Pour bénéficier d’une expérience Web optimale, utilisez Internet Explorer 11 ou version ultérieure, Chrome, Firefox, ou Safari.

Eight Ways to Analyze Privileged Sessions to Identify Your Most Suspicious Activity

Eight Ways to Analyze Privileged Sessions to Identify Your Most Suspicious Activity
a la demande
  • Date enregistrée:Jun. 21, 2018
  • Événement:a la demande
Eight Ways to Analyze Privileged Sessions to Identify Your Most Suspicious Activity

When you funnel all administrative sessions - such as RDP and SSH - through a privileged session solution, it provides new ways to analyze activity in real-time so you can detect rogue admins and hijacked accounts.

Watch this Randy Franklin Smith-hosted webcast on demand to learn about the eight ways that you can analyze privileged activity to prevent damage from compromised privileged accounts.

Ce que vous apprendrez

Find out how using an aggregate risk score decreases the amount of false positives. Once the score reaches the danger zone, the solution can:

  • Flag the session for later review
  • Immediately alert a security analyst or account holder
  • Terminate the session immediately
  • Suspend a compromised or malicious account

Intervenants

Randy Franklin Smith - CEO, Monterey Technology Group

Richard Hosgood - Principal Systems Consultant, One Identity

Regarder votre webcast gratuit

Veuillez patienter...

triangle-down check
En téléchargeant, vous vous inscrivez pour recevoir des e-mails marketing de notre part. Pour vous désinscrire, veuillez suivre les instructions figurant dans notre politique de confidentialité.

Site protégé par reCAPTCHA. Consultez les conditions d’utilisation et la politique de confidentialité de Google.