For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Get Smarter About Risk with Identity Analytics

We are sorry, the event "Get Smarter About Risk with Identity Analytics" has already expired.

You may also be interested in.

Controlling and Managing Privileged Access
White Paper
Controlling and Managing Privileged Access
Controlling and Managing Privileged Access
Effectively managing privileged accounts is critical to security and compliance efforts. Read this paper to learn the risk associated with privileged accounts and solutions that can effectively mitigate those risks.
Read White Paper
Microsoft and Quest Cybersecurity Summit - Australia
Events & Seminars
Microsoft and Quest Cybersecurity Summit - Australia
Microsoft and Quest Cybersecurity Summit - Australia
In today's security landscape, compromised identities are the leading cause of cyber breaches, with 80% of incidents involving identity theft. Active Directory (both on-prem AD and Entra ID) is often
Attend Event
The Future of Your Group Policy GPOs
On Demand Webcast
The Future of Your Group Policy GPOs
The Future of Your Group Policy GPOs
Quest GPOADmin is a comprehensive and flexible software solution that simplifies the management, backup, and recovery of your GPOs. Not only does it offer all the features you've come to expect from AGPM, but it also adds a lot of additional features.
Watch Webcast
Securing and managing non-human identities
On Demand Webcast
Securing and managing non-human identities
Securing and managing non-human identities
Discover how to secure non-human identities, including bots, DevOps, certificates, API keys and more.
Watch Webcast
Mitigating Active Directory threats before, during and after disaster
Online Event
Mitigating Active Directory threats before, during and after disaster
Mitigating Active Directory threats before, during and after disaster
Identity, and Active Directory in particular, is a cyber attacker’s prime target, with 80% of breaches today involving compromised identities. From an attackers’ point of view, it makes se
Attend Event
Securing Identities Against Modern Security Threats
On Demand Webcast
Securing Identities Against Modern Security Threats
Securing Identities Against Modern Security Threats
In today’s security landscape, identity, and Active Directory in particular, is a cyber attacker’s prime target, with 80% of breaches now involving compromised identities. From an attackers’ point of view, it makes sense – control Active Directory, and yo
Watch Webcast
TEC Talk: Microsoft Security Copilot – Potential, Hype, and Risk?
On Demand Webcast
TEC Talk: Microsoft Security Copilot – Potential, Hype, and Risk?
TEC Talk: Microsoft Security Copilot – Potential, Hype, and Risk?
Learn to support IT organizations in strategy and implementation of security and compliance in digital transformation
Watch Webcast
TEC Talk: 5 Steps to Embark on Your Zero Trust Journey with Microsoft 365
On Demand Webcast
TEC Talk: 5 Steps to Embark on Your Zero Trust Journey with Microsoft 365
TEC Talk: 5 Steps to Embark on Your Zero Trust Journey with Microsoft 365
Focus on securing identities, devices and applications, which are usually the first pillars to tackle in a Zero Trust journey. You will walk away with five projects that you can implement in your organization.
Watch Webcast