Para tener la mejor experiencia web, use IE11+, Chrome, Firefox o Safari.

Eight Ways to Analyze Privileged Sessions to Identify Your Most Suspicious Activity

Eight Ways to Analyze Privileged Sessions to Identify Your Most Suspicious Activity
A pedido
  • Fecha de grabación:Jun. 21, 2018
  • Evento:A pedido
Eight Ways to Analyze Privileged Sessions to Identify Your Most Suspicious Activity

When you funnel all administrative sessions - such as RDP and SSH - through a privileged session solution, it provides new ways to analyze activity in real-time so you can detect rogue admins and hijacked accounts.

Watch this Randy Franklin Smith-hosted webcast on demand to learn about the eight ways that you can analyze privileged activity to prevent damage from compromised privileged accounts.

Lo que aprenderá

Find out how using an aggregate risk score decreases the amount of false positives. Once the score reaches the danger zone, the solution can:

  • Flag the session for later review
  • Immediately alert a security analyst or account holder
  • Terminate the session immediately
  • Suspend a compromised or malicious account

Oradores

Randy Franklin Smith - CEO, Monterey Technology Group

Richard Hosgood - Principal Systems Consultant, One Identity

Vea su transmisión vía Internet

Espere...

triangle-down check
Al realizar la descarga, se registra para recibir un correo electrónico de marketing de parte nuestra. Puede optar por no recibir ningún correo electrónico siguiendo las pasos que se detallan en nuestra Política de privacidad.

reCAPTCHA protege este sitio. Consulte la Política de privacidad de Google y los Términos de uso.