InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Deploying an Identity Threat Detection and Response Solution in Your Organization

Presented by

Matthew Gardiner, Product Marketing and Itay Nachum, Product Management

About this talk

Recent highly public breaches highlight the key role of identity in escalating a minor incursion into a business-impacting breach. Some defenders leveraging Identity Threat Detection and Response (ITDR) solutions focus on finding and remediating identity vulnerabilities before attackers exploit them. Others focus instead on accelerating their threat detection and response with the enterprise-wide deployment of deceptive resources. The best way ultimately to maximize identity security is by implementing both strategies together. Join us for a 30-minute webinar and learn best practices for implementing an ITDR solution. You will learn: - How and why attackers have shifted their tactics to be more focused on identity security - Key elements of an identity security solution that will work for your organization - Implementation strategies on how you can leverage an ITDR project
Proofpoint

Proofpoint

85429 subscribers826 talks
Protect people. Defend data.
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 85 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
Related topics