Back to Webinar
Latest Sponsored Events
Related Videos
Webinar Recording
Feb 22, 2017
Privileged User Monitoring as Key Element of Counter-Measures

The IT landscape is undergoing its biggest change at least since the introduction of the PC. Cloud services and mobile devices stand for the hyper-connected enterprise, where everyone has access to everything, and where services reside somewhere, in the organization and in the cloud. Attackers are trying to gain access to privileged accounts, hijacking these. A key element of counter-measures is implementing a Privilege Management infrastructure that helps monitoring, recording, and analyzing sessions.

Webinar Recording
Jan 25, 2017
Improving Your SOC Efficiency with Advanced Security Analytics

Today, the Security Operations Center (SOC) is at the heart of enterprise security management. Security analysts in most SOCs are still relying on traditional SIEM systems as a core platform for their daily operations. These are the primary tools to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security.

From statistical correlation methods to machine learning algorithms, from risk models to behavior profiling, from threat intelligence to cognitive technologies – there is a lot of exciting new developments going on in information security, which promise to dramatically improve the efficiency of your SOC.

Webinar Recording
Dec 07, 2016
Prevent Data Breaches - Moving to a Modern Approach to Breach Avoidance in Three Steps

The biggest mistake you can make it assuming you cannot, or will never, be breached – the challenge for any company is to have a strategy that meets their risk appetite, security measures with a known ROI, a detection plan so that you know before your customers and a mitigation strategy for when the worst happens.

Webinar Recording
Apr 15, 2015
Monitor Your Cloud Administrators and Managed Service Operators – Avoid Privilege Abuse and Fraud
Both the use of cloud services and outsourcing services to MSPs (Managed Service Providers) are on the rise. Managing cloud services or opening on-premise, hybrid, and external services for management by external operators requires the ability for controlling access, particularly privileged operator and administrator access, to these services. Who can manage your cloud services, particularly the ones that offer just one shared administrative account? And who controls the access of external operators to your services?