With Multi-Factor Authentication adding a second factor of authentication to on-premises and cloud applications is easier than ever. Join this session for an deep technical breakdown of Multi-Factor Authentication and how it works with Active Directory, Active Directory Federation Services (AD FS), and Microsoft Azure Active Directory to enable rapid deployment of multi-factor authentication for a wide range of applications. Multi-Factor Authentication secures access to remote access VPNs, virtual desktops, web applications (OWA and SharePoint), cloud services (Office 365), and custom applications. We show you how.
Individual humans do not scale very well. Let's face it, we can barely multitask. So with Cloud Computing how do we keep up with the growing demand for maintenance tasks for these "infinitely scalable" assets? The answer is automation. Azure Automation is a highly available automation service which helps you "Automate all the things". Anything from deployments, to monitoring to maintenance tasks can be set up using this reliable workflow execution engine. This presentation covers the fundamentals of the Azure Automation service and provides some insights into how to leverage it with your own solutions.
Una buona strategia di protezione dati vi può difendere da eventi che non potete prevedere: un malfunzionamento dell'hardware, virus o un semplice sbalzo di corrente, infatti, possono cancellare tutto. Windows Azure Backup è proprio quella strategia. In pochi minuti si ottiene:
◾ Flessibilità: Otto Datacenter nel mondo dove salvare i dati ◾ Sicurezza: Sei copie dei tuoi dati a cui accedere con una connessione internet ◾ Scalabilità: Non importa quanti dati hai e se questi cresceranno, lo spazio non manca! ◾ Privacy: I tuoi dati sono sempre criptati e solo tu hai la chiave
Today we are able to see a clear shift in how enterprises are targeted by malware engineers. The attack landscape has adapted to the new world and they now perform targeted attacks, especially over the social networks. Because guess what? The CEO, CTO, or even the girl next door has a social network account. Join this session and explore how social engineering has grown over time and examine lessons learned from the field on how to best mitigate those traps.