FREE LIVE WEBINARS
1st, 14th, 16th, 22nd, 23rd & 29th of September 2021
Webinar 1: 1st Sep 1pm EEST
IAM checklist: Get the basics covered 45 mins
READ MORE
Why attend this webinar?
A strong IAM strategy is crucial for the security of your organization’s virtual infrastructure. However, the limitations of legacy IAM solutions can hinder user experience and regulatory compliance. With a few basic rules, you can overcome the challenges and build a resilient and modern IAM system.
In this webinar, you’ll learn:
To recognize common security mistakes in native systems.
The need to transition from manual to automated processes.
Best practices for secure access management for resources.
Register for this webinar
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 2: 14th Sep 6pm EEST
Secure user identities to establish Zero Trust 45 mins
READ MORE
Why attend this webinar?
The first step to establishing zero trust in a hybrid infrastructure begins with implementing password security for all users. This should include a fail-proof password policy and multi-factor authentication (2FA) on all accounts that support it.
Learn to achieve this the ADSelfService Plus way.
Agenda:
NIST & NCSC password guidelines and best practices.
Conditional access based on risk factors.
MFA for self-service & logons.
One-click access with single sign-on.
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 3: 16th Sep 6pm EEST
Fundamentals of the cloud and the first principles of securing it. 45 mins
READ MORE
We’ll cover:
Different cloud deployment and cloud service models
Security challenges for public, private and hybrid clouds
Security challenges for SaaS, PaaS and IaaS
Cloud security recommendations
Introduction to cloud access security broker (CASB)
How ManageEngine Cloud Security Plus can help
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 4: 22nd Sep 4pm EEST
The Role of IAM in securing your hybrid IT environment 45 mins
READ MORE
Why attend this webinar?
Organizations worldwide are quickly jumping on the cloud bandwagon for cost savings. However, owing to many security implications associated with the cloud, most businesses prefer a hybrid IT environment, wherein their business-critical applications are still on-premises. In such discrete environments, it becomes increasingly difficult for the security teams to manage user identities, govern access to critical resources, enforce security, and ensure compliance with industry mandates. Using native tools to manage such tasks will only lead to more security risks in hybrid environments.
Join our in-house IAM expert, Sujith, for an insightful deep-dive on how a solid IAM strategy will help you plug the gaping security holes in your hybrid IT environment.
In this webinar, you’ll learn how to:
Implement a foolproof hybrid identity and access management strategy.
Automate routine identity-related tasks with a multi-tier, approval-based workflow.
Assign or delegate selected activities to non-administrative help desk users.
Perform full or incremental backups, and granular recovery of Active Directory objects.
Fortify your security stance with insights from over 200+ out-of-the-box, one-click reports on user logon, account and password status, and more.
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 5: 23rd Sep 5pm EEST
ManageEngine ADSelfService Plus Product Demo 45 mins
READ MORE
Why attend this webinar?
Learn how our SIEM solution – Log360, will help you thwart internal security attacks, defend your network from external attacks, protect confidential information, and meet the demanding requirements of compliance mandates.
Be a part of this live demo and learn about:
The log management process.
Reporting on crucial security events.
Searching through logs.
Triggering alerts on detecting threats.
Discovering attack patterns with the correlation engine.
Managing and responding to incidents.
Add-ons: UEBA and advanced threat analytics
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 6: 29th Aug 6pm EEST
ManageEngine ADAudit Plus Product Demo 45 mins
READ MORE
Why attend this webinar?
The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.
Steps to adopt a Zero Trust model:
Provide frictionless access with MFA and SSO.
Validate changes with a request and approve process.
Employ the principle of least privilege (POLP) and just-in-time (JIT) access.
Disable accounts of former employees automatically.
Monitor and audit privileged user activity.
Register for this webinar
REGISTER FOR THIS WEBINAR
Register for this webinar
REGISTER FOR THIS WEBINAR
Register for this webinar
Webinar 4: 25th May 1pm EEST
Why Zero Trust should be at the forefront of your IAM strategy 45 mins
Why attend this webinar?
The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.
Steps to adopt a Zero Trust model:
Provide frictionless access with MFA and SSO.
Validate changes with a request and approve process.
Employ the principle of least privilege (POLP) and just-in-time (JIT) access.
Disable accounts of former employees automatically.
Monitor and audit privileged user activity.
Alternatively you may call +35722256811 in Cyprus and in Greece +302109340288 for more information.
Webinar 1: 6th Jan 12pm EET
Why Zero Trust should be at the forefront of your IAM strategy 45 mins
Why attend this webinar?
The Zero Trust framework follows a “never trust, always verify” policy. Unlike other security models, which automatically trust individuals and devices that are already within the corporate network, Zero Trust advocates trusting no one at any time. Hence, Zero Trust should be part of any organization’s identity and access management (IAM) solution.
Steps to adopt a Zero Trust model:
Provide frictionless access with MFA and SSO
Validate changes with a request and approve process
Employ the principle of least privilege (POLP) and just-in-time (JIT) access
Disable accounts of former employees automatically
Monitor and audit privileged user activity