7th, 9th, 14th, 22nd, 23rd, 28th & 29th of June 2022


Why attend this webinar?

Exploited credentials were found to be the driving force for over 61% of all data breaches. Passwords should be a thing of the past, considering how much of a security risk they are. However, given how widespread their usage is, passwords don’t seem to be going away any time soon. While the rest of the world is slowly moving towards a password-less future, the best thing you can do right now to protect yourself is implement a hybrid authentication system that makes use of biometrics and MFA.

This webinar details the importance of layering your passwords with additional security tiers like security tokens and identities. Simply including a hardware authenticator or MFA process to your logins can give you the protection you need without having to compromise on user convenience. Join the webinar to find out how you can implement hybrid authentication in your organization today.

  • Endpoint Multi Factor Authentication

  • Authentication using Yubikey, Google Authenticator, and more

  • MFA-enabled single sign-on

Register for this webinar


Why attend this webinar?

With remote and hybrid work environments becoming prevalent, there has been a stark increase in data breaches. As the magnitude of breaches increases, governments aim to improve the status quo by mandating strict compliance requirements to protect personally identifiable information. However, fulfilling these compliance requirements has become complicated for the organizations involved. This webinar will help you ace compliance in the era of stringent regulatory standards.

What we’ll be covering:
  • Changes in the digital landscape with the proliferation of hybrid work environments

  • Challenges to data privacy during the current COVID-19 scenario

  • Overview of existing compliance mandates:

    • EU General Data Protection Regulation (GDPR)

    • California Consumer Privacy Act (CCPA)

    • Sarbanes – Oxley (SOX) Act

    • Payment Card Industry Data Security Standard (PCI DSS)

    • Federal Information Security Management Act (FISMA)

  • Upcoming compliance regulations you should know about

  • Why you should care about compliance and the cost of non-compliance

  • Integrated compliance management with Log360

Register for this webinar

Why attend this webinar?

Witness first-hand how ManageEngine’s ADAudit Plus can help you easily meet the security and compliance needs in your Windows Server environment.

Be a part of this live demo and learn how to:

  • Audit your Windows AD environment in real time, the easy way

  • Identify the source of account lockouts

  • Get real-time alerts via email whenever a configured AD change event occurs

  • Audit every single change made to Group Policy Objects

  • Fend off insider threats with User Behavior Analytics

  • Monitor and report on Service Accounts in your AD environment

Register for this webinar


Why attend this webinar?

Attend our exclusive webinar and learn how ADManager Plus will help you provide the much-needed ability to delegate routine Active Directory, Exchange, Office 365 and Google Workspace management tasks to non-admin users and also backup all changes in AD and recover AD objects without any hassles.

In this webinar, we will show you how to:

  • Delegate Active Directory, Office 365 and Google Workspace management and reporting capabilities to help desk technicians without elevating their privileges in Native

  • Site based delegation on AD Operation

  • Granularly backup all AD objects like users, groups, GPOs, OUs, Exchange attributes, computers, contacts, etc.

  • Recover your AD objects completely or granularly without restarting your domain controllers

  • Avoid wasting storage space with incremental backups

  • Restore individual attributes of AD objects to any of their backed-up states

Register for this webinar


Why attend this webinar?

Malware threats are evolving every single day. Most Malware attacks follow all or most of the following attack techniques- Phishing, macros execution, payload download, credential access, process execution, lateral movement, and data exfiltration.

However, the attack chain doesn’t stop here. Most sophisticated Malware attacks end with installation of another malware or ransomware to further the attack. Attackers make it a point to lurk in your network for prolonged periods for time without being detected. In this webinar, we’re going to demystify world’s top five Malware attacks and how you can detect and remediate them using a comprehensive SIEM solution.

What’s in store for you?

  • Malware attack landscape and how to interpret it with the MITRE ATT&CK matrix

  • Attack anatomy for the following malware attacks:

    • Mirai malware

    • Emotet malware

    • Qakbot malware

    • Coinminer malware

    • Dridex malware

  • Detection and mitigation of the above mentioned ransomware threats using a SIEM tool

Register for this webinar


Why attend this webinar?

Managing users and resources requires constant vigilance, because lying within your perimeter is one of the greatest risks to your organization: malicious insiders. All it takes is one weak link in your IT management process for a cybersecurity incident to happen.

In this webinar, you will learn how to:

  • Protect against unauthorized changes and avoid privilege escalations

  • Minimize risks with automated access management for new hires and former employee accounts

  • Build an airtight security strategy with ManageEngine

Register for this webinar

Alternatively you may call +35722256811 in Cyprus and in Greece +302109354833 for more information.