SlideShare a Scribd company logo
Mitigating Risk in a Complex
Hybrid Directory Environment
Hosted by: Brad Sams
Petri Presenter: Sean Deuby
Veeam Presenter: Alvaro Vitta
What percentage of your organization
has moved to Office 365?
• 1-10%
• 10%-30%
• 30%-50%
• 50%+
• We’re not using Office 365 today
Sean Deuby
• Identity technology analyst and expert
• Microsoft MVP for Directory Services
since 2004
• Consults and speaks on cloud identity
and identity as a service (IDaaS)
• Identity architect at Edgile, Inc.
• Frequent contributor to Petri IT
Knowledgebase
Alvaro Vitta
• Principal Solutions Architect specializing
in security at Quest
• Specializes in Microsoft cloud-based data
center technologies, including Azure AD,
Office 365, Active Directory, Exchange,
and EMS (Enterprise Mobility Suite)
• Works with large private and public
organizations to help them solve
business problems with software
solutions across cloud, hybrid, and
private data center environments
Confidential5
• Market trends
• Infrastructure security challenges
• The solution
AGENDA
Confidential6
MARKET TRENDS
Organizations have used AD to
authenticate since 2001
2003
2013-TODAY
Organizations begin
taking the cloud
seriously
2007
Collaboration heats up
2009
Server 2008R2 -new
forest level
2001
AD replaces NT
2008
Add new resource
forest for security
2010
Upgrades, M&As,
BYOD, security
risks
TODAY
Future-ready Windows
Infrastructure
2004
Email is now business
critical
Office 365 adoption is growing rapidly
• 22 million consumers (55% YOY growth from 12.4 M)
and 70 million commercial customers who have
active Office 365 subscriptions.
• In the commercial segment, Office 365 had a 57
percent month-over-month jump in the latest 2016
quarter.
• Year-over-year growth: about 1 million subscribers a
month are adopting Office 365
Why do organizations move to the cloud?
• Reduce infrastructure, licensing, and maintenance
costs, eliminating on-premises
infrastructure and finding storage efficiencies
• Empower workforce to operate from anywhere from
any device
• Increase scalability and business continuity
What about Azure Active Directory?
• Office 365 *requires* an Azure AD instance
• Azure AD provides the Directory Service for Office 365 applications
• Azure AD integrates with on-prem AD creating a HYBRID Directory
environment
Azure Active Directory
Hybrid Environment: Azure AD Connect Synchronization Workflow
Summary: How Hybrid Directory was ‘created’
90% of Companies
use AD-On prem.
O365 Adoption
Growing at 70% YoY.
AAD has over 10M
tenants
75% of Orgs. > 500
users synch AD-On
prem. >> AAD
Hybrid Directory
How important is protecting on-prem AD resources?
75% of enterprises with
more than 500 employees
sync their on-prem AD
accounts to Azure
AD/Office 365 (AD on
premises is authoritative)
If you’re leveraging Office 365, are you
using Azure AD?
• Yes, managing Azure AD accounts
• Yes, but only replicating to Azure AD from on-
prem
• No, not using
Confidential15
HYBRID DIRECTORY SECURITY CHALLENGES
What is the surface attack area? AD On-Prem
Active AD
licenses
500
Million
Companies
using AD to
authenticate
90%
95 million of those accounts are under attack
every single day (Microsoft)
Daily
authentic-
ations
10
Billion
Accounts
under attack
each day
95
Million
What is the surface attack area? Azure AD
Number of
Azure AD
accounts
700
Million
Number of
Azure AD
tenants
10
Million
Daily
logons
1.3
Billion
MS Cloud
daily
cyberattacks
10
Million
Microsoft's user identity management systems, process over 13 billion logins
Over 10 million (per day) of these logins are
cyber-attacks.
Business Challenges
• Data exfiltration
• Insider threats
• Compliance failures
• Prolonged operational downtime
• Revenue loss due to downtime,
loss of productivity, and
potentially fines
• No permission baselining
• No automatic remediation
• Lack of detailed auditing
• Labor-intense/error-prone
• Lack of granular delegation
• Disjointed administration
• Manual DR Processes
Technical Challenges
Dangers and pitfalls if you don’t secure AD on-prem
Hybrid Directory Challenges faced by businesses
Confidential19
WHAT’S THE SOLUTION?
Securing the weakest link in your hybrid directory
Quest AD Security Lifecycle Methodology
Continually Assess
• Who has access to what sensitive
data and how did they get that
access?
• Who has elevated privileged
permissions in AD, servers, and SQL
DBs?
• What systems are vulnerable to
security threats?
Detect and Alert
• How will I know if any suspicious
privileged account activities have
occurred?
• Have any changes occurred that could
be significant of an insider threat?
• How will I know, quickly, if an intrusion
has happened?
• Could we be under brute-force attack
right now?
Remediate and Mitigate
• Is access control allowing those
whitelisted in and blacklisted out?
• Do my users have the lowest level of
user rights possible to do their jobs?
• Are my sensitive resources protected?
• How much time will it take me to
manually remediate unauthorized
changes?
Investigate and Recover
• How can I be sure that ‘it’ doesn’t happen again?
• How can I test my business continuity plan without going off
line?
• How long will it take us to recover from an
AD security incident, manually?
• What is my AD RTO after a disaster?
• Can I secure access to my DC before
next time?
Active Directory Security Suite components
IT Security Search & Recovery Manager FE
• Investigate AD security incidents
• Continuously test your AD business
continuity plan
• Recover from a security incident
• Improve your RTO following a disaster
• Secure access to AD DC data
Enterprise Reporter
• Report on elevated permission in
AD
• visibility of open shares across
servers
• Understand which servers have
vulnerable security settings
Active Roles & GPOAdmin
• Enforce permission
blacklisting/whitelisting in AD
• Implement AD least-privilege
access model
• Prevent unauthorized access to
sensitive resources
• Auto-Remediate unauthorized
activities
Change Auditor for AD
• Detect suspicious privileged AD
activities
• Alert on potential AD insider
threats
• Notify in real time of
unauthorized intrusions against
AD
• Detect and alert on brute-force
attacks
Hybrid directory solution protects all the way around
Secure your Active Directory to mitigate risk in
Office 365
• Organizations moving to Office 365 have real and significant
security challenges around Active Directory.
• On-premises AD remains the core of security even in a
cloud/hybrid environment.
• Quest offers the only end-to-end AD Security solution in the market
• Don’t let your on-premises AD be your Hybrid Achilles Heel!
What is the biggest technology problem facing
your organization today?
• Pressure on our IT budget
• Security threats
• IT skill gap
• Legacy applications management
• Cloud migration difficulty
• Other
Mitigating Risk in a Complex Hybrid Directory Environment
We get IT
Work Smarter
Petri.com | The IT Knowledgebase
Thank you for joining. Our
broadcast, presentation, and a Tech
Brief Summary will be provided.

More Related Content

PPTX
Security in an age of collaboration 201903 - tvaug
PPTX
SPSNL17 - Azure AD B2B - Safe collaboration has never been that easy!
PDF
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
PDF
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
PDF
O365Con19 - Azure Blackbelt - Jussi Roine
PDF
Itsummit2015 blizzard
PDF
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
PPTX
Cloud First: Be Prepared
Security in an age of collaboration 201903 - tvaug
SPSNL17 - Azure AD B2B - Safe collaboration has never been that easy!
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - Azure Blackbelt - Jussi Roine
Itsummit2015 blizzard
O365Con19 - A Life Without Passwords Dream or Reality - Sander Berkouwer
Cloud First: Be Prepared

What's hot (20)

PPTX
Softchoice & Microsoft: Public Cloud Security Webinar
PPTX
Improving Application Security With Azure
PDF
Dell EMC Spanning
PPTX
Security and governance in the cloud
PPSX
Nviron event rerun april 2014 delegate version
PPTX
Cybersecurity Legos - We're all part of something bigger
PDF
September 2021 Microsoft 365 Need to Know Webinar
PPTX
Cloud Governance Presentation Dreamforce 2012
PPTX
Evaluating the Cloud
PPTX
Webinar: Is Convergence right for you? – 4 questions to ask
PPTX
Effective Management of Azure through Operations Management Suite (OMS) Webinar
PDF
Jazoon'12 Enterprise-wide Cloud Governance
PPTX
Azure cloud governance deck
PPTX
Fundamentals of Microsoft 365 Security , Identity and Compliance
PDF
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
PDF
The New Normal - Eric Gales, AWS Canada
PPTX
Microsoft Teams - Governance A - Z
PDF
Cloud security: Accelerating cloud adoption
PDF
PingOne IDaaS: What You Need to Know
Softchoice & Microsoft: Public Cloud Security Webinar
Improving Application Security With Azure
Dell EMC Spanning
Security and governance in the cloud
Nviron event rerun april 2014 delegate version
Cybersecurity Legos - We're all part of something bigger
September 2021 Microsoft 365 Need to Know Webinar
Cloud Governance Presentation Dreamforce 2012
Evaluating the Cloud
Webinar: Is Convergence right for you? – 4 questions to ask
Effective Management of Azure through Operations Management Suite (OMS) Webinar
Jazoon'12 Enterprise-wide Cloud Governance
Azure cloud governance deck
Fundamentals of Microsoft 365 Security , Identity and Compliance
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
The New Normal - Eric Gales, AWS Canada
Microsoft Teams - Governance A - Z
Cloud security: Accelerating cloud adoption
PingOne IDaaS: What You Need to Know
Ad

Viewers also liked (14)

PDF
DIO Consulting Presentation for Corporate & Large Organizations
PPTX
K.Noelle Consulting Presentation
PPTX
Azure AD and Office 365 - Deja Vu All Over Again
PDF
Identity and Access Management - IDM365
PDF
How to Restructure and Modernize Active Directory
PPTX
CIS 2014: Azure Active Directory (Sean Deuby)
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PDF
14.06.05 IT Summit IAM Presentation
PDF
Pcubed project management consulting presentation
PPTX
IdM vs. IDaaS
PDF
Selling Consulting Services
PPTX
LCM Consulting presentation
PDF
Go-to-Market Best Practices for Startups
PPT
Mckinsey presentation template
DIO Consulting Presentation for Corporate & Large Organizations
K.Noelle Consulting Presentation
Azure AD and Office 365 - Deja Vu All Over Again
Identity and Access Management - IDM365
How to Restructure and Modernize Active Directory
CIS 2014: Azure Active Directory (Sean Deuby)
CIS 2015 The IDaaS Dating Game - Sean Deuby
14.06.05 IT Summit IAM Presentation
Pcubed project management consulting presentation
IdM vs. IDaaS
Selling Consulting Services
LCM Consulting presentation
Go-to-Market Best Practices for Startups
Mckinsey presentation template
Ad

Similar to Mitigating Risk in a Complex Hybrid Directory Environment (20)

PDF
How to Secure Access Control in Office 365 Environments
PPTX
TechFuse 2012: What does Office 365 mean to your organization?
PDF
Reducing the Chance of an Office 365 Security Breach
PDF
Houd controle over uw data
PPTX
How does Quest Software fit into a Microsoft hybrid environment?
PPTX
Azure Active Directory
PDF
Proven Practices for Office 365 Deployment, Security and Management
PPTX
Identity Management Over the Horizon: What’s New and What’s Next
PPTX
What is Microsoft Enterprise Mobility Suite and how to deploy it
PPTX
Cloud Security Zen: Principles to Meditate On
PPTX
Shadow IT Risk and Reward
PDF
15th December 2016 - Microsoft Paddington Vuzion Partner Event
PPTX
Ms.azure in detail
PPTX
Future of Making Things
PPTX
Why you should use common data service final
PPTX
Introduction to Active Directory
PPTX
PPTX
SharePoint Online vs. On-Premise
PDF
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
PPTX
Addvantum Oracle Profile OFMW
How to Secure Access Control in Office 365 Environments
TechFuse 2012: What does Office 365 mean to your organization?
Reducing the Chance of an Office 365 Security Breach
Houd controle over uw data
How does Quest Software fit into a Microsoft hybrid environment?
Azure Active Directory
Proven Practices for Office 365 Deployment, Security and Management
Identity Management Over the Horizon: What’s New and What’s Next
What is Microsoft Enterprise Mobility Suite and how to deploy it
Cloud Security Zen: Principles to Meditate On
Shadow IT Risk and Reward
15th December 2016 - Microsoft Paddington Vuzion Partner Event
Ms.azure in detail
Future of Making Things
Why you should use common data service final
Introduction to Active Directory
SharePoint Online vs. On-Premise
Make A Stress Free Move To The Cloud: Application Modernization and Managemen...
Addvantum Oracle Profile OFMW

More from Quest (20)

PPTX
DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
PPTX
Got Open Source?
PDF
SQL Server 2017 Enhancements You Need To Know
PPTX
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
PPTX
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
PDF
Migrating to Windows 10: Starting Fast. Finishing Strong
PDF
The Cost of Doing Nothing: A Ransomware Backup Story
PDF
Ensuring Rock-Solid Unified Endpoint Management
PDF
Effective Patch and Software Update Management
PDF
Predicting the Future of Endpoint Management in a Mobile World
PDF
Investigating and Recovering from a Potential Hybrid AD Security Breach
PPTX
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
PDF
Sounding the Alarm with Real-Time AD Detection and Alerting
PDF
Identifying Hybrid AD Security Risks with Continuous Assessment
PPTX
Office 365 Best Practices That You Are Not Thinking About
PDF
How to Restructure Active Directory with ZeroIMPACT
PDF
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
PDF
Your Biggest Systems Management Challenges – and How to Overcome Them
PDF
Top Five Office 365 Migration Headaches and How to Avoid Them
PDF
KACE Endpoint Systems Management Appliances - What’s New for 2017
DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
Got Open Source?
SQL Server 2017 Enhancements You Need To Know
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Migrating to Windows 10: Starting Fast. Finishing Strong
The Cost of Doing Nothing: A Ransomware Backup Story
Ensuring Rock-Solid Unified Endpoint Management
Effective Patch and Software Update Management
Predicting the Future of Endpoint Management in a Mobile World
Investigating and Recovering from a Potential Hybrid AD Security Breach
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Sounding the Alarm with Real-Time AD Detection and Alerting
Identifying Hybrid AD Security Risks with Continuous Assessment
Office 365 Best Practices That You Are Not Thinking About
How to Restructure Active Directory with ZeroIMPACT
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Your Biggest Systems Management Challenges – and How to Overcome Them
Top Five Office 365 Migration Headaches and How to Avoid Them
KACE Endpoint Systems Management Appliances - What’s New for 2017

Recently uploaded (20)

PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
top salesforce developer skills in 2025.pdf
PDF
Digital Strategies for Manufacturing Companies
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
ai tools demonstartion for schools and inter college
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
Operating system designcfffgfgggggggvggggggggg
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
top salesforce developer skills in 2025.pdf
Digital Strategies for Manufacturing Companies
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Which alternative to Crystal Reports is best for small or large businesses.pdf
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Odoo Companies in India – Driving Business Transformation.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Design an Analysis of Algorithms II-SECS-1021-03
Wondershare Filmora 15 Crack With Activation Key [2025
ai tools demonstartion for schools and inter college
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Odoo POS Development Services by CandidRoot Solutions
wealthsignaloriginal-com-DS-text-... (1).pdf
Understanding Forklifts - TECH EHS Solution
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
How to Migrate SBCGlobal Email to Yahoo Easily
Operating system designcfffgfgggggggvggggggggg

Mitigating Risk in a Complex Hybrid Directory Environment

  • 1. Mitigating Risk in a Complex Hybrid Directory Environment Hosted by: Brad Sams Petri Presenter: Sean Deuby Veeam Presenter: Alvaro Vitta
  • 2. What percentage of your organization has moved to Office 365? • 1-10% • 10%-30% • 30%-50% • 50%+ • We’re not using Office 365 today
  • 3. Sean Deuby • Identity technology analyst and expert • Microsoft MVP for Directory Services since 2004 • Consults and speaks on cloud identity and identity as a service (IDaaS) • Identity architect at Edgile, Inc. • Frequent contributor to Petri IT Knowledgebase
  • 4. Alvaro Vitta • Principal Solutions Architect specializing in security at Quest • Specializes in Microsoft cloud-based data center technologies, including Azure AD, Office 365, Active Directory, Exchange, and EMS (Enterprise Mobility Suite) • Works with large private and public organizations to help them solve business problems with software solutions across cloud, hybrid, and private data center environments
  • 5. Confidential5 • Market trends • Infrastructure security challenges • The solution AGENDA
  • 7. Organizations have used AD to authenticate since 2001 2003 2013-TODAY Organizations begin taking the cloud seriously 2007 Collaboration heats up 2009 Server 2008R2 -new forest level 2001 AD replaces NT 2008 Add new resource forest for security 2010 Upgrades, M&As, BYOD, security risks TODAY Future-ready Windows Infrastructure 2004 Email is now business critical
  • 8. Office 365 adoption is growing rapidly • 22 million consumers (55% YOY growth from 12.4 M) and 70 million commercial customers who have active Office 365 subscriptions. • In the commercial segment, Office 365 had a 57 percent month-over-month jump in the latest 2016 quarter. • Year-over-year growth: about 1 million subscribers a month are adopting Office 365
  • 9. Why do organizations move to the cloud? • Reduce infrastructure, licensing, and maintenance costs, eliminating on-premises infrastructure and finding storage efficiencies • Empower workforce to operate from anywhere from any device • Increase scalability and business continuity
  • 10. What about Azure Active Directory? • Office 365 *requires* an Azure AD instance • Azure AD provides the Directory Service for Office 365 applications • Azure AD integrates with on-prem AD creating a HYBRID Directory environment Azure Active Directory
  • 11. Hybrid Environment: Azure AD Connect Synchronization Workflow
  • 12. Summary: How Hybrid Directory was ‘created’ 90% of Companies use AD-On prem. O365 Adoption Growing at 70% YoY. AAD has over 10M tenants 75% of Orgs. > 500 users synch AD-On prem. >> AAD Hybrid Directory
  • 13. How important is protecting on-prem AD resources? 75% of enterprises with more than 500 employees sync their on-prem AD accounts to Azure AD/Office 365 (AD on premises is authoritative)
  • 14. If you’re leveraging Office 365, are you using Azure AD? • Yes, managing Azure AD accounts • Yes, but only replicating to Azure AD from on- prem • No, not using
  • 16. What is the surface attack area? AD On-Prem Active AD licenses 500 Million Companies using AD to authenticate 90% 95 million of those accounts are under attack every single day (Microsoft) Daily authentic- ations 10 Billion Accounts under attack each day 95 Million
  • 17. What is the surface attack area? Azure AD Number of Azure AD accounts 700 Million Number of Azure AD tenants 10 Million Daily logons 1.3 Billion MS Cloud daily cyberattacks 10 Million Microsoft's user identity management systems, process over 13 billion logins Over 10 million (per day) of these logins are cyber-attacks.
  • 18. Business Challenges • Data exfiltration • Insider threats • Compliance failures • Prolonged operational downtime • Revenue loss due to downtime, loss of productivity, and potentially fines • No permission baselining • No automatic remediation • Lack of detailed auditing • Labor-intense/error-prone • Lack of granular delegation • Disjointed administration • Manual DR Processes Technical Challenges Dangers and pitfalls if you don’t secure AD on-prem Hybrid Directory Challenges faced by businesses
  • 19. Confidential19 WHAT’S THE SOLUTION? Securing the weakest link in your hybrid directory
  • 20. Quest AD Security Lifecycle Methodology
  • 21. Continually Assess • Who has access to what sensitive data and how did they get that access? • Who has elevated privileged permissions in AD, servers, and SQL DBs? • What systems are vulnerable to security threats?
  • 22. Detect and Alert • How will I know if any suspicious privileged account activities have occurred? • Have any changes occurred that could be significant of an insider threat? • How will I know, quickly, if an intrusion has happened? • Could we be under brute-force attack right now?
  • 23. Remediate and Mitigate • Is access control allowing those whitelisted in and blacklisted out? • Do my users have the lowest level of user rights possible to do their jobs? • Are my sensitive resources protected? • How much time will it take me to manually remediate unauthorized changes?
  • 24. Investigate and Recover • How can I be sure that ‘it’ doesn’t happen again? • How can I test my business continuity plan without going off line? • How long will it take us to recover from an AD security incident, manually? • What is my AD RTO after a disaster? • Can I secure access to my DC before next time?
  • 25. Active Directory Security Suite components IT Security Search & Recovery Manager FE • Investigate AD security incidents • Continuously test your AD business continuity plan • Recover from a security incident • Improve your RTO following a disaster • Secure access to AD DC data Enterprise Reporter • Report on elevated permission in AD • visibility of open shares across servers • Understand which servers have vulnerable security settings Active Roles & GPOAdmin • Enforce permission blacklisting/whitelisting in AD • Implement AD least-privilege access model • Prevent unauthorized access to sensitive resources • Auto-Remediate unauthorized activities Change Auditor for AD • Detect suspicious privileged AD activities • Alert on potential AD insider threats • Notify in real time of unauthorized intrusions against AD • Detect and alert on brute-force attacks
  • 26. Hybrid directory solution protects all the way around
  • 27. Secure your Active Directory to mitigate risk in Office 365 • Organizations moving to Office 365 have real and significant security challenges around Active Directory. • On-premises AD remains the core of security even in a cloud/hybrid environment. • Quest offers the only end-to-end AD Security solution in the market • Don’t let your on-premises AD be your Hybrid Achilles Heel!
  • 28. What is the biggest technology problem facing your organization today? • Pressure on our IT budget • Security threats • IT skill gap • Legacy applications management • Cloud migration difficulty • Other
  • 30. We get IT Work Smarter Petri.com | The IT Knowledgebase Thank you for joining. Our broadcast, presentation, and a Tech Brief Summary will be provided.