You've requested...

What's New in Group Policy Administrator 5.0

If a new window did not open, click here to view this asset.

Download this next:

Netwrix PolicyPak Demo: Master GPO Optimization for Enhanced Security

Reducing the number of GPOs enhances system performance, resulting in quicker user login times. It also simplifies the administrative process, making managing user settings and system configurations more straightforward. Additionally, a streamlined set of GPOs facilitates a more efficient and less complex auditing process, which aids in maintaining security and compliance standards. With the Netwrix PolicyPak GPO Reduction and Consolidation Pak, you can consolidate multiple policies into a single Group Policy Object, enabling you to streamline your security, compliance, and management practices. You can also leverage Item-level targeting and Group Policy Preferences to simplify GPO deployment across domain-joined and non-domain-joined environments. Join this webinar and learn how to: - Consolidate and simplify legacy GPOs for easier management. - Export and migrate GPOs to your MDM and UEM platform to ensure parity across managed workstations. - Leverage Group Policy Preferences and Item-level targeting for granular policy deployment - Achieve Group Policy parity across domain-joined and non-domain-joined workstations

These are also closely related to: "What's New in Group Policy Administrator 5.0"

  • Fully Utilizing Closed Systems in Modern BioPharma Facilities

    Presented by Lars Hovmand-Lyster, Senior Engineering Specialist in Novo Nordisk Global Project Office (GPO) Engineering Management Department • Build the roadmap to biopharmaceutical manufacturing and their partners in developing, assessing and verifying unit operations leading to an appropriate facility design that is “right classified” • Hear first-hand about this industry-developed document to understand the tools, steps and documents required to adequately risk assess and qualify modern facilities that make use of modular, closed technology • Learn how following a methodology results in significant gains in reducing the time to deliver the facilities and CAPEX and OPEX costs

  • Group Policy Gotchas: GPO Settings That Expose Your Environment

    Group Policy can provide massive security value if used correctly — and if used incorrectly, it can expose your Windows environment to cyberattacks. To tap into this built-in tool’s security potential, IT pros of all experience levels must learn to tame the Group Policy beast. Know which GPO settings can put your organization at risk, and how to tune your environment to maximize your visibility. Join Brien Posey, a 20-time Microsoft MVP and IT expert, and Blumira’s Erica Mixon, Content Manager, for tips and tricks to harden your environment with Group Policy. They’ll discuss: Tangible takeaways and things you’ll be able to do right away in Group Policy to make a difference Why improperly configured event log sizes can lead to aggregation issues How to enable SMB signing to reduce your attack surface Free tools like Logmira to eliminate the manual work of Group Policy This interactive, conversational-style session encourages questions and engagement with viewers – so sign up today for access to our security experts.

Find more content like what you just read:

  • Active Directory integration features in Ubuntu 22.04

    Active Directory (AD) is the most popular user and endpoint identity management system in medium and large enterprises. Ubuntu supported AD integration for a very long time, however this was limited to user authentication and did not allow to take advantage of the more advanced features like Groups Policy Objects and scripts. With Ubuntu Desktop 22.04 we have listened to the sysadmin feedback and introduced ADsys, a new, groundbreaking client which enables the following functionalities: Full Group Policy Object (GPO) support, natively baked into the OS Privilege management, giving you the possibility to execute tasks as a privileged account Custom shell scripts execution for logon, logoff, startup and shutdown. Join us for a demo and live Q&A to learn more about the new AD integration features and discuss how we can help you manage your Ubuntu estate with the same tools you currently use to manage your Windows clients. If you want to learn more about Ubuntu Desktop, Ubuntu Advantage or our advanced Active Directory integration features please do not hesitate to contact us to discuss your needs with one of our advisors.

    Download

  • New Active Directory integration features in Ubuntu 22.04

    Active Directory (AD) is the most popular user and endpoint identity management system in medium and large enterprises. Ubuntu supported AD integration for a very long time, however this was limited to user authentication and did not allow to take advantage of the more advanced features like Groups Policy Objects and scripts. With Ubuntu Desktop 22.04 we have listened to the sysadmin feedback and introduced ADsys, a new, groundbreaking client which enables the following functionalities: Full Group Policy Object (GPO) support, natively baked into the OS Privilege management, giving you the possibility to execute tasks as a privileged account Custom shell scripts execution for logon, logoff, startup and shutdown. Join us on this webinar to learn more about the new AD integration features and discuss how we can help you manage your Ubuntu estate with the same tools you currently use to manage your Windows clients. If you want to learn more about Ubuntu Desktop, Ubuntu Advantage or our advanced Active Directory integration features please do not hesitate to contact us to discuss your needs with one of our advisors.

    Download

  • A Timeless Problem: Preventing USB Data Loss at Your Organization

    In the late ‘90s and early ‘00s, USB flash drives were a hot commodity. Back then, they were not very common, had 8MB of storage and the concept of data leaks or picking up malware from one was not considered a major threat. Fast forward over two decades later and not only are they faster but much, much larger often with capacities of up to 1 terabyte. What could sit on a stick of that size? Your whole 'My Documents' folder! Despite this, many companies continue to have relaxed policies around USB sticks, along with little to no technical controls in place around them. The dangers of uncontrolled USBs include data ingress (think intellectual property and designs from rivals along with stolen music and films), data loss by egress, the spread of malware, and more. When it comes to blocking these threats, deploying a Data Loss Prevention solution can go well beyond the capabilities of GPO (Group Policy Objects) settings or antivirus; it can also offer many ways of controlling USBs with fine granularity. In this webinar, Graeme Batsman, Fortra’s Sr. Professional Services Consultant will share his expertise on: - Dangers of uncontrolled USBs - Past leak stories from the press - Options to control USBs - Options to encrypt data moving to USBs” And live demos of course!

    Download

  • 3 trends in strategic health care supply chain management

    If you haven’t refreshed your plan for the post-COVID-19 environment, you’re not alone. 1 in 4 health care supply chain leaders still don’t have a strategic plan. Learn how the top organizations are reinventing the traditional health care supply chain to succeed under today’s financial pressures in this white paper.

    Download

  • Beyond GPO: Evolving Supply Chain from Transactional to Strategic

    Read this paper to garner the value of a transformational—not transactional—healthcare supply chain approach, 4 ways to achieve long-term supplier value, and top supply chain trends.

    Download

  • Stopping Attacks at the Windows Endpoint: The Lockdown Efficacy

    No matter the type of attack or the initial attack vector, eventually threat actors need access to an endpoint to establish persistence and to serve as the launch point for any privilege escalation and lateral movement. And because every attacker’s capabilities are limited by the operating system they compromise, Windows remains a favorite target, with its’ many means of running code, traversing systems, and elevating privileges. A recent report showed that as many as 1 in 8 cyberattacks make it past security solutions and reach the endpoint, placing the battle for access to your environment squarely on your Windows’ endpoints. And while organizations like yours have endpoint solutions, not every solution provides the same levels of protection, making it necessary to take advantage of every means to secure the environment – which includes any native lockdown capabilities within Windows. So, just how well can native management solutions from Microsoft secure the Windows endpoint? In this Real Training for Free session, 4-time Microsoft MVP, Nick Cavalancia takes my seat as he first discusses: The reality of attacks reaching the endpoint Just how insecure is the default Windows endpoint? What MITRE has to say about the misuse of a compromised Windows endpoint Next up, you’ll hear from 18-time Microsoft MVP, Jeremy Moskowitz, as he covers the native limitations to consider when using Windows’ built-in policy management tools to secure the endpoint. Jeremy will also share practical strategies to address them. The session will focus on the limitations of the following native Windows endpoint management tools: - Local Administrator Password Service (LAPS) - USB GPO policy - Applocker - And more Jeremy will also discuss exploring alternative approaches and third-party solutions to optimize policy deployment.

    Download

  • [Cyber Quest] Choose Your Own Security Adventure

    In the face of modern Windows desktop challenges, both Group Policy and MDM fall short. But one tool rises to the occasion, adding a new dimension of power and functionality: Netwrix PolicyPak. Indeed, as the stakes continue to get higher and the challenges more complex, Netwrix PolicyPak is increasingly indispensable for effective PC configuration management and security. Are you ready for a cyber adventure like no other? Join us for the PolicyPak Cyber Quest and watch our hero, 18X Microsoft MVP and godfather of Group Policy Jeremy Moskowitz, tackle some of the most challenging desktop management issues. Will he emerge victorious? In this webinar, you'll have the power to choose which problems Jeremy and Netwrix PolicyPak will face. So, gather your team, prepare your questions and get ready for an interactive adventure that will change the way you think about PC management forever. Here are some of the tough use cases you’ll have to choose from: - Eliminating local admin rights and blocking malware - Protecting USB and CD-ROM devices from malware and data exfiltration - Reducing GPOs and eliminate loopback - Migrate GPOs from on-prem to Cloud, Intune. or any MDM service Watch the PolicyPak Cyber Quest and take the first step towards a more secure digital future.

    Download

  • BloodHound est un bon outil, mais vous méritez mieux !

    En 2014, des chercheurs français de l'ANSII présentent un document de recherche détaillant une approche innovante basée sur la théorie des graphes afin de cartographier les failles de sécurité au sein d'Active Directory. Cette recherche a ensuite été utilisée par des tiers pour développer le produit open-source BloodHound. Six ans plus tard, les mêmes chercheurs responsables de ces découvertes initiales sont allés encore plus loin afin d’explorer les limites de leur modèle en évoluant vers la théorie des hyper graphes dans l’objectif d’appliquer leurs recherches initiales au monde de l’entreprise. Rejoignez-nous pour découvrir comment la théorie des hyper graphes peut vous aider à résoudre les problèmes de sécurité AD les plus avancés. Alsid vous présente cet agenda : - Quels sont les chemins d'attaque et de contrôle ? - Evolution des chemins d'attaque et de contrôle - En quoi la surveillance des changements AD en temps réel est cruciale pour la sécurité du réseau ? - Survivre aux ransomwares grâce au suivi des changements de GPO - Naviguer dans le paysage complexe de la sécurité AD - Découvrir les changements cachés et les backdoors

    Download

  • Prévention de la perte de données USB de votre entreprise

    À la fin des années 90 et au début des années 2000, les clés USB étaient très prisée. À l'époque, ils n'étaient pas très courants, disposaient de 8 Mo de stockage et le concept de fuite de données ou de détection de logiciels malveillants n'était pas considéré comme une menace majeure. Plus de deux décennies plus tard, non seulement ces périphériques sont plus rapides, mais ils sont beaucoup plus grands, souvent avec des capacités allant jusqu'à 1 téraoctet. Qu'est-ce qui pourrait tenir sur une clés de cette taille ? L'ensemble de votre dossier « Mes documents » et plus encore! Les dangers des clés USB non contrôlées comprennent l'entrée de données (pensez à la propriété intellectuelle d’autrui, ainsi qu'à la musique et aux films volés), la perte de données, la propagation de logiciels malveillants, etc. Le déploiement d'une solution de prévention des pertes de données peut aller bien au-delà des capacités de contrôle GPO (Group Policy Objects) ou de l'antivirus. Il peut également offrir de nombreuses façons de contrôler les clés USB. Dans ce webinaire, Julien Gourlaouen, Sr. Solutions Engineer de Fortra, partagera son expertise sur : • Dangers des clés USB non contrôlées • Fuites passées dans la presse • Options de contrôle des clés USB •Options de cryptage des données déplacées vers des clés USB Et des démos en direct bien sûr ! Présentateur - Julien Gourlaouen, Sr. Solutions Engineer, Fortra

    Download

  • Prévention de la perte de données USB de votre entreprise

    À la fin des années 90 et au début des années 2000, les clés USB étaient très prisée. À l'époque, ils n'étaient pas très courants, disposaient de 8 Mo de stockage et le concept de fuite de données ou de détection de logiciels malveillants n'était pas considéré comme une menace majeure. Plus de deux décennies plus tard, non seulement ces périphériques sont plus rapides, mais ils sont beaucoup plus grands, souvent avec des capacités allant jusqu'à 1 téraoctet. Qu'est-ce qui pourrait tenir sur une clés de cette taille ? L'ensemble de votre dossier « Mes documents » et plus encore! Les dangers des clés USB non contrôlées comprennent l'entrée de données (pensez à la propriété intellectuelle d’autrui, ainsi qu'à la musique et aux films volés), la perte de données, la propagation de logiciels malveillants, etc. Le déploiement d'une solution de prévention des pertes de données peut aller bien au-delà des capacités de contrôle GPO (Group Policy Objects) ou de l'antivirus. Il peut également offrir de nombreuses façons de contrôler les clés USB. Dans ce webinaire, Julien Gourlaouen, Sr. Solutions Engineer de Fortra, partagera son expertise sur : • Dangers des clés USB non contrôlées • Fuites passées dans la presse • Options de contrôle des clés USB •Options de cryptage des données déplacées vers des clés USB Et des démos en direct bien sûr ! Présentateur - Julien Gourlaouen, Sr. Solutions Engineer, Fortra

    Download

  • 6 health system purchasing committee archetypes

    This report analyzes six archetypes of health system purchasing committees and how they define value in drugs and devices. Understand how committees evaluate products across clinical quality, financial, and operational factors. Read the full research to learn how life sciences companies can best demonstrate value to these customers.

    Download

  • Streamlining Your Migration from Group Policy and SCCM to Intune and Entra ID

    Transitioning to Microsoft Intune and Entra ID can be challenging for organizations accustomed to using Group Policy and SCCM for endpoint management and security. The differences in policies, granularity, and capabilities between Intune and SCCM often lead to security gaps, a poor end-user experience, and inefficiencies in managing endpoints.    Fortunately, Netwrix offers a solution that simplifies this transition for Group Policy and SCCM Administrators.    Watch how 18-time Microsoft MVP and Group Policy expert Jeremy Moskowitz to discover how Netwrix PolicyPak bridges the gaps in endpoint management and security during and after your migration to Entra ID and Microsoft Intune. In this webinar, you'll learn how Netwrix PolicyPak can:     - Consolidate and merge legacy GPOs to streamline Intune migrations.  - Ensure 100% policy parity between Microsoft Intune and Group Policy.  - Address the security limitations of Intune's Endpoint Privilege Management add-on.  - Integrate seamlessly with other Netwrix products, including Netwrix Auditor and Netwrix Privilege Secure.     Don't miss this chance to learn how Netwrix PolicyPak simplifies your migration to Intune and Entra ID.  Register now to secure your spot!

    Download

  • Ubuntu 22.04の新しいActive Directory統合機能

    今回のトークについて Active Directory(AD)は、中規模から大規模の企業における最も一般的なユーザー/エンドポイントID管理システムです。UbuntuはAD統合機能をかなり前からサポートしていましたが、その機能はユーザー認証に限られ、Groups Policy Objectsやスクリプトなどの高度な機能は含まれませんでした。 Ubuntu Desktop 22.04では、システム管理者の要望に応え、画期的なクライアントとしてADsysを導入しました。これには次の機能があります。 OSにネイティブに組み込んだグループポリシーオブジェクト(GPO)の全面サポート 特権アカウントとしてタスクを実行するための特権管理機能 ログオン、ログオフ、起動、シャットダウンに対応するカスタムシェルスクリプト実行機能 今回のウェビナーでは、新しいAD統合機能について知り、現在Windowsクライアントの管理に使用しているのと同じツールで社内のUbuntuマシンを管理する方法についてご説明します。 Ubuntu Desktop、Ubuntu Advantage、または最新のActive Directory統合機能の詳細は、お問い合わせの上、アドバイザーにニーズをお聞かせください。

    Download

  • Ditch Your Print Servers

    See how eliminating your print servers with PrinterLogic reduces helpdesk tickets, removes security vulnerabilities, and enhances the end-user printing experience in a single solution. Discover how PrinterLogic's cloud-native, direct IP printing platform makes printer deployments easier without scripts and GPOs, and authenticates all users via IdP integrations. Find out more about serverless printing in this video.

    Download

  • How a resilient health care supply chain affects patient care

    Supply chain excellence impacts health care quality and experience for patients, therefore, a resilient supply chain is crucial for delivering that care and keeping an eye on your bottom line. This infographic details five steps your organization should take to bolster more efficient health care supply chain management.

    Download

  • Security leader’s guide to Active Directory best practices

    Microsoft Active Directory (AD) and Azure AD (AAD) bring organization and standards to how identity and account data is managed and stored. One Identity Active Roles unifies your AD and AAD environments and enables identity and account data to be managed with agility, security and speed. Read on to learn more.

    Download

  • Eliminate Your Print Servers and Deliver a Serverless Printing Infrastructure

    Learn how to eliminate your print servers and implement centrally managed direct IP printing on PrinterLogic’s easy-to-use SaaS platform. Kayla walks you through the two components that enable you to eliminate your print servers and get centrally managed direct IP printing: the Admin Console and the Workstation Client. Get an in-depth look at how to import your printer queues to the PrinterLogic Admin Console and manage your entire print environment from a single user interface. Discover how to deploy printers using various methods including Active Directory, IdP users, or IP address range—without worrying about stressful scripts or GPOs. Plus, find out how you can reduce print-related helpdesk tickets via the PrinterLogic Self-Service Installation Portal. Visit our website and social media pages to learn more about eliminating your print servers. Kayla walks you through the two components that enable you to eliminate your print servers and get centrally managed direct IP printing: the Admin Console and the Workstation Client. Get an in-depth look at how to import your printer queues to the PrinterLogic Admin Console and manage your entire print environment from a single user interface. Discover how to deploy printers using various methods including Active Directory, IdP users, or IP address range—without worrying about stressful scripts or GPOs. Plus, find out how you can reduce print-related helpdesk tickets via the PrinterLogic Self-Service Installation Portal. See attachment below learn more about our free 30 day trial.

    Download

  • 12 top enterprise risk management trends in 2023

    Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.

    Download

  • Time to Go Serverless

    Looking to streamline print management for your organization and get rid of print servers once and for all? Join us for a 30-minute demo of PrinterLogic’s secure SaaS print management platform to discover capabilities that empower you to decommission all print servers and manage your print environment from a centralized console. You’ll learn how to: ● Overcome the headaches and stresses of traditional print management ● Migrate all printers to the cloud with minimal downtime ● Deploy printers without GPOs and scripts ● Reduce printer-related helpdesk calls by empowering users to self-install printers ● Track and audit all print activity and generate reports that give insights into print costs All registrants will receive a recording of the event following the demo.

    Download

  • Time to Go Serverless

    Looking to streamline print management for your organization and get rid of print servers once and for all? Join us for a 30-minute demo of PrinterLogic’s secure SaaS print management platform to discover capabilities that empower you to decommission all print servers and manage your print environment from a centralized console. You’ll learn how to: ● Overcome the headaches and stresses of traditional print management ● Migrate all printers to the cloud with minimal downtime ● Deploy printers without GPOs and scripts ● Reduce printer-related helpdesk calls by empowering users to self-install printers ● Track and audit all print activity and generate reports that give insights into print costs All registrants will receive a recording of the event following the demo.

    Download

  • Focus: how to avoid being hit by ransomware

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

    Download

  • A Computer Weekly buyer's guide to managing paper processes

    Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.

    Download

  • Infographic: 5 questions to ask when creating a ransomware recovery plan

    Companies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.

    Download

  • Die Zeit ist reif für Serverless: Eine umfassende Demonstration des sicheren, Cloud-nativen Druckmanagements

    Suchen Sie nach Möglichkeiten, das Druckmanagement in Ihrer Organisation zu vereinfachen und Druckserver ein für alle Mal loszuwerden? Begleiten Sie uns zu einer 30-minütigen Demonstration der sicheren SaaS-Plattform für das Druckmanagement von PrinterLogic und erfahren Sie, wie Sie alle Druckserver abschalten und Ihre Druckumgebung von einer zentralen Konsole aus verwalten können. Sie werden lernen, wie Sie : Den Ärger und Stress überwinden, der mit dem traditionellen Druckmanagement verbunden ist. Alle Ihre Drucker mit minimalen Ausfallzeiten in die Cloud migrieren. Drucker ohne Verwendung von GPOs oder Skripten bereitstellen. Reduzieren Sie druckerbezogene Supportanrufe, indem Sie es den Nutzern ermöglichen, ihre Drucker selbst zu installieren. Alle Druckaktivitäten verfolgen und prüfen und Berichte erstellen, die Einblicke in die Druckkosten bieten.

    Download

  • Global Risks Report 2017

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

    Download

  • Identity authentication's role in Active Directory and Entra ID

    Effective identity authentication and privilege management are essential for securing corporate resources in Active Directory and Entra ID environments. Learn how to unify AD and Entra ID, automate identity processes, and implement best practices like least-privilege access and zero trust. Read the full white paper to enhance your IAM strategy.

    Download

  • Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk

    Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.

    Download

  • MicroScope - July-August 2024: Is it worth taking a risk?

    In this issue, we take a closer look at the channel's approach to risk, with experts weighing in on with their approach to playing it safe versus taking steps towards innovation. Also read up on why the time is now to learn about AI-capable PCuse cases, as well as why the human factor should not be underestimated when it comes to AI

    Download

  • Il est temps de passer au sans-serveur

    Vous cherchez à simplifier la gestion des impressions dans votre organisation et à vous débarrasser des serveurs d'impression une bonne fois pour toutes ? Rejoignez-nous pour une démonstration de 30 minutes de la plateforme SaaS sécurisée de gestion des impressions de PrinterLogic, et découvrez comment vous pouvez désactiver tous les serveurs d'impression et gérer votre environnement d'impression depuis une console centralisée. Vous apprendrez à : Surmonter les tracas et le stress liés à la gestion traditionnelle des impressions Migrer toutes vos imprimantes vers le cloud avec un minimum de temps d'arrêt Déployer des imprimantes sans utiliser de GPOs ni de scripts Réduire les appels au support liés aux imprimantes en permettant aux utilisateurs d'installer eux-mêmes leurs imprimantes Suivre et auditer toutes les activités d'impression et générer des rapports offrant des insights sur les coûts d'impression Tous les inscrits recevront un enregistrement de l'événement après la démonstration.

    Download

  • Are we trusting social networks too much?

    This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks

    Download

  • Step-by-step disaster recovery planning guide

    IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.

    Download

  • Royal Holloway: Driverless vehicle security for military applications

    Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.

    Download

  • To hack back or not to hack back ...

    This e-guide discusses hacking back as a viable option to combat hacking attempts. Expert Kevin Beaver discusses the merits and drawbacks of an "offense is the best defense" approach to security and how to implement more permanent security tools moving forward.

    Download

  • EDR v XDR v MDR: The cybersecurity ABCs

    This e-book provides an overview and comparison of three key threat management services - Endpoint Detection and Response (EDR), Managed Detection and Response (MDR), and Extended Detection and Response (XDR). It offers insights to help you choose the right solution to maximize your cyber protection. Read the full e-book to learn more.

    Download

  • CW Brasil - Março 2022: Tolerância zero para conformidade de segurança corporativa

    Como o modelo de confiança zero ajuda a reduzir as lacunas de segurança e cumprir os requisitos de governança nas empresas?

    Download

  • AD Group Management and Attestation

    What if there was a way to simplify and streamline object and group security and management within AD and Entra ID and give you more time to focus on other tasks? Active Roles is here to help. Stream this webinar to learn how Active Roles can help you: - Automate policies - Introduce AD attestation functionality - Allow group managers to control group membership - Enable periodic group membership validation

    Download

  • AD Group Management and Attestation

    What if there was a way to simplify and streamline object and group security and management within AD and Entra ID and give you more time to focus on other tasks? Active Roles is here to help. Stream this webinar to learn how Active Roles can help you: - Automate policies - Introduce AD attestation functionality - Allow group managers to control group membership - Enable periodic group membership validation

    Download

  • Threat management: Essential guide

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

    Download

  • New privacy laws are coming, first stop California

    The SolarWinds Orion attacks made victims of government agencies overnight – and without proper protection, your organization could be at risk, too. Download this guide to learn about supply chain attacks, what CISOs are doing to prevent them and detailed instructions on how to prevent bad actors from tampering with your supply chain.

    Download

  • How To Deploy A Password Policy

    This white paper provides an end-to-end guide for rolling out a new password policy in your organization. Learn how to plan, set up, deploy, and communicate the policy to keep your Active Directory secure. Download the white paper to get started.

    Download

  • PRI Digital Forum: EMEA - Breakout 1B. EU sustainable finance policy

    EU sustainable finance policy: what’s on the horizon? This session discusses what's coming up in the European policy sphere, and how investors should prepare for the incoming regulations. Speakers: Carey Evans, Managing Director, Global Policy BlackRock Nadia Humphreys, Business Manager, Sustainable Finance Solutions, Bloomberg Johanna Köb, Head of Responsible Investment Zurich Insurance Group Carina Silberg, Head of Governance and Sustainability, Alecta Alyssa Heath, Head of EU & UK Policy, PRI

    Download

  • Disaster recovery and business continuity: Essential guide

    Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.

    Download

  • PIP19 - The EU taxonomy: What is it, and how should it be used?

    The taxonomy proposes a list of economic activities that are considered environmentally sustainable for investment purposes. This session will: • outline what the taxonomy is, and the methodology used to determine it; • discuss how the taxonomy can be applied to service lines, and what to do next; • explore test cases on using the taxonomy in practice. This session will be held under Chatham House rules. Fouad Benseddik, Director, Vigeo Eiris Nathan Fabian, Chief Responsible Investment Officer, PRI; Rapporteur, Taxonomy, EU Technical Expert Group Alyssa Heath, Head of EU & UK Policy, PRI ​Brenda Kramer​, Senior Advisor, Responsible Investment, PGGM; Member, EU Technical Expert Group Helena Viñes Fiestas, Global Head of Stewardship and Policy, BNP Paribas Asset Management; Member, EU Technical Expert Group

    Download

  • Insuring the net-zero transition: Evolving thinking and practices

    A white paper produced by the Net-Zero Insurance Alliance. This paper outlines the evolving thinking and practices via the work of the Net-Zero Insurance Alliance (NZIA), a group of over 20 leading insurers representing about 12% of world premium volume, to address the net-zero challenge in the context of insurance underwriting portfolios. The NZIA is a UN-convened and member-led alliance that supports its members as they work towards decarbonising their underwriting portfolios by individually setting science-based intermediate targets and reporting on their progress annually and publicly. The NZIA also advocates for and engages in governmental policies for a science-based and socially just transition of economic sectors to net zero. Speakers: Butch Bacani, Programme Lead, UNEP's Principles for Sustainable Insurance John Scott, Head of Sustainability Risk, Zurich Insurance Group Lucy McCracken, Senior Manager, Group Public Policy & Sustainability, Aviva Sheri Wilbanks, Head of P&C Climate and Sustainability, Group Risk Management AXA

    Download

  • Insuring the net-zero transition: Evolving thinking and practices

    A white paper produced by the Net-Zero Insurance Alliance. This paper outlines the evolving thinking and practices via the work of the Net-Zero Insurance Alliance (NZIA), a group of over 20 leading insurers representing about 12% of world premium volume, to address the net-zero challenge in the context of insurance underwriting portfolios. The NZIA is a UN-convened and member-led alliance that supports its members as they work towards decarbonising their underwriting portfolios by individually setting science-based intermediate targets and reporting on their progress annually and publicly. The NZIA also advocates for and engages in governmental policies for a science-based and socially just transition of economic sectors to net zero. Speakers: Butch Bacani, Programme Lead, UNEP's Principles for Sustainable Insurance John Scott, Head of Sustainability Risk, Zurich Insurance Group Lucy McCracken, Senior Manager, Group Public Policy & Sustainability, Aviva Sheri Wilbanks, Head of P&C Climate and Sustainability, Group Risk Management AXA

    Download

  • Securing Kubernetes Clusters with Tanzu Mission Control

    With the increasing use of Kubernetes platforms and distributed systems, platform teams are under greater pressure to ensure that all Kubernetes clusters are configured consistently, automatically, and secured across environments as they scale. VMware Tanzu Mission Control is a hub for multi-cluster Kubernetes management that extends across multi-cloud environments and supports platform teams with several types of policies, including access, network, image registry, quota, security, custom OPA, and the recently launched mutation policies. Join us to learn how to apply different policies to clusters at different levels of granularity (single cluster, cluster groups, etc.), the benefits of OPA Gatekeeper as a policy engine, and when to leverage mutation policies.

    Download

  • Ensure the security of your endpoint devices: Expert tips

    Endpoint devices are often the root cause of data breaches but finding the best endpoint security for your enterprise is a complex, ever-changing task. In this e-guide, experts Kevin Tolly and Eric Cole uncover 6 ways to improve endpoint device security and what features to focus on in your search for an endpoint security tool.

    Download