Watch presentations from speakers with impeccable credentials.
Presentations that will help you tackle your various IT Security challenges head-on.
Know how to configure and monitor the critical security settings of your AD environment.
Learn how to combat various security threats with effective log management techniques.
Consult with our experts. Discuss your IT security and Active Directory challenges with them.
Harish Sekar is a Technical Evangelist for ADSolutions team at ManageEngine, a division of Zoho Corp. He is a regular speaker in international conferences and seminars on how to leverage technology better by using ManageEngine tools. He specializes in guiding admins across the globe to solve day to day problems of managing and monitoring in Active Directory, Office 365, and Exchange environments.
Siddharth Sharath Kumar is an IT security and compliance specialist on ManageEngine's product marketing team. He writes articles and e-books, regularly hosts webinars on key IT security topics, and presents at ManageEngine's conferences and other industry events across the globe.
from our 2017 World Tour
Active Directory (AD), in simple terms, determines what each user can do in the network. Though everything around it is permission oriented, it is very difficult to gain visibility into the permissions that a user has. This leaves AD, one of the most used services, the least monitored of all critical services. This session will dwell into aspects that can simplify AD monitoring for you.
Password security is often overlooked, eventually leading to a breach due to weak passwords. The password policy settings in Active Directory are limited and fail to increase security, thereby demanding robust password policy settings.
Data growth is exponential in today's world. More than half of that data that your organization stores falls under the unstructured category, existing outside of databases and within files, multimedia content and other formats. It's important for you to detect the presence of these data and track every activity happening on the device that stores the data to avoid any kind of breaches.
Logs contain valuable information about important security events occurring in your network. You must monitor your logs to stay on top of threats and to detect attacks happening within your premises.
Wellington, New Zealand
Christchurch, New Zealand
Auckland, New Zealand
© 2018 Zoho Corporation Pvt. Ltd. All rights reserved.