Mitigate targeted attacks with privileged account analytics
- LANGUAGE: English DATE: Monday, March 24, 2014 TIME: 4:00pm CET, 11:00am EDT, 8:00am PDT
Targeted attacks continue to hit the headlines as the pinnacle of cyber-attacks faced by businesses. Once the perimeter defenses fail to defend against targeted attacks, the mitigation focus has shifted to inside the network. Security analytics focused on privileged account activity can increase detection rates, cost less and be easier to operate. Learn how advanced and insider attacks maneuver throughout your organization, and where and how to intercept them with targeted privileged account analytics.
In this webinar, Martin Kuppinger of KuppingerCole will look at the broader context of cyber-attacks, the structure of some of the known attack scenarios that have been identified, and ways to improve your cyber-attack resilience. Given that privileged accounts due to their highly elevated nature are a logical element in such attacks, monitoring these is an important element in security strategies. He will put such analytics in the overall context of Realtime Security Analytics and cyber-attack resilience.
In the second part of the webinar, Jochen Koehler of CyberArk will dive into detail on attack scenarios and how to intercept them with targeted privileged account analytics.
1 Pear Pl, South Bank • SE1 8SB London • United Kingdom
CyberArk (NASDAQ: CYBR) is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit https://www.cyberark.com, read the CyberArk blogs or follow on Twitter via @CyberArk, LinkedIn, XING or Facebook.
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.