Identity Threat Prevention, Detection and Response-Lösungen (ITDR)
AD-Notfallwiederherstellung nach einem Ransomware-Angriff
Unified Endpoint Management für hybride Umgebungen
Marktführende Lösungen für Datenmodellierung und Data Intelligence
Datenbank-Leistungsverwaltung für verschiedenste Umgebungen
Tools für Oracle-Entwicklung und Datenbankadministration
AD-, Entra ID- und Microsoft 365-Tenant-Migration
On-Premises-AD-Konsolidierung und -Restrukturierung
Heterogene Datenbankreplikation für lokale und Cloud-Umgebungen
Hybrid-AD-Sicherheit mit vereinheitlichten Identity Threat Detection and Response(ITDR)-Funktionen
Stellen Sie geschäftliche Abläufe, die Datenintegrität und das Kundenvertrauen innerhalb von Minuten oder Stunden anstatt Wochen oder Monaten wieder her.
Befähigen Sie Untenehmens-Stakeholder, Datenbestände strategisch für Datenvorgänge, zum Datenschutz und zur Daten-Governance zu nutzen
Schützen und stellen Sie alle Ihre Systeme, Anwendungen, und Daten wieder her während Sie gleichzeitig die Kosten für die Speicherung von Backups reduzieren.
Schützen Sie mit einheitlicher Identitätssicherheit die für das Unternehmen unerlässlichen Mitarbeiter, Anwendungen und Daten
Meistern Sie Ihre nächste (aktuelle oder zukünftige) Microsoft-Migration: Ihre Endbenutzer werden nichts von der Migration bemerken.
Erkennung, Verwaltung und Absicherung neuer hybrider Arbeitsumgebungen
Minimieren Sie Risiken durch Angriffspfadverwaltung, Bedrohungserkennung und Notfallwiederherstellung
Statten Sie Ihr Unternehmen mit Sicherheitslösungen aus, die auf Identity Threat Detection and Response(ITDR)-Protokolle abgestimmt sind.
The Experts Conference (TEC) 2020 was a huge success. Our Office 365 learning track sessions were informative, in-depth and practical – and you can experience all of them on-demand, down below!
Teams Adoption can quickly get out of control. In this session, we'll cover best practices and proven techniques on settings, configuration, and customer implementations of Microsoft Teams. We'll explore governance techniques and tactics that work to handle archiving, provisioning, lifecycle management, and successful deployment.
With email being the world’s No. 1 most common exploitation method, system administrators and architects need to understand the scope of the problem. In this session, we will examine the fundamental reasons why email is such a problem in the current security landscape, common exploit methods within cloud or hybrid environments, and what we can do within Office 365 to help protect ourselves and the organizations for which we work.
Before you can use sensitivity labels effectively, you should understand the good and bad points of the technology and build a plan that works for your organization. Following this session, you’ll understand how sensitivity labels work, their relationship with Azure Information Protection and Office 365 apps (including SharePoint Online), and what needs to be done to build a deployment plan.
In this session, we’ll do a deep dive on configuration mistakes that can lead to more attacks, and how you can investigate how you are getting attacked to better protect yourself. We’ll also showcase the CIsecurity.org Office 365 benchmarks and showcase how you compare to best practice recommendations.
In this session, learn how to use the form control, along with many pro tips, such as common form logic functions and curb appeal. You’ll also see Laura Rogers build a Power Apps form in a live demo of a travel request form, which will include examples of form logic, such as showing and hiding fields per data conditions, pre-populating user information fields, and dynamic controls and validation.
Recent “stay-at-home” orders enforced around the world have accelerated the adoption of Teams, and it is easy to make common mistakes that leave exposures and security holes. In this session Quest Software’s Microsoft MVP and Teams expert Curtis Johnstone (MVP) will discuss Teams deployment considerations which affect the security and safe keeping of valuable organizational data in Teams.
Microsoft Cloud App Security (MCAS) is a hugely powerful tool that not only alerts you to bad activity, but also allows you to control what happens next. In this session, we’ll explore MCAS in depth with live demo. Using policies we’ll create here we can manage attacks, use behavior issues and more. I’ll also show how to create MCAS policies from your activity logs, which results in better security and alerting on what’s important to you.
Wählen Sie die relevanten Webcasts aus, an denen Sie teilnehmen möchten, bevor Sie sich registrieren.
Bitte warten...