Webinar

What Are the Most Valuable Entra ID Premium Features and Why Do You Need Them?

[WEBINAR] What Are the Most Valuable Entra ID Premium Features and Why Do You Need Them? In this webinar, Steve Goodman from Practical 365 and Brian Desmond from Ravenswood Technology Group discuss which Entra ID (formerly Azure Active Directory) features you should switch on if you don’t have Premium, and the most useful features in Entra ID

What Are the Most Valuable Entra ID Premium Features and Why Do You Need Them? Read More »

10 Quick Hybrid Identity Wins

[WEBINAR] 10 Quick Hybrid Identity Wins In this recorded session for TEC (The Experts Conference by Quest), Brian Desmond from Ravenswood Technology Group discusses the benefits and advantages of Hybrid Identity. watch now [WEBINAR] https://www.youtube.com/watch?v=nuvidGrPfcE&t=2s In this recorded session for TEC (The Experts Conference by Quest), Brian Desmond from Ravenswood Technology Group discusses the benefits

10 Quick Hybrid Identity Wins Read More »

The Top 10 Actions Every Organization Should Take to Protect their AD from Attacks

[WEBINAR] The Top 10 Actions Every Organization Should Take to Protect their AD from Attacks You know that cyber-attacks are coming. Maybe you’ve already been hit. Almost every attack is centered on finding a foothold in Active Directory, escalating privileges, and wreaking havoc. But did you know that there are some relatively simple actions you

The Top 10 Actions Every Organization Should Take to Protect their AD from Attacks Read More »

How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches

[WEBINAR] How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches Active Directory exploitation is the common thread in high-profile attacks, including Colonial Pipeline, SolarWinds, Hafnium. Every day we hear about a new attack, a new vulnerability, and devastating consequences. Almost every attack is centered on finding a foothold in Active Directory, escalating privileges, and

How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches Read More »