For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Securing Microsoft Entra ID and Active Directory

We are sorry, the event "Securing Microsoft Entra ID and Active Directory" has already expired.

You may also be interested in.

10 Steps to enhance the agility, security and performance of Active Directory
White Paper
10 Steps to enhance the agility, security and performance of Active Directory
10 Steps to enhance the agility, security and performance of Active Directory
In this document, you will learn 10 steps to enhance the agility, security, and performance of Active Directory. Each step will show you how One Identity Active Roles can enable or accelerate that process.
Read White Paper
Top 10 Misconfigurations in AD
E-book
Top 10 Misconfigurations in AD
Top 10 Misconfigurations in AD
Learn the top 10 misconfigurations in AD and Entra ID and find out how to identify and resolve them.
Read E-book
Why IGA Alone May Not Be Enough
On Demand Webcast
Why IGA Alone May Not Be Enough
Why IGA Alone May Not Be Enough
Discussion on Identity Security and Management, particularly around the limitations of Identity Governance and Administration (IGA) when acting in isolation.
Watch Webcast
Managing the Invisible Risk of Non Human Identities
E-book
Managing the Invisible Risk of Non Human Identities
Managing the Invisible Risk of Non Human Identities
Learn what risk non-human identities can pose to your organization, and how to mitigate that risk while retaining their usefulness
Read E-book
AD Group Management and Attestation
On Demand Webcast
AD Group Management and Attestation
AD Group Management and Attestation
 In this webinar, learn how to automate AD security and management policies and introduce AD attestation functionality using Active Roles.
Watch Webcast
Using role management to protect against AD and Entra ID related risk
E-book
Using role management to protect against AD and Entra ID related risk
Using role management to protect against AD and Entra ID related risk
Enterprise identity security and management are being put to the test in the modern workplace. Role-based access control (RBAC) in your AD and Entra ID environment can help protect your environment, achieving a balance between productivity and security
Read E-book
Building a Security Framework that Strengthens Your Cybersecurity Profile
E-book
Building a Security Framework that Strengthens Your Cybersecurity Profile
Building a Security Framework that Strengthens Your Cybersecurity Profile
Organizations worldwide, from all industries and of all sizes, are turning their attention to identity security. This eBook examines the challenges of creating a robust identity security framework.
Read E-book
The threads of identity: Why an Identity Fabric is the best approach to modern identity security
E-book
The threads of identity: Why an Identity Fabric is the best approach to modern identity security
The threads of identity: Why an Identity Fabric is the best approach to modern identity security
An Identity Fabric is designed to take on the challenges of multiple and hybrid cloud environments, legacy systems and an expansive app surface
Read E-book