Para obter uma melhor experiência web, utilize o IE11+, Chrome, Firefox ou Safari.

Eight Ways to Analyze Privileged Sessions to Identify Your Most Suspicious Activity

Eight Ways to Analyze Privileged Sessions to Identify Your Most Suspicious Activity
Sob demanda
  • Data gravada:Jun. 21, 2018
  • Evento:Sob demanda
Eight Ways to Analyze Privileged Sessions to Identify Your Most Suspicious Activity

When you funnel all administrative sessions - such as RDP and SSH - through a privileged session solution, it provides new ways to analyze activity in real-time so you can detect rogue admins and hijacked accounts.

Watch this Randy Franklin Smith-hosted webcast on demand to learn about the eight ways that you can analyze privileged activity to prevent damage from compromised privileged accounts.

O que você vai aprender

Find out how using an aggregate risk score decreases the amount of false positives. Once the score reaches the danger zone, the solution can:

  • Flag the session for later review
  • Immediately alert a security analyst or account holder
  • Terminate the session immediately
  • Suspend a compromised or malicious account

Palestrantes

Randy Franklin Smith - CEO, Monterey Technology Group

Richard Hosgood - Principal Systems Consultant, One Identity

Assistir a seu webcast gratuito

Por favor, aguarde...

triangle-down check
Ao fazer o download, você se inscreverá para receber nosso e-mail marketing. Para cancelar sua inscrição, siga as etapas descritas em nossa Política de Privacidade.

reCAPTCHA protege este site. Confira a Política de Privacidade e os Termos de Uso do Google.