free-webinar-intro banner-feb-2021

Top five identity management hacks for a modern IAM system-2-Feb-banner-2021


Why attend this webinar?

Sign up for our webinar to learn the benefits of overhauling legacy identity and access management (IAM) practices, and moving forward with a latter-day approach.

Steps to adopt a Zero Trust model:

  • Recognizing common security mistakes in native systems.

  • Transitioning from manual to automated processes.

  • Implementing business workflows to authorize requests.

  • Integrating HR and IAM processes for improved productivity.

  • The benefits of modernizing IAM.

Register for this webinar

Identifying security misconfigurations that can lead to breaches-9-Feb banner-2021


Why attend this webinar?

Sophisticated, high profile breaches often get the most attention, and rightfully so. After all, traversing between multiple systems, and stealing user credentials to access sensitive data hosted on a critical machine does demand attention. But more often than not, when we start to investigate a breach, we often tend to oversee the simple configuration mistakes and managment mishaps. These simple mistakes could be the root causes of the breach, or at the very least a propagation factor.


In this webinar, we’ll:

  • Go behind-the-scenes some of the most devastating breaches on hybrid IT environments in 2020.

  • Replicate the breaches live, to analyze and determine the possible configuration errors and management practices that could’ve facilitated the breach.

  • Create a security and monitoring plan to identify misconfigured permissions, and detect and alert on anolamous activities performed under the context of the permissions.

Register for this webinar

Remote work made easy for end-users with ADSelfService Plus-10-Feb banner-2021


Why attend this webinar?


With the global outbreak of COVID-19, more organizations are adapting to work-from-home. This webinar will cover a few tips and tricks for a seamless password self-service experience for your remote users.


We will cover:

  • Password reset for remote employees

  • Password expiration notification for remote users

  • Web-based password changes for Active Directory

  • Tips for better password security

Register for this webinar

Implementing a least privilege model for hybrid Active Directory security-16-Feb banner-2021


Why attend this webinar?


Privileged, super or admin users, these jargons may be used interchangably based on context, but the fundamental meaning still remains the same. These users have more access than a standard user. Privileged access is powerful, and is tempting to use in everyday IT activties, especially when a task requires additional privileges. Privileged access is widely scattered, especially now, with organizations adopting cloud services alongside the traditional on premise IT.

In this webinar, we’ll learn:

  • To identify the various areas where privileged access has been granted in hybrid AD environments, and discover existing users with hidden privileges.

  • The different techniques to mitigate privileged access and redesign our daily IT administration tasks with the least privilege principle.

  • To develop a systematic way to monitor privileged access, detect and alert on privilege misuse in hybrid AD environment.

Register for this webinar

How to build a next-gen SOC-25-Feb banner-2021


Why attend this webinar?


Why attend this webinar?



A security operations center (SOC) is the central location from which an organization defends itself against security breaches, data theft, and identity fraud. From within the SOC, security staff work continuously to keep adversaries at bay by bringing people, processes, and technology together.

However, in these times of sophisticated attacks, organizations need to step up and build a truly next-gen SOC. They need to build a SOC that is resilient, streamlined, responsive, intelligent, and automated. But how do they do this?

Join this webinar to learn how to build a next-gen SOC.

We’ll cover:

  • Fundamental responsibilities of a SOC.

  • The importance of the incident response feedback loop.

  • Building a next-gen SOC from the ground up.

  • Detection techniques such as cloud monitoring, anomaly detection, and correlation.

  • Response techniques such as alerting, workflows, and root cause analysis.

Register for this webinar



Misconfigurations are one of the fastest-growing security risks that pave the way for threat-actors to intrude into the network. Attackers have now started to realize that leveraging existing security vulnerabilities or misconfigurations in software is a quicker way to to gain access to organizations’ sensitive resources and data. To make things more difficult, such attack techniques are difficult to detect by most traditional security solutions as they exploit the operational flaws.


In this webinar, we’ll help you:

  • Identify the various vulnerabilities and exploitable bugs that can be leveraged by threat actors to intrude into your network.

  • Understand how network misconfigurations and administration mishaps can be the root cause of a security breach, or a propagation factor.

  • Gain complete control over your network by adopting a multi-layer security approach to identify and mitigate vulnerabilities and misconfigurations across popular apps and platforms such as Active Directory (AD),Exchange Servers, cloud infrastructures such as Azure AD, network devices and more.

Register for this webinar

Alternatively you may call +35722256811 in Cyprus and in Greece +302109340288 for more information.


Why attend this webinar?

The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.

Steps to adopt a Zero Trust model:

  • Provide frictionless access with MFA and SSO

  • Validate changes with a request and approve process

  • Employ the principle of least privilege (POLP) and just-in-time (JIT) access

  • Disable accounts of former employees automatically

  • Monitor and audit privileged user activity