Cygna Labs
Book a Demo
shield

Strengthen your organization’s cybersecurity posture with software solutions from Cygna Labs

Webinars

webinar

Reducing Risk in MS Azure: Tracking and Restoring Changes within Entra ID and M365

May 28, 2024 02:00 PM Eastern Time (US and Canada)

Cygna Labs has an Entra ID Recovery Tool to complement our Entra ID Auditor and on Prem-AD Audit and Recovery Tools.

Register now to see how the Cygna Entra ID Recovery Tool overcomes the limitations of the native recovery tools. Then we’ll take a closer look at the information that Cygna labs can collect from Entra ID as well as M365 and how it can be used to augment your cloud security.

Jeff Melnick

Jeff Melnick

Director of Systems Engineering Security & Compliance

English

webinar

DDI for SASE Deployments

June 11, 2024 01:00 PM Eastern Time (US and Canada)

The Secure Access Service Edge (SASE) is a network architecture that optimizes network access with security from anywhere by combining SD-WAN with network security functions including zero trust network access, cloud access controls, and web firewalls delivered as a cloud service at the network edge. As with all network implementations, DNS-DHCP-IPAM (DDI) serves the foundational function of initializing and navigating SASE applications.

Timothy Rooney

Timothy Rooney

Vice President Products DDI

English

webinar

Monitoring Microsoft-Based Hybrid Infrastructures: An Introduction to Cygna Auditor

June 11, 2024 02:00 PM Eastern Time (US and Canada)

Monitoring, alerting, reporting and protection in Microsoft-based hybrid infrastructures.

Register for one of our webinars and learn how you can use the Cygna Auditor Platform to improve the availability, security and compliance across your IT infrastructure while reducing costs.

Jeff Melnick

Jeff Melnick

Director of Systems Engineering Security & Compliance

English

webinar

Securing Teams and your M365 Environment

June 25, 2024 02:00 PM Eastern Time (US and Canada)

M365 and Teams has made it easier than ever to share information, unfortunately it’s easy to overshare. Join us as we take a closer look at Teams, where files are stored in Teams, some of the common attacks in M365 and how you can alert on and get ahead of these potential breaches.

Jeff Melnick

Jeff Melnick

Director of Systems Engineering Security & Compliance

English