Ransomware attack mitigation with InTrust and Change Auditor

This demo shows how you can use InTrust and Change Auditor to minimize the damage of a ransomware attack, without a specialized malware detection solution in place.

Related videos

Product overview of InTrust
Product overview of InTrust

This video provides a product overview of InTrust.

Collecting Microsoft IIS logs with Quest InTrust
Collecting Microsoft IIS logs with Quest InTrust

Watch a step-by-step tutorial on how to collect Microsoft IIS logs using InTrust.

Defend against PowerShell attacks with automated response actions
Defend against PowerShell attacks with automated response actions

In this demo, watch how you can use InTrust's automated response actions to minimize the impact of modern PowerShell-based attacks such as Pass the Hash.

How to collect custom applications and services logs
How to collect custom applications and services logs

Watch you how can collect custom applications and services logs with InTrust.

Get what you need from data without the headaches
Get what you need from data without the headaches

InTrust simplifies how you search, analyze and maintain IT data – no matter where it lives – while helping you save on storage costs. And InTrust’s long-term event log repository also help you stay in compliance with event log requirements (HIPAA, SOX, PCI, FISMA, etc.).

相关产品

IT Security Search
IT Security Search

輕鬆將分散的 IT 資料關聯整合至互動式搜尋引擎中。

下载免费试用版

InTrust
InTrust

安全地收集、存储和接收来自Windows、Unix和Linux系统的事件数据

下载免费试用版