sidearea-img-1

Newsletter

 

Evaluation Form

"Tackling Critical Microsoft Vulnerabilities – How to Shift from Reactive to Proactive Security"

Please rate and answer the questions below. Your comments may be used for marketing of future events. If you do not want us to publish your comments, please contact us.

    YOUR DETAILS

    QUESTIONS

    Overall experience


    12345

    Quality of Presenter


    12345

    Quality of Content


    12345


    YesNoMaybe


    Discovering, managing, auditing, and monitoring privileged accountsManaging privileges on Windows, Mac, Linux, and Unix endpointsCentrally managing and securing remote access for service desks and vendors