For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Eight Ways to Analyze Privileged Sessions to Identify Your Most Suspicious Activity

Eight Ways to Analyze Privileged Sessions to Identify Your Most Suspicious Activity
On Demand
  • Recorded Date:Jun. 21, 2018
  • Event:On Demand
Eight Ways to Analyze Privileged Sessions to Identify Your Most Suspicious Activity

When you funnel all administrative sessions - such as RDP and SSH - through a privileged session solution, it provides new ways to analyze activity in real-time so you can detect rogue admins and hijacked accounts.

Watch this Randy Franklin Smith-hosted webcast on demand to learn about the eight ways that you can analyze privileged activity to prevent damage from compromised privileged accounts.

What you will learn

Find out how using an aggregate risk score decreases the amount of false positives. Once the score reaches the danger zone, the solution can:

  • Flag the session for later review
  • Immediately alert a security analyst or account holder
  • Terminate the session immediately
  • Suspend a compromised or malicious account

Speakers

Randy Franklin Smith - CEO, Monterey Technology Group

Richard Hosgood - Principal Systems Consultant, One Identity

Watch Your Free Webcast

Please wait...

triangle-down check
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.