For the best web experience, please use IE10+, Chrome, Firefox, or Safari

Active Roles User's Group of New York and New England Area

We are sorry, the event "Active Roles User's Group of New York and New England Area " has already expired.

You may also be interested in.

On Demand Webcast

Privileged access management for hybrid cloud environments
Privileged access management for hybrid cloud environments

Moving to the cloud can offer some significant benefits, but ensuring security and achieving compliance in cloud based environments can pose challenges.

E-book

Conversational Geek e-book: Hybrid AD Security Remediation & Mitigation
Conversational Geek e-book: Hybrid AD Security Remediation & Mitigation

In this informative e-book, cloud expert Nick Cavalancia explores why it’s necessary to put a focus on being able to both maintain a proper state of AD security, and to also have a plan to diminish the possibility to further bad changes in the future.

E-book

Active Directory and Azure AD Security Best Practices
Active Directory and Azure AD Security Best Practices

Unless you’ve been hiding under a rock, it’s going to come as no surprise that Office 365 adoption is increasing rapidly. With primary drivers like Exchange Online, SharePoint Online and OneDrive, Office 365 is obtaining an average of around 1 million new

White Paper

Mapping Your Requirements to the NIST Cybersecurity Framework
Mapping Your Requirements to the NIST Cybersecurity Framework

To better understand how agencies can leverage the NIST Cybersecurity Framework to navigate the changing threat landscape, GovLoop partnered with Quest, a leader in helping build and manage modern, secure and more resilient IT architecture.

E-book

How to Mitigate the Insider Threat
How to Mitigate the Insider Threat

This eBook provides solutions to stop insider threats, manage privileged accounts, simplify GPO management and administration.

White Paper

Global Survey Full Results
Global Survey Full Results

Most IT security professionals are aware that their identity and access management (IAM) practices are substandard and know what to do to fix them -- but do not have the time nor resources to do anything about it.

White Paper

Global Survey Key Findings
Global Survey Key Findings

Most IT security professionals are aware that their identity and access management (IAM) practices are substandard and know what to do to fix them -- but do not have the time nor resources to do anything about it.

Related products

Active Roles
Active Roles

Simplify the security of your Active Directory

Download Free Trial