On-demand Webinar

Rough Guide to Windows 10 Security

Windows 10 has been built from the ground-up to be the most secure desktop operating system ever. It includes many advanced security features but, for many, it looks complicated as there are a lot of new capabilities and options to understand and manage.

This webinar, in the spirit of the Rough Guide to “tell it like it is” attitude, will review the Windows 10 security landscape highlighting those elements that are most critical for the majority of organizations and how they can be used together to create a secure environment.

It will also look at what’s needed to enable those security features, how to effectively manage firmware settings across multiple hardware platforms, and keep Windows and applications up to date with the latest security patches.

Attendees will:

  • Understand the evolution of Windows security and how it addresses the broad scope of cyber threats
  • Learn the most important Windows 10 security features that every organization needs to deploy
  • Find out how to enable security at the firmware level and keep systems current with the latest security updates
  • Have concrete recommendations of what to do next to improve their cyber security

Speakers

  • Shannon Fritz
    Shannon Fritz
    Technical Specialist, Microsoft
  • Dave Fuller
    Dave Fuller
    Product Manager, 1E

Fill in the form to watch the webinar

Share this post

Share this post on your favourite social media platform.

Find this resource useful?

If so please click here

Related Content

On-demand Webinar

Ignite 2018 – What you might have missed

MVP Émile Cabot and technical gurus Simon Binder and Jim Bezdan, articulate a first-hand look of what the experts experienced and learned about the trends, tools, and key findings from Ignite 2018.

On-demand Webinar

SecOps 101: Get Operations and Security Working Hand in Hand

Maintaining an effective security posture is a challenge. There is an incessantly increasing landscape of cyberthreats, the volume and complexity of attacks seems to increase on a daily basis, and despite their best intentions, many organizations’ security protocols are mostly…

Report

Tachyon Review by David Strom

“Think about Tachyon as what Google was trying to do back in the late 1990s. That is where we are today with Tachyon: think of it as the search tool for finding out the health of your network.”

Case Study

How 1E helped the US Department of Veteran Affairs (VA) take their FITARA Software Asset Management score from F to A

The US Department of Veteran Affairs (VA) was in a compromising position: they had received an F rating, equivalent to failing, two years in a row, in the Federal Information Technology Acquisition Reform Act (FITARA).

About 1E

Cyber security is critical. One breach could destroy your organization’s reputation and cost millions of dollars. We take that threat seriously. 1E gives you unprecedented control and visibility over your full digital estate, delivered at speed and at scale. We’re working towards a world of proactive cyber security, a world where CIOs and CISOs work together to ensure that no threat can bring down their systems.