Workshop iX: Efficient cybersecurity for small and medium-sized businesses

Do you work in a small and medium-sized company (SME) and would like to improve your security? In our iX laboratory Efficient IT security for small and medium-sized businesses Over the course of two mornings you will receive useful approaches for cost-effective protection and learn about practical solutions and strategies, specifically tailored to the needs […]

Continue Reading

iX Workshop: SAP S/4HANA – What you need to know to make the switch

As SAP plans to end support for SAP ECC by 2027, many companies are facing an imminent move to SAP S/4HANA. Announcement Workshop for IT managers The iX laboratory Introduction to SAP S/4HANA (Cloud and On-Prem) familiarizes you with SAP’s current SAP S/4HANA ERP system and addresses current challenges in choosing a (new) ERP solution. […]

Continue Reading

iX Workshop: Using Keycloak for Secure Identity and Access Management

The open source access provider Keycloak is a popular implementation of the OpenID Connect protocol. With Keycloak, users of directory services such as Active Directory or LDAP can securely access various web applications using single sign-on (SSO) and multi-factor authentication. Announcement In the three days of online training Identity and access management (IDM/IAM) and SSO […]

Continue Reading

Workshop iX IT Security: Understanding and Successfully Repelling Attack Techniques

The iX laboratory Cyber ​​security: current attack techniques and their defense deals with current attack techniques and the resulting protective measures needed for your IT systems against potential attacks. Based on the current threat situation in the field of IT security, you will learn practical strategies and techniques to defend yourself from the most frequent […]

Continue Reading

iX Workshop: Building a Hybrid Cloud (Last Call)

Hybrid clouds combine the benefits of public cloud, such as easy scalability, high availability, and transparent costs, with an on-premises infrastructure to meet data protection and compliance requirements. Announcement The iX workshop Building a hybrid cloud shows IT architects and administrators how to move parts of their IT workloads to the public cloud and how […]

Continue Reading

Workshop iX KRITIS: Expertise special test procedure for § 8a BSIG

Critical infrastructure (KRITIS) is subject to special security requirements under Section 8a (1) BSIG. The operators of these companies and public institutions are required to demonstrate to the Federal Office for Information Security (BSI) on a regular basis that their IT security corresponds to the current state of the art. To this end, they must […]

Continue Reading

iX Workshop: MDM – MDM with Microsoft Intune (early bird discount until June 27)

In the two-day iX training Mobile device management with Microsoft Intune Learn how to integrate Windows, iOS, MacOS, and Android-based laptops, tablets, cell phones, and virtually any other mobile device into your corporate network with the cloud-based service from Microsoft Intune. Examples and best practices show how to configure corporate-owned and BYOD endpoints using configuration […]

Continue Reading

iX Workshop: Business Continuity Management (BCM) and IT Contingency Planning

No company is immune from becoming a victim of a cyber attack. Contingency planning helps you do the right thing quickly in an emergency and prevent worse things from happening. In the three-day online training course BCM: Emergency planning and drills From June 26 to 28, under the guidance of an expert speaker, you will […]

Continue Reading