ManageEngine Cybersecurity and IAM Online Seminar | December 2021 | Early Session

  • Date 07/12/2021
  • Time 13:00
  • Location Virtual
manageengine-shield-cloud-virtual-seminar-december-2021.jpg

Highlights & Benefits of this Shield Virtual Seminar

  • Watch presentations from speakers with impeccable credentials.
  • Know the best practices for Active Directory management from across the globe.
  • Learn how to set continuous change monitoring and alerting for your AD environment.
  • Know how to combat sophisticated attacks with advanced log management & security auditing techniques.
  • Learn how to reduce support calls and make your users self-help with password self-service, SSO, and password synchronization.
  • Consult with our experts. Discuss your Active Directory and IT security challenges with them.
Managing AD and Office365 the hybrid way

– Review and manage inappropriate privileges given to users.
– Standardize onboarding, modification and deprovisioning users in AD and Microsoft 365.
– Automate routine AD tasks by incorporating a business workflow.
– Empower technicians to manage AD and Microsoft 365 without delegating excessive rights.

Modern MFA to protect your system, applications and data

– Prevent attacks due to stolen or compromised passwords with 2FA.
– Empower users to seamlessly reset passwords with MFA.
– Comply with IT best practices for better passwords.
– Control access to apps and authenticators based on self-service policies.

Strengthening Cyber Security through ML and AI

– Understanding the attack surface – how ML and AI can detect Internal and external attacks.
– Importance of Hybrid Active Directory and how ML helps in predicting user behavior.
– Get to know when privileged users are under attack and re-mediate an action plan.
– Importance of data security and the need for DLP.

Components of an effective SOC: Collection, ingestion, detection and response

– Collection: Bringing in data from across the network.
– Ingestion: Transforming data into enriched and actionable information.
– Detection: Analyzing possible malicious activity and triaging events.
– Response: Managing the aftermath of an incident.

Speakers

ram-presenter-manageengine

RAM
Product expert ADSolutions
ManageEngine

megha-presenter-manageengine

MEGHA
Product expert ADSolutions
ManageEngine

SHARADA
Product expert ADSolutions
ManageEngine

harish-presenter-manageengine

HARY
Tech evangelist ADSolutions
ManageEngine