300x150-logo-ma

FREE LIVE WEBINARS

1st, 14th, 16th, 22nd, 23rd & 29th of September 2021

IAM-checklist-Get-the-basics-covered-Sep-banner-2021

 

Why attend this webinar?

A strong IAM strategy is crucial for the security of your organization’s virtual infrastructure. However, the limitations of legacy IAM solutions can hinder user experience and regulatory compliance. With a few basic rules, you can overcome the challenges and build a resilient and modern IAM system.

In this webinar, you’ll learn:

  • To recognize common security mistakes in native systems.

  • The need to transition from manual to automated processes.

  • Best practices for secure access management for resources.

Register for this webinar

Secure-user-identities-to-establish-Zero-Trust-Sep-banner-2021

Why attend this webinar?

The first step to establishing zero trust in a hybrid infrastructure begins with implementing password security for all users. This should include a fail-proof password policy and multi-factor authentication (2FA) on all accounts that support it.
Learn to achieve this the ADSelfService Plus way.

Agenda:

  • NIST & NCSC password guidelines and best practices.

  • Conditional access based on risk factors.

  • MFA for self-service & logons.

  • One-click access with single sign-on.

Register for this webinar

Fundamentals-of-the-cloud-and-the-first-principles-of-securing-it.-Sep-banner-2021

We’ll cover:

  • Different cloud deployment and cloud service models

  • Security challenges for public, private and hybrid clouds

  • Security challenges for SaaS, PaaS and IaaS

  • Cloud security recommendations

  • Introduction to cloud access security broker (CASB)

  • How ManageEngine Cloud Security Plus can help

Register for this webinar

The-Role-of-IAM-in-securing-your-hybrid-IT-environment-Sep-banner-2021

Why attend this webinar?

Organizations worldwide are quickly jumping on the cloud bandwagon for cost savings. However, owing to many security implications associated with the cloud, most businesses prefer a hybrid IT environment, wherein their business-critical applications are still on-premises. In such discrete environments, it becomes increasingly difficult for the security teams to manage user identities, govern access to critical resources, enforce security, and ensure compliance with industry mandates. Using native tools to manage such tasks will only lead to more security risks in hybrid environments.
Join our in-house IAM expert, Sujith, for an insightful deep-dive on how a solid IAM strategy will help you plug the gaping security holes in your hybrid IT environment.

In this webinar, you’ll learn how to:

  • Implement a foolproof hybrid identity and access management strategy.

  • Automate routine identity-related tasks with a multi-tier, approval-based workflow.

  • Assign or delegate selected activities to non-administrative help desk users.

  • Perform full or incremental backups, and granular recovery of Active Directory objects.

  • Fortify your security stance with insights from over 200+ out-of-the-box, one-click reports on user logon, account and password status, and more.

Register for this webinar

ManageEngine-ADSelfService-Plus-Product-Demo-Sep-banner-2021

 

Why attend this webinar?

Learn how our SIEM solution – Log360, will help you thwart internal security attacks, defend your network from external attacks, protect confidential information, and meet the demanding requirements of compliance mandates.

Be a part of this live demo and learn about:

  • The log management process.

  • Reporting on crucial security events.

  • Searching through logs.

  • Triggering alerts on detecting threats.

  • Discovering attack patterns with the correlation engine.

  • Managing and responding to incidents.

  • Add-ons: UEBA and advanced threat analytics

Register for this webinar

ManageEngine-ADAudit-Plus-Product-Demo-Sep-banner-2021

 

Why attend this webinar?

The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.

Steps to adopt a Zero Trust model:

  • Provide frictionless access with MFA and SSO.

  • Validate changes with a request and approve process.

  • Employ the principle of least privilege (POLP) and just-in-time (JIT) access.

  • Disable accounts of former employees automatically.

  • Monitor and audit privileged user activity.

Register for this webinar
Register for this webinar

Why-Zero-Trust-should-be-at-the-forefront-of-your-IAM-strategy-May-banner-2021

Why attend this webinar?

The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.

Steps to adopt a Zero Trust model:

  • Provide frictionless access with MFA and SSO.

  • Validate changes with a request and approve process.

  • Employ the principle of least privilege (POLP) and just-in-time (JIT) access.

  • Disable accounts of former employees automatically.

  • Monitor and audit privileged user activity.

Alternatively you may call +35722256811 in Cyprus and in Greece +302109340288 for more information.

ma-jan-6-cit-free-webinar

Why attend this webinar?

The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.

Steps to adopt a Zero Trust model:

  • Provide frictionless access with MFA and SSO

  • Validate changes with a request and approve process

  • Employ the principle of least privilege (POLP) and just-in-time (JIT) access

  • Disable accounts of former employees automatically

  • Monitor and audit privileged user activity