Event Details
Is it game over when a cyberattacker breaches your IT environment? Not necessarily, if you’ve used an Active Directory (AD) tier model to create a security boundary to shield your most critical assets. See how it’s possible to do exactly that in this on-demand webcast featuring Jonas Knudsen, of SpecterOps, and Quest security expert Bryan Patton.
In this webcast, they will:
Event Details
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.
reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.