For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Tracking the attacker's steps: Using PAM in your incident response toolkit

Tracking the attacker's steps: Using PAM in your incident response toolkit
On Demand
  • Recorded Date:Nov. 2, 2021
  • Event:On Demand
Tracking the attacker's steps: Using PAM in your incident response toolkit

A modern PAM solution will help you catch attackers trying to impersonate your privileged users, but what happened before that alarm went off? How did the attacker get access? Learn how integration with a security orchestration and response (SOAR) platform can help you gain those insights.

Speakers

Shannon Mathers

PAM Product Architect - One Identity