What we're about

The first step to mastery is learning.

This group is for all those IT professionals who aim to streamline their company's IT management effortlessly. In this group, you'll learn about the vast portfolio of comprehensive IT management technologies that ManageEngine has to offer.

From security and service desk to network and device management, learn tips and tricks about everything IT and become a master of IT management.

We're coming to Europe with a series of insightful and interactive seminars on IT management. Whether you're an IT manager, system administrator, or IT security officer, you won't want to miss this seminar.

Why you should attend these seminars:

- Engage in interactive training sessions on effective IT management.

- Learn the best practices surrounding ITIL, IT security, network management, and more.

- Grow your professional network and meet with both peers and industry experts.

- Get hands-on experience with cutting-edge solutions for effective IT management.

To stay tuned with ManageEngine events, visit: https://www.manageengine.eu/events.html

Or send an email to europe-events@manageengine.com.

Upcoming events (4+)

Unusual cybersecurity threats that are preventable

Link visible for attendees

  • Some unusual security threats that can affect the average person.
  • Discussing drive-by download attacks, malvertising, and more.
  • How to monitor your network for these threats.
  • Why awareness is important in cybersecurity, and best practices.

Ensure your hybrid workforce is resilient to cyberattacks

Link visible for attendees

  • Take the first step towards Zero Trust security by enabling MFA for Windows, macOS, Linux, RDP, VPN, and OWA logons.
  • Be context-aware, and automate user access decisions based on risk analysis.
  • Streamline user access to enterprise applications with SSO and passwordless authentication.
  • Ensure password hygiene with breached password screening and granular password policies.

5 user activity anomalies that can be detected with UBA

Link visible for attendees

  • Deriving threat insights with UBA
  • Interpreting anomalies to spot potential threats
  • Brute force attacks
  • Ransomware infiltration
  • Malicious insider activity
  • Privilege escalations
  • Data mishandling
  • Mitigating damage with advanced threat responses.
  • Combating security incidents with ADAudit Plus.

All about cyber insurance: Learn to implement the security controls

Link visible for attendees

  • What cyber insurance is and why it's important.
  • What cyber insurance covers and what it doesn't.
  • What minimum controls are required to reduce cyber insurance premiums.
  • How to implement these controls.

Past events (119)

Photos (137)