FREE LIVE WEBINARS
3rd, 11th, 17th, 18th & 19th of August 2021
Webinar 1: 3rd Aug 1pm EEST
IAM and remote work – How to stay secure? 45 mins
READ MORE
Why attend this webinar?
As COVID-19 continues to wreak havoc across the world, organizations are facing an entirely new set of challenges. With the high number of employees working from home, the challenge lies in securely managing their identities. Using ManageEngine ADManager Plus, you can fortify your network by effectively managing remote employees’ identity and access rights.
In this webinar, you’ll learn to:
-
Manage users’ logon activities and password settings in bulk.
-
Empower team managers to perform critical management operations.
-
Avoid unauthorized changes with a review-approve process.
-
Go mobile with the ADManager Plus iOS and Android apps.
Register for this webinar
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 2: 11th Aug 1pm EEST
Exploring 5 most common types of cyberattacks 45 mins
READ MORE
Why attend this webinar?
There are five very common types of cyberattacks that every organization needs to protect against. These are 1) Malware, 2) Phishing, 3) DDoS, 4) SQL injection, and 5) Brute-force.
Join us in this webinar to learn about the intricacies of each of these attacks, and how to protect yourself from them.
Agenda:
-
How malware, phishing, DDoS, SQL injection and Brute-force attacks work.
-
A live simulation of these attacks.
-
Correlating threat data to detect indicators of compromise.
-
Using ManageEngine Log360 to defend against these attacks.
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 3: 17th Aug 1pm EEST
Active Directory Password Reset for remote users 45 mins
READ MORE
Why attend this webinar?
A recent Gartner survey revealed that 47% of company leaders intend to allow employees to work remotely full-time. If users in your organization face constant trouble with remote password management, then this webinar is for you.
Agenda:
-
Schedule password expiration notifications to remote users.
-
Windows machine password can be resets for remote workers- The ADSelfService Plus way.
-
Secure Remote desktops with two-factor authentication (2FA).
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 4: 18th Aug 5pm EEST
ManageEngine DataSecurity Plus product demo 45 mins
READ MORE
Be a part of this live demo and learn how to:
Witness first-hand how our data visibility and security solution DataSecurity Plus will help you discover, monitor, and protect the sensitive data in your environment.
In this webinar, we will:
-
Monitor file integrity and gain visibility into all file accesses and changes.
-
Detect and respond to potential ransomware attacks and anomalous file activities.
-
Locate and analyze personal data (PII, PCI, and ePHI) to meet the stringent requirements of various compliance mandates.
-
Get insights on who has what permission over your critical files and folders.
-
Minimize the attack surface by managing inactive and junk data.
-
Prevent sensitive data leaks via USBs, email, and more.
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 5: 18th Aug 5pm EEST
ManageEngine Log360 product demo 45 mins
READ MORE
Why attend this webinar?
Learn how our SIEM solution – Log360, will help you thwart internal security attacks, defend your network from external attacks, protect confidential information, and meet the demanding requirements of compliance mandates.
Be a part of this live demo and learn about:
-
The log management process.
-
Reporting on crucial security events.
-
Searching through logs.
-
Triggering alerts on detecting threats.
-
Discovering attack patterns with the correlation engine.
-
Managing and responding to incidents.
-
Add-ons: UEBA and advanced threat analytics
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 6: 19th Aug 6pm EEST
ManageEngine ADManager Plus product demo 45 mins
READ MORE
Why attend this webinar?
The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.
Steps to adopt a Zero Trust model:
-
Provide frictionless access with MFA and SSO.
-
Validate changes with a request and approve process.
-
Employ the principle of least privilege (POLP) and just-in-time (JIT) access.
-
Disable accounts of former employees automatically.
-
Monitor and audit privileged user activity.
Register for this webinar
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 4: 25th May 1pm EEST
Why Zero Trust should be at the forefront of your IAM strategy 45 mins
Why attend this webinar?
The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.
Steps to adopt a Zero Trust model:
-
Provide frictionless access with MFA and SSO.
-
Validate changes with a request and approve process.
-
Employ the principle of least privilege (POLP) and just-in-time (JIT) access.
-
Disable accounts of former employees automatically.
-
Monitor and audit privileged user activity.
Alternatively you may call +35722256811 in Cyprus and in Greece +302109340288 for more information.
Webinar 1: 6th Jan 12pm EET
Why Zero Trust should be at the forefront of your IAM strategy 45 mins
Why attend this webinar?
The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.
Steps to adopt a Zero Trust model:
-
Provide frictionless access with MFA and SSO
-
Validate changes with a request and approve process
-
Employ the principle of least privilege (POLP) and just-in-time (JIT) access
-
Disable accounts of former employees automatically
-
Monitor and audit privileged user activity