ma-free-webinars-intro-banner-nov-2020

Mastering-Active-Directory-and-Azure-AD-administration-Nov-4

Why attend this webinar?

Remember the old days when IT environments were on-premise? Machines were on-premise, data was stored in house, users had a single domain-joined account, and even apps were hosted on-premises. Ever since companies have started to embrace the cloud, the IT landscape is becoming difficult to protect and administer. Users have more than a single identity (hybrid identities), workload and company data are now scattered between on-premise and public cloud deployments. This hybrid approach may be a ‘transitional state’ before shifting fully to the cloud, but for most companies, it is just a business model that makes logical sense. Either ways, hybrid IT will continue to be the norm for years to come, and we must adopt a systematic administration strategy.

In this webinar, we’ll :

  • Observe in depth the core administration concepts on traditional on-premise deployments like Active Directory (AD) and public cloud infrastructures like Azure AD.

  • Observe the drawbacks of native features and tools that are used for routine IT management tasks and for enforcing security.

  • Overcome the limitations by adopting a systematic approach to streamline critical administration tasks in AD and Azure AD, and also enforce a strategy to prevent security incidents with ManageEngine AD360.

Register for this webinar

SIEM-for-beginners-Nov-10--Log360

 

Why attend this webinar?

Security professionals are tasked with the hardest job there is. When things are running smoothly, they are taken for granted. But when things go wrong, that is when they enter the spotlight. A SIEM solution can go a long way in helping you achieve network security. By properly deploying a SIEM solution, not only can you mitigate security threats but also ensure that your enterprise meets stringent compliance mandates. Our IT security specialist, Sid, will help you get started with SIEM in this webinar and answer your questions in the live chat session.

 

Agenda

  • Latest trends and challenges in SIEM.

  • Important security events you need to watch out for in your network.

  • SIEM attack mitigation use cases.

  • How to select a SIEM solution: questions to ask your vendor.

  • Overview of Log360, ManageEngine’s comprehensive SIEM solution.

Register for this webinar

Synchronize-IAM-and-HRMS-for-seamless-employee-life-cycle-management-Nov-10

Why attend this webinar?

For IT administrators, it can be a challenge to work in tandem with HR to carry out activities like employee onboarding and offboarding. By unifying your Active Directory with enterprise human resource management system (HRMS) tools, you can effortlessly synchronize and protect employee data across platforms.

In this webinar, you’ll learn how to:

  • S Improve the efficiency of the hiring and offboarding process

  • Handle employee modifications in bulk

  • Eliminate dependency on HR teams

  • Align your business needs with IT processes

  • Automate the process to reduce data entry errors

Find-weak-Active-Directory-passwords---Enforce-a-custom-granular-password-policy-Nov-18

Why attend this webinar?

 

Do you know that “[email protected]” is easily susceptible to a cyberattack? Though it satisfies all the requirements of a basic password policy—the password contains a special character, a number, and an alphabet in the upper case—it is password that is so common that a dictionary attack can crack it in no time.

Passwords are our first layer of defense.

Learn how hackers can easily crack passwords which comply with Microsoft’s default password policies. ADSelfService Plus can not only identify users with weak passwords but also how easy it is to create and enforce strong password policy for Active Directory and all connected enterprise applications.

Join this webinar and learn how to:

  • Identify users who have a weak password with the Weak Password Users Report FREE tool.

  • Create custom password policies that restrict dictionary words and predictable patterns.

  • Granularly enforce a password policy across several popular on-premises and cloud applications.

  • Enforce this custom password policy on the change and reset password pages, i.e., Ctrl+Alt+Del screen as well as ADUC console.

Register for this webinar

How-to-budget-for-an-effective-security-analytics-solution-Nov-24

Why attend this webinar?

An effective security analytics or SIEM solution is critical for keeping the sensitive data assets of an organization safe.
But how do you calculate the cost of a SIEM solution that is right for your organization? How can you develop a plan and make sure that your money is allocated to those things that support your security objectives? You need to ensure that you spend as less as possible while getting maximum value.
Join us for the webinar, How to budget for an effective security analytics solution, to learn more.

Webinar highlights:

  • The modern cybersecurity landscape and threat environment.

  • Factors that increase security risk and deployment costs.

  • Pricing models of security analytics solutions.

  • Understanding what features are most important for your company

  • Building a budget allocation plan.

  • Reviewing the plan for continuous improvement.

Register for this webinar

10-security-vulnerabilities-that-excite-hackers-24-nov-2020

 

Misconfigurations are one of the fastest-growing security risks that pave the way for threat-actors to intrude into the network. Attackers have now started to realize that leveraging existing security vulnerabilities or misconfigurations in software is a quicker way to to gain access to organizations’ sensitive resources and data. To make things more difficult, such attack techniques are difficult to detect by most traditional security solutions as they exploit the operational flaws.

 

In this webinar, we’ll help you:

  • Identify the various vulnerabilities and exploitable bugs that can be leveraged by threat actors to intrude into your network.

  • Understand how network misconfigurations and administration mishaps can be the root cause of a security breach, or a propagation factor.

  • Gain complete control over your network by adopting a multi-layer security approach to identify and mitigate vulnerabilities and misconfigurations across popular apps and platforms such as Active Directory (AD),Exchange Servers, cloud infrastructures such as Azure AD, network devices and more.




Register for this webinar

Alternatively you may call the number +35722256811 in Cyprus and in Greece +302109340288 for more information.