Mitigate targeted attacks with privileged account analytics
- LANGUAGE: English DATE: Monday, March 24, 2014 TIME: 4:00pm CET, 11:00am EDT, 8:00am PDT
Targeted attacks continue to hit the headlines as the pinnacle of cyber-attacks faced by businesses. Once the perimeter defenses fail to defend against targeted attacks, the mitigation focus has shifted to inside the network. Security analytics focused on privileged account activity can increase detection rates, cost less and be easier to operate. Learn how advanced and insider attacks maneuver throughout your organization, and where and how to intercept them with targeted privileged account analytics.
In this webinar, Martin Kuppinger of KuppingerCole will look at the broader context of cyber-attacks, the structure of some of the known attack scenarios that have been identified, and ways to improve your cyber-attack resilience. Given that privileged accounts due to their highly elevated nature are a logical element in such attacks, monitoring these is an important element in security strategies. He will put such analytics in the overall context of Realtime Security Analytics and cyber-attack resilience.
In the second part of the webinar, Jochen Koehler of CyberArk will dive into detail on attack scenarios and how to intercept them with targeted privileged account analytics.
CyberArk is the #1 provider in privileged account security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise—on premises, in the cloud, on endpoints, and throughout the DevOps pipeline. Privileged accounts, credentials, and secrets allow anyone who gains possession of them to control organization resources, disable security systems, and access vast amounts of sensitive data.
CyberArk is the only public company 100% focused on privileged account security, and is trusted by more than 3,650 of the world’s leading organizations, including more than 50 % of the Fortune 100 and nearly 30% of the Global 2000, in almost 90 countries.
Endpoint detection and response (EDR) solutions monitor endpoint and network events and record the information in a central database. There, the information is subjected to further analysis, detection, investigation, reporting, and alerting. While EDR solutions may be a good start to protect endpoints, they are by no means sufficient. Instead, Endpoint Privilege Management (EPM) solutions must be integrated to protect the systems from within.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.