more information.