Hi [[ session.user.profile.firstName ]]

Netwrix

  • Date
  • Rating
  • Views
  • Withstanding a Ransomware Attack: A Step-by-Step Guide Withstanding a Ransomware Attack: A Step-by-Step Guide Russel McDermott, Netwrix Recorded: Nov 8 2016 43 mins
    Ransomware has spread epidemically in 2016. Analysts, IT pros and corporate staff list it among the top IT security threats. According to a report prepared by the Cyber Threat Alliance (CTA), CryptoWall, version 3.0, alone has already cost its victims $325 million. Malicious software R&D is funded profusely through sources ranging from the proceeds of criminal activity to money raised through crowdfunding services. Under crowdfunding, those who pay the developer receive a copy and can try using it.

    Join our new webinar “Withstanding a ransomware attack: A step-by-step guide” and learn:

    -What you should do to ensure your data’s availability,
    -How to train your colleagues to avoid being caught on the hook of ransomware,
    -How to moderate the aftermath of a ransomware attack,
    -And more!
  • Why visibility is a crucial part of any security strategy Why visibility is a crucial part of any security strategy Peter Smith, Regional Sales Manager - Europe & Russell McDermott, Sales Engineer, Netwrix Recorded: Sep 7 2016 44 mins
    With a recent increase in high-profile security breaches and compliance violations, traditional security mechanisms, such as firewalls, IDS, and antivirus are no longer enough to defend against external attackers, and insider threats. By having increased visibility into internal changes, configurations, access events, and permissions across the IT infrastructure, organizations can far more effectively defend against such attacks.

    So, please join our local auditing and compliance team from Netwrix, Pete Smith (Regional Sales Manager Europe) and Russell McDermott (Pre-Sales Engineer) and see how Netwrix Auditor can unlock the door into possible breaches in your IT environment.

    From our brief session you will learn:

    • How deeply security breaches and data leaks are really effecting organizations
    • How to protect your data from the insider threats
    • How to have “peace of mind”, and achieve complete visibility of your IT infrastructure
  • Best Practices in Preventing Data Breaches with IT Audit Best Practices in Preventing Data Breaches with IT Audit John Morgan (Sales Representative), Adam Stetson (Sales Engineer) Recorded: Jun 15 2016 46 mins
    According to the Global State of Information Security Survey 2016, in 2015, the number of security incidents grew by 38% compared to 2014’s levels. Today, it is clear that traditional security measures are no longer as effective as they need to be and that even advanced techniques can be bypassed. Companies have realized the need to develop new security strategies that will help them address contemporary cyber-threats.

    Join Netwrix experts John Morgan (Sales Representative) and Adam Stetson (Sales Engineer) to learn how IT auditing helps solidify your security strategy. During the session, we will talk about:

    • Today’s data breaches and security experts’ predictions;
    • How auditing complements cyber-threat defense mechanisms;
    • Proven recommendations for what should be audited and why.

    Stick around for a live Q&A session for answers to your questions!
  • How to Survive an IT Audit… and Thrive Off It! How to Survive an IT Audit… and Thrive Off It! Roy Lopez, Netwrix corporation Recorded: Mar 28 2016 68 mins
    Compliance standards and regulations are complex and they tell you everything about multiple requirements, but nothing about how to fulfill them. In these conditions, how does one survive an IT audit?

    In this webinar, you’ll learn about top control processes that should be taken care of as matters of best practice or as core components of any IT compliance. These areas would probably be the most scrutinized by an auditor and will require evidence that supports the establishment and effectiveness of enabled policies and procedures.
  • Product Demo: Netwrix Auditor 7.1. Active Directory and Exchange Auditing Product Demo: Netwrix Auditor 7.1. Active Directory and Exchange Auditing Jeff Melnick, Netwrix Corporation Recorded: Jan 15 2016 61 mins
    Watch the recorded product demo of Netwrix Auditor 7.1 and learn more about auditing Active Directory and Microsoft Exchange. During the session, we will guide you on how Netwrix Auditor enables complete visibility into:
    - Active Directory;
    - Group Policy;
    - Microsoft Exchange Server;
    - And more!

    Learn more about Netwrix Auditor: http://www.netwrix.com/auditor.html
  • Solidify your Security Strategy: Dealing with Advanced Threats Solidify your Security Strategy: Dealing with Advanced Threats Jeff Melnick, Netwrix Corporation Recorded: Oct 13 2015 45 mins
    According to Verizon’s “2015 Data Breach Investigation Report,” the cyberattacks are becoming increasingly sophisticated. Cybercriminals have been successful in creating new techniques and deceptive tactics that outpace security efforts. Under these conditions, what would be your approach to dealing with security threats?

    Join us for a live webinar session and discover how auditing can help mitigate the risk of data breaches and solidify your security strategy overall. During the session, we will talk about:
    - The latest data breaches and their ramifications;
    - How auditing complements threat-defense mechanisms;
    - What should be audited and why.
  • Become an Active Directory Auditing Superstar: Getting Started Become an Active Directory Auditing Superstar: Getting Started Adam Bertram (MVP, DevOps Engineer) & Jeff Melnick (Manager of Sales Engineering at Netwrix) Recorded: Aug 20 2015 66 mins
    Join independent expert Adam Bertram, MVP and DevOps Engineer, and Jeff Melnick, Manager of Sales Engineering at Netwrix, for an educational webinar series, in which they will help you upgrade your skills from Active Directory Auditing Beginner to Active Directory Auditing Superstar!

    Watch the recorded webinar session and learn more about how to start auditing process with Active Directory:

    - Typical Active Directory auditing scenarios;
    - First steps in Active Directory auditing;
    - Configurating Active Directory for an audit;
    - Typical problems;
    - Native auditing.

    Watch the second webinar session "Become an Active Directory Auditing Superstar: Deep Dive into Active Directory Auditing":
    https://www.netwrix.com/become_an_active_directory_auditing_superstar_deep_dive.html