Mayorista de Soluciones TI

>>Unmonitored permissions and unchecked privileged access – an invitation to a security breach>
  • privileged access

Unmonitored permissions and unchecked privileged access – an invitation to a security breach

  • Why attend this webinar?

    Privileged, critical or sensitive users, these terms may sound like IT jargon, but they all boil down to a simple point – these users have deeper access than a regular user. Privileged users are the prized possessions in your AD, and are usually the most favored target of most attackers.

    There is more than one way to acquire privileged access, and once attackers gain access to a privileged account, it is only a matter of time before they claw their way into the deepest parts of your network.Hence, a systematic approach for detecting, identifying and managing privileged access is the need of the hour. Liberally assigning permissions, leaving privileged access unmonitored, irregular cleanup, etc must be avoided to maintain security.

    In this webinar, you’ll learn how to:

    • What classifies a user as privileged, and how to detect users who may have hidden privileges.
    • How to identify the full potential of a privileged user.
    • A few techniques to assign privileges the right way, and tame rogue privileges to protect your organization against insider attacks.
Register now

Fecha:

29 Oct 2019

Hora:

17:00 pm - 17:45 pm

Precio:

GRATIS

Ubicación:

Online ME