UPCOMING WEBINAR

Tracking and shutting down ransomware

Ransomware is a growing concern and for good reason. Ransomware can encrypt all of your data, forcing you to pay to get it back (if you ever will) or restore from backup. Once ransomware starts, it is hard to stop, but the key is to negate it from spreading to other servers and data on your network. Therefore you need to be notified when ransomware starts encrypting data and have action taken immediately to prevent the spread. Derek Melber will walk you through a live demonstration of how this can be done, showing you step-by-step the solution. In this webinar you will learn:

September 21 2017 - 02 PM EDT Register for free!

Tracking and shutting down ransomware

Ransomware is a growing concern and for good reason. Ransomware can encrypt all of your data, forcing you to pay to get it back (if you ever will) or restore from backup. Once ransomware starts, it is hard to stop, but the key is to negate it from spreading to other servers and data on your network. Therefore you need to be notified when ransomware starts encrypting data and have action taken immediately to prevent the spread. Derek Melber will walk you through a live demonstration of how this can be done, showing you step-by-step the solution. In this webinar you will learn:

21 September 02 PM EDT
Hosted by Derek
Register for free!

Single sign-on simplified- One Identity for 80+ applications

Today's enterprises- small, medium or large demand the usage of a handful of critical applications on which their business depends. Employees access these applications on a daily basis.

26 September 12 PM IST
Hosted by Sharada
Register for free!

Single sign-on simplified- One Identity for 80+ applications

Today's enterprises- small, medium or large demand the usage of a handful of critical applications on which their business depends. Employees access these applications on a daily basis.

27 September 02 PM BST
Hosted by Sharada
Register for free!

Single sign-on simplified- One Identity for 80+ applications

Today's enterprises- small, medium or large demand the usage of a handful of critical applications on which their business depends. Employees access these applications on a daily basis.

27 September 02 PM EDT
Hosted by Sharada
Register for free!

The Future of Integrated Identity and Access Management

'Identities' are the most fundamental building block of any business. Enterprises are embracing and all geared up for leveraging Identity and Access Management to the fullest. Microsoft's Active Directory (AD) is at the top of the game as the most acknowledged and widely used enterprise repository for digital identities. This webinar is designed to equip organizations that seek to demonstrate both quantifiable savings and reap real world business benefits -- helping you set up a simple yet secure user AD User life cycle and access management system.

28 September 11 AM AEST
Hosted by Jay
Register for free!

The Future of Integrated Identity and Access Management

'Identities' are the most fundamental building block of any business. Enterprises are embracing and all geared up for leveraging Identity and Access Management to the fullest. Microsoft's Active Directory (AD) is at the top of the game as the most acknowledged and widely used enterprise repository for digital identities. This webinar is designed to equip organizations that seek to demonstrate both quantifiable savings and reap real world business benefits -- helping you set up a simple yet secure user AD User life cycle and access management system.

3 October 02 PM EDT
Hosted by Jay
Register for free!

Log management best practices for SIEM

You know you need a SIEM solution, but which one? Attend this webinar to learn all about SIEM and the 6 log management best practices that you need to look for in a SIEM solution from Siddharth, our IT security product specialist.

4 October 02 PM EDT
Hosted by Siddharth
Register for free!

Combating network threats with comprehensive network device auditing

What could be more important to network security than auditing your network devices! Your network device Syslogs contain vital information about network security, and extracting this information is vital for a security operations center. Learn how you can combat network threats with auditing and alerting in this webinar by Siddharth, our IT security product specialist.

4 October 12 PM IST
Hosted by Siddharth
Register for free!

A comprehensive walk-through of Active Directory auditing in 40 minutes

When enterprises think of threats, they usually think only about those that are external, and often aren't equipped to deal with ones that stem internally. If your enterprise uses Active Directory, then you would know the challenges of securing it. A single change made to a critical component such as a DC or GPO in Active Directory can jeopardize the security of your enterprise.

12 October 02 PM EDT
Hosted by Siddharth
Register for free!

Auditing 101: Stay compliant and secure your enterprise with SIEM

Security professionals are tasked with the hardest job there is. When things are running smoothly, they are taken for granted. But when things go wrong, that is when they enter the spotlight. To ensure security in your enterprise, it is important to be educated about the latest trends in cyber threats and also have the right set of tools and processes in place in your security operations center.

1 November 12 PM IST
Hosted by Siddharth
Register for free!

Auditing 101: Stay compliant and secure your enterprise with SIEM

Security professionals are tasked with the hardest job there is. When things are running smoothly, they are taken for granted. But when things go wrong, that is when they enter the spotlight. To ensure security in your enterprise, it is important to be educated about the latest trends in cyber threats and also have the right set of tools and processes in place in your security operations center.

2 November 02 PM GMT
Hosted by Siddharth
Register for free!

Get GDPR Ready

A little less than a year from now, the European Union will implement the General Data Protection Regulation (GDPR) on May 25th, 2018. This regulation outlines how organizations—both commercial and non-commercial—must control and process EU residents' personal data.

7 November 02 PM GMT
Hosted by Derek
Register for free!

Customizing monitoring and alerting for Active Directory changes and access

Every IT environment is different. It is impossible to create a tool that provides built-in capabilities for all of your needs. The key is to have a customization interface that gives you easy and efficient capabilities to develop and solve your own custom monitoring and alerting needs. In this webinar Derek Melber will walk you through the finer details of creating your own custom reports and alerts, giving you the foundation to create your own.

8 November 02 PM EST
Hosted by Derek
Register for free!

5 Myths of Group Policy

Group Policy is a seasoned, yet still intimidating, technology. Every Active Directory environment uses Group Policy, which it should. There are, however, some misconceptions regarding Group Policy that every administrator needs to be made aware of. In this webinar let 10 time Group Policy MVP Derek Melber walk you through some of the most difficult aspects of Group Policy, giving you tips and solutions along the way.

14 November 02 PM EST
Hosted by Derek
Register for free!

Awesome password policy controls: Robust password solutions for Active Directory

In order to protect our passwords against the latest attacks, the password policy must be enhanced. Microsoft has not updated the security for our password policies in over 15 years, so the time is now.

16 November 02 PM GMT
Hosted by Derek
Register for free!

Awesome password policy controls: Robust password solutions for Active Directory

In order to protect our passwords against the latest attacks, the password policy must be enhanced. Microsoft has not updated the security for our password policies in over 15 years, so the time is now.

30 November 02 PM EST
Hosted by Derek
Register for free!

Overcoming Native Active Directory Recycle Bin's Limitations

Derek Melber, Active Directory MVP, will walk you through the finer points of working with Active Directory recycle bin, and overcoming its limitations. You will learn how to restore objects that are past their tombstone lifetime, and perform attribute level restorations.

Presented by: Derek Melber

Active Directory Management Challenges and Solutions

Learn how to manage and report on your Active Directory, Office 365, Exchange Server and Google Apps environments, easily and quickly without struggling with PowerShell scripts.

Presented by: Vivin Sathyan

Automating Active Directory Clean Up

Presented by: Derek Melber

SIEM: The art of monitoring, alerting, and auditing your network to enhance security

Learn the tips and tweaks to protect your network from attacks. This webinar provides you insights on

Presented by: Vivin Sathyan

ADManager Plus Session 2 - Non-invasive AD delegation, automation, and AD workflow.

You will learn about the best techniques for efficient and effective AD, Office 365 and Exchange management, non-invasive AD delegation model, automation and setting up a review-based workflow for AD tasks.

Presented by: Vivin Sathyan

Security Hardening of Windows Active Directory and Servers.

Derek Melber, Directory Services MVP, will explains the finer points of securing your Windows Active Directory and Windows Servers. You will learn how to report, analyze, configure, monitor, and alert on all key security aspects, and also how to meet all regulations, both internal and external.

Presented by: Derek Melber

Monitoring Active Directory With Derek Melber

The webinar focuses on the advanced auditing techniques to track various changes in Active Directory. Derek Melber, Directory Services MVP, shares his expert tips on knowing the 'who', 'when', 'where', and 'what' components of AD changes to ensure complete information tracking.

Presented by: Derek Melber

Monitoring Active Directory Webinar

In this webinar, you will get to know how to safeguard your organization from the pangs of cyber-attacks. In light of the recent attacks on high profile corporates such as British Airways, Sony Online Entertainment Services, Saudi Aramco and JPMorgan Chase, emphasis on IT security is at an all time high.

Presented by: Derek Melber

5 Security Hacks to ensure business continuity

5 Security Hacks to ensure business continuity

Presented by:Vivin

Presenters

Derek

Vivin

Derek is the Technical Evangelist for the ADSolutions team at ManageEngine. As an Active Directory MVP, he is sought after globally for his knowledge, insight, and keen understanding of the Windows product line, especially Active Directory. Derek has extensive experience in offering solutions to Active Directory change monitoring challenges. He writes for, speaks to, and educates thousands of IT professionals around the world, every year through his blogs, books, seminars, webinars, etc.

Vivin is a presales consultant for ADSolutions team at ManageEngine, a division of Zoho Corp. He presents POCs, and takes care of implementation as well as product training for ADSolutions customers across the globe. He is also a regular speaker on the latest trends and best practices in Windows infrastructure management, in international seminars and user conferences conducted by ManageEngine.

FAQs

1. How to register for a webinar?

From the webinars available, choose the one that you wish to participate in, and click the ‘Register’ link/button; you will be redirected to another page with details about this webinar. In this page, select the desired time zone, and key in the details requested, to register for the webinar.

2. How to join the webinar?

Once you register, you will receive an email (from customercare@gotowebinar.com) which will have the webinar’s agenda, its date and time, and also your exclusive link to join the webinar.

3.What are the audio options available?

You can use the audio options available in your computer (we recommend using headphones for a better experience), or you can also use a telephone if you wish to.

  • To use computer’s audio options:When you join the webinar, you will automatically be connected using your computer’s speakers and microphone. For a better experience, use headphones.
  • To use a telephone: Select the ‘use telephone’ option after joining the webinar, and dial the numbers mentioned in the email.
4. What are the system requirements?

To know the system requirement or check if your computer is compatible, visit this link: http://support.citrixonline.com/webinar/all_files/G2W010003

5. Is it possible to watch the past webinars?

Yes, you can view the complete recordings of all the previous webinars. To watch a webinar, go to the ‘completed webinars’ section and click the desired webinar to watch it completely.

6. Whom should I contact for any information or support?

You can send your queries to: adsolutions-events@manageengine.com or call us at: +1 888 720 9500