Protect & Recover AD and Entra ID — The Keys to the Kingdom

Protect & Recover AD and Entra ID — The Keys to the Kingdom

  • Semperis

In this on-demand webinar, Rob Ingenthron, Senior Solution Architect at Semperis, will delve into the significance of AD protection and recovery in identity threat detection and response (ITDR). Attendees can expect to: Discover effective strategies for integrating AD protection and recovery into a comprehensive ITDR approach. Gain a deeper understanding…

Are You Prepared for the True AD Disaster?

Are You Prepared for the True AD Disaster?

Explore the vital role of identity in disaster recovery planning, specifically focusing on Microsoft Active Directory. This on-demand webinar addresses the challenges in recovering core directory services and emphasizes the need for proactive planning. Key takeaways include reevaluating DR procedures, engaging with ITDR vendors, and enhancing identity security. The webinar…

Grundlagen der Active Directory-Sicherheit in einer hybriden Umgebung

Grundlagen der Active Directory-Sicherheit in einer hybriden Umgebung

Active Directory (AD) ist und bleibt eine Kernanwendung, egal ob on-premise oder als Azure AD in der Cloud. In dem Web-Seminar der Semperis, Inc. beleuchtet AD-Experte Guido Grillenmeier Risiken sowie Möglichkeiten, AD zu schützen. Seit mehr als zwei Jahrzehnten ist Microsoft Active Directory (AD) die De-facto-Methode, die Unternehmen zur Authentifizierung…

Top Tips for Active Directory Modernization

Top Tips for Active Directory Modernization

  • Semperis

Active Directory is a core part of most organizations' identity infrastructure. Yet many AD environments are showing their age. Decades of tech debt, configuration creep, and changing security best practices have expanded the AD attack surface. Whether you want to simplify AD management or improve identity security, modernizing Active Directory…

Is Your Identity System Defense Ready?

Is Your Identity System Defense Ready?

  • Semperis

Active Directory (AD) is used by 90% of organizations for database management. This technology is the major vector in virtually all attacks aimed at gaining access to your network and data. Today, cyber weaponry is everywhere, posing a genuine threat regardless of critical industries or geographical boundaries. However, with proper…

Cyberattacks on Education: How to Strengthen Identity Security

Cyberattacks on Education: How to Strengthen Identity Security

  • Semperis

Cyberattacks on education are on the rise. What are attackers after, and why are they increasingly targeting K-12 and higher education? And what can you do to protect your organization? In this webinar, Semperis Solutions Architect Alexandra Weaver will give you expert insight into lessons learned from recent education-focused cyberattacks…

5 Identity Vulnerabilities Every CISO Must Know

5 Identity Vulnerabilities Every CISO Must Know

  • Semperis

Attackers want your identity, your employee’s identity, and your client’s identity. For 25 years, identity has been synonymous with Active Directory (AD) and Microsoft Entra ID (formerly Azure AD). Active Directory is a marvelous service that was built a quarter of a century ago, before hackers emerged as a threat…

Identity Security for the Public Sector: Protecting Active Directory

Identity Security for the Public Sector: Protecting Active Directory

  • Semperis

Ransomware and other cyber threats targeting the public sector are on the rise. Today’s attackers often have a common focus: infiltrating your identity systems, typically Active Directory (AD) or Azure AD (now Entra ID) for most organizations. An identity breach can lead to data theft, malware insertion, and ransomware attacks…

Can Your Organization Pass an Identity Security Assessment?

Can Your Organization Pass an Identity Security Assessment?

  • Semperis

Cyberattackers love to exploit gaps in Active Directory (AD) security. When did you last evaluate your hybrid AD security posture? In this webinar, Semperis Senior Solutions Architect Mike Carlson will draw from his years of hands-on experience and use Semperis free community tools to illustrate how to determine whether your…

What does a successful Identity Threat Detection and Response (ITDR) strategy look like?

What does a successful Identity Threat Detection and Response (ITDR) strategy look like?

  • Semperis

What is Endpoint Detection & Response (EDR) and why ITDR goes beyond zero trust and edge protection. Join our fireside chat with David Hitchen on how to protect and remediate your identity when the attacker is a legitimate user. Speaker Bio: David Hitchen is a Senior Solutions Architect and veteran…