Webinar 1: 8th July 1pm EEST, 9th July 11am EDT
Eliminating password chaos for on-premises and cloud ecosystems 45 mins
Why attend this webinar?
Password chaos (also known as identity chaos) is when users have multiple identities and passwords across a variety of applications, networks, distributions, and computing devices. With most organizations adopting a hybrid approach, a host of problems are introduced such as password reuse, varying levels of password security for different applications, and more, which jeopardizes security.
In this webinar, we’ll:
-
Observe the problems associated with password creation rules in traditional in-house environments and custom cloud-based applications.
-
Eliminate password reuse, and maintain a security baseline by enforcing a uniform password policy across all logon modes.
-
Mitigate password chaos for your end users by establishing a single point of logon with single sign-on (SSO).
Webinar 2: 14th July 1pm EEST, 15th July 11am EDT
Eliminating password chaos for on-premises and cloud ecosystems 45 mins
Why attend this webinar?
For IT administrators, it can be a challenge to work in tandem with HR to carry out activities like employee onboarding and offboarding. By unifying your Active Directory with enterprise human resource management system (HRMS) tools, you can effortlessly synchronize and protect employee data across platforms.
By attending this webinar, you will learn to:
-
Improve the efficiency of the hiring and offboarding process
-
Handle employee modifications in bulk
-
Eliminate dependency on HR teams
-
Align your business needs with IT processes
-
Automate the process to reduce data entry errors
Webinar 3: 15th July 1pm EEST, 16th July 2pm EDT
Protect against new cybersecurity threats with your SIEM 45 mins
Why attend this webinar?
The threat landscape has evolved greatly in the last few years, with cyber attackers employing sophisticated techniques, tactics, and procedures to take down organizations. Some of these new techniques are fileless malware, and living-off-the-land attacks. These novel methods enable attackers to fly under the radar, and evade detection.
This means that organizations need to be even more vigilant than ever before. They need to use their SIEM solution in the best way possible to ward off these attacks.
Join this webinar to learn how you can protect against new cybersecurity threats with your SIEM.
We’ll cover:
-
The anatomy of a fileless malware attack.
-
The anatomy of a living-off-the-land attack.
-
Insider threats as a new attack vector.
-
Detecting, analyzing, and responding to new attack vectors.
-
Using alerts, and automated workflows to harden security.
Webinar 4: 22th July 1pm EEST, 23th July 2pm EDT
How to effectively detect and respond to security threats 45 mins
Why attend this webinar?
In recent years, security information and event management (SIEM) solutions have evolved far beyond the basic incident detection features they’re typically known for. From the use of advanced analytics to detect network anomalies to built-in support for incident response workflows, SIEM solutions are now capable of supporting organizations across the entire security incident life cycle. Join our webinar to learn about these advanced capabilities and how you can use SIEM to detect and defeat threats to your network.
We will cover:
-
The security incident life cycle.
-
Advanced incident detection.
-
Incident response and management.
Webinar 5: 29th July 1pm EEST, 30th July 2pm EDT
Hybrid IT essentials that you can’t live without 45 mins
Enterprises are increasingly adopting a hybrid IT approach: a fusion of in-house and cloud distributions. While hybrid infrastructure has its own advantages, the components in a hybrid environment operate in silos (seperate entities). The lack of orchestration between in-house and cloud distributions makes visibility, administration, and enforcing security a challenging task.
We will cover:
-
Gain valuable insights into the key components of your hybrid deployments, namely Active Directory (AD) and Azure AD.
-
Streamline administration and management tasks across on-premises and cloud applications like Office365, Exchange etc.
-
Configure auditing and enforce security across the critical parts of your hybrid infrastructure.
Webinar 6: 24th May 1pm EEST, 25th June 2pm EDT
Choosing the right enterprise IAM strategy for Active Directory and Azure Active Directory 45 mins
Why attend this webinar?
Do the right people have the right access to resources? What are the users doing with their access? Are there sufficient methods to control access? Whether your environment is a cloudless ecosystem, in the cloud, or a hybrid of both, it’s crucial to choose the right identity and access governance approach.
In this webinar, you’ll learn to:
-
Learn about various identity and access management (IAM) strategies offered by Active Directory (AD) and Azure AD.
-
Determine possible limitations of IAM approaches in AD and Azure AD.
-
Choose the right IAM strategy for on-premises, cloud, and hybrid deployments with AD360.