Pour bénéficier d’une expérience Web optimale, utilisez Internet Explorer 11 ou version ultérieure, Chrome, Firefox, ou Safari.

Eight Ways to Analyze Privileged Sessions to Identify Your Most Suspicious Activity

a la demande
  • Date enregistrée:Jun. 21, 2018
  • Événement:a la demande

When you funnel all administrative sessions - such as RDP and SSH - through a privileged session solution, it provides new ways to analyze activity in real-time so you can detect rogue admins and hijacked accounts.

Watch this Randy Franklin Smith-hosted webcast on demand to learn about the eight ways that you can analyze privileged activity to prevent damage from compromised privileged accounts.

Ce que vous apprendrez

Find out how using an aggregate risk score decreases the amount of false positives. Once the score reaches the danger zone, the solution can:

  • Flag the session for later review
  • Immediately alert a security analyst or account holder
  • Terminate the session immediately
  • Suspend a compromised or malicious account

Intervenants

Randy Franklin Smith - CEO, Monterey Technology Group

Richard Hosgood - Principal Systems Consultant, One Identity