Webinar 1: 13th Oct 1pm EEST
Identity and Access Management: A prerequisite for cybersecurity? 45 mins
Why attend this webinar?
Time and again high profile security breaches make the headlines, and often, the major reason behind most devastating security breaches are associated with the classic end user turned into an insider threat. Organizations often spend a lot of time and money building and reevaluating their existing security solutions, but if they haven’t properly secured the end-user, all these efforts can easily be rendered moot. A strong IAM solution is the need of the hour, essentially ensuring that only right people have access to resources and data at the right time—keeping unauthorized users out.
In this webinar, we’ll :
-
Discuss the key factors that influence the building/buying decision of IAM solution in 2020.
-
Examine the native platform’s built-in IAM capabilites, and find out their drawbacks.
-
Show you how to build a strong IAM foundation with ManageEngine AD360.
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 2: 14th Oct 1pm EEST
How to detect anomalous security events in the network 60 mins
Why attend this webinar?
An Active Directory user just accessed a large volume of files from a system they have never used before. Another user who normally works from 9am to 5pm logged in to a critical server at 3am. Anomalies like these can be the telltale signs of an attack in your network, and must be identified and investigated before it’s too late.
Traditional monitoring solutions need to be augmented with machine learning (ML)-based analytics to keep pace with the rapidly advancing threat landscape. Register for this webinar to learn how you can monitor your network for anomalies by using ML-based solutions.
In this webinar, we will discuss:
-
Traditional security information and event management (SIEM) solutions and their limitations.
-
Crucial anomalies you need to watch out for.
-
How user and entity behavior analytics (UEBA) works.
-
Log360’s UEBA approach to anomaly detection.
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 3: 21st Oct 1pm EEST
Implement a two-layer identity protection for your hybrid Active Directory 45 mins
Why attend this webinar?
According to Verizon’s 2020 Data Breach Investigations Report, the three kinds of attacks that account for 67% of breaches are credential theft, errors and social attacks.
With advancements in hacking techniques, even if you have strong passwords, there are high chances that the users’ identity can get compromised. Therefore, it becomes essential for you to secure your network resources with an additional layer of identity protection.
Join our product expert, Sharada Murthy, in this session to learn how to boost your organization’s security with multi-factor authentication.
In this webinar, you’ll learn how to:
-
Strengthen passwords with a granular password policy.
-
Enable two-factor authentication for both local and remote desktop logons.
-
Implement conditional access based on risk factors such as the user’s IP address, time of access, and geolocation.
-
Enforce MFA for VPN logons to protect remote workforce.
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 4: 27th Oct 12pm EET
Become cyber aware: How to defend against sophisticated attackers 45 mins
Why attend this webinar?
The goal of the cyber security awareness month — celebrated in October of every year — is to ensure that people have the resources to stay safe and secure.
We will take you over four contemporary threats that every organization faces: Living off the land, ransomware, phishing, and insider threats. We will also describe the techniques attackers use to exploit loopholes, and the best practices to defend against these threats.
This webinar will be suitable for both cyber security professionals, and people interested in cyber defense.
Webinar highlights:
-
Learning about living off the land attacks
-
Prevent phishing attacks
-
General cyber security best practices
-
Stopping ransomware attacks
-
Practical tips against Insider threats
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 5: 28th Oct 12pm EET
Windows Security 101: Protecting business sensitive data with file system auditing 45 mins
Why attend this webinar?
In today’s technology driven work climate, employees require quick and simple access to company data. Unfortunately, this race to meet with productivity standards and growing employee needs is impacting the security and safety of business critical data. File servers in the typical Windows environments act as a shared space where all users with access rights can contribute and take data as per requirement. But, this is just one side of the coin. Sensitive data is often lost, accessed, and misused by unauthorized users, the access permissions to data are illegally modified, and the native tools that audit and monitor sensitive data changes are not up to the required standard.
In this webinar, we’ll discuss:
-
Effective methods to gain visibility and demystify the tangled web of permissions across file servers and identify the location of sensitive data by analyzing its content.
-
Configure auditing to centrally Track-Audit-Secure the business-critical file servers ( Windows File Servers, NetApp filers, EMC Servers, more) in a Windows Server Environment.
-
Detect, disrupt and respond to sensitive data leaks across endpoints via USB devices, emails, printers and more.
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 6: 24th May 1pm EEST, 25th June 2pm EDT
Choosing the right enterprise IAM strategy for Active Directory and Azure Active Directory 45 mins
Why attend this webinar?
Do the right people have the right access to resources? What are the users doing with their access? Are there sufficient methods to control access? Whether your environment is a cloudless ecosystem, in the cloud, or a hybrid of both, it’s crucial to choose the right identity and access governance approach.
In this webinar, you’ll learn to:
-
Learn about various identity and access management (IAM) strategies offered by Active Directory (AD) and Azure AD.
-
Determine possible limitations of IAM approaches in AD and Azure AD.
-
Choose the right IAM strategy for on-premises, cloud, and hybrid deployments with AD360.