Top 10 Critical Changes to Audit in Your IT Infrastructure
With a number of recent high-profile security breaches and compliance violations, it has become clear that traditional security mechanisms, such as firewalls, IDS, and antivirus, should no longer be treated as the only line of defense against external attackers and insider threats. Change and configuration auditing of critical systems across the entire IT infrastructure is an integral way of maintaining your organization's security standards and compliance responsibilities. Inability to protect your company’s sensitive information can have detrimental effects on your IT environment and your business at large.
In this webinar, we'll walk through 10 of the most critical changes to audit in your IT systems and show how Netwrix Auditor can provide you with mechanisms to successfully deal with security and compliance challenges.
Dec 10, 11am EST
23 IT pros registered!
Surviving IT Audit with Style: Top 5 Focal Points
Is your organization required to facilitate an IT audit? Are you concerned whether your IT department is ready and what should be the focus of your efforts? In this webinar you’ll learn about five major topics that should be taken care of as a matter of best practice or as a core component of any IT compliance:
• Management of Users and Policies
• Privileged Accounts and Activities
• Change Management and Configurations
• Permissions and Access Control
• Documentation and Audit Trail
These areas would probably be the most scrutinized by an auditor and will require evidence in support of establishment and effectiveness of enabling policies and procedures. We will also explain how you can leverage change and configuration auditing software to enable effective and affordable solution for simplifying IT management and preparing yourself for an audit.
Dec 16, 11am EST
17 IT pros registered!
Top 5 Critical Active Directory Changes to Audit
For many IT departments, Active Directory is the single most critical system within IT infrastructure, because it provides authentication and authorization for the entire organization. Without the oversight provided by change and configuration auditing, unwanted changes may occur undetected that put compliance initiatives at risk, compromise security, and impact business continuity.
In this webinar, you'll learn the top 5 critical Active Directory changes to audit. We will also show how Netwrix Auditor for Active Directory provides complete visibility into what is happening across your critical systems. This will help you to streamline compliance, strengthen security, and simplify root cause analysis.
Jan 6, 11am EST
6 IT pros registered!
Detect and Prevent Data Breaches with Netwrix Auditor
Have you ever had to spend hours verifying the security on a file share or trying to determine who has access to particularly sensitive files? Or maybe sifting through thousands of events in a Windows event log to prepare a report for management or auditors? IT departments are challenged to come up with security controls that protect sensitive company data from unauthorized system changes, well-meaning insiders’ mistakes and targeted attacks while maintaining the productivity of users who need to access the files.
In this webinar, we will discuss how change and configuration audit helps to mitigate the risk of data breaches. We will show how Netwrix Auditor enables complete visibility into who has access where, as well as track all changes and access attempts to files and file shares.
Jan 15, 11am EST
6 IT pros registered!
Fireside Chat: Ensuring Your IT Policies Actually Work with Change and Access Auditing
Originally Recorded: 10-15-2014
In this featured Fireside Chat, MVP Jason Helmick and Ilia Sotnikov of Netwrix will discuss how change and access auditing can support IT security policies and provide the necessary feedback and early alerts on any incidents. They will also review several real life examples of how automating this process can save time and efforts for incident responses, failures root cause analysis and passing compliance IT audits.
Top 5 Critical Active Directory Changes to Audit with Netwrix Auditor
Originally Recorded: 09-16-2014
In our most popular webcast, Netwrix pre-sales engineer Jeff Melnick joined Nick Cavalancia, technology evangelist, consultant, speaker, trainer and writer (Techvangelism, Ascendo, Netwrix, SpectorSoft), to discuss the trending topic of IT change auditing and specifically Active Directory change auditing. Click the link below to find out the key highlights of this discussion, followed by a full-length video recording of the presentation.
Do You Audit Your Changes? Preventing the Next Heartbleed From Crippling Your Organization
Originally Recorded: 07-22-2014
No IT protection system is effective without in-depth, easy to use change auditing and notification. When passwords are compromised, and an attacker has legitimate credentials, systems and networks are at risk.
Join Microsoft MVP John O'Neill Sr. and Jeff Melnick Sales Engineer at Netwrix to learn how recent threats proved that organizations have been lulled into a false sense of about network security invulnerability, why every organization needs change and configuration auditing and how Netwrix Auditor provides visibility into changes occurring across the entire IT infrastructure.
Top 5 Critical Changes to Audit in Microsoft SharePoint
Originally Recorded: 06-26-2014
Microsoft SharePoint has found its way to many IT environments just like yours, and for many organizations it has already become a critical service. Regardless of SharePoint deployment size and maturity, absence of proper change documentation and audit can lead to a serious risk.
Join Ron Charity, Enterprise Architect, and Ilia Sotnikov, Director of Product Management at Netwrix to see real life examples from actual SharePoint deployments and find out how third party tools such as Netwrix Auditor are helping organizations to meet regulatory compliance requirements, protect sensitive information and minimize risk to business operations.
It's Only a Matter of Time: Surviving an IT Audit
Originally Recorded: 03-13-2014
If you haven’t been through one, IT audits are a painful experience. Industry expert Alan Shimel and Nick Cavalancia from Netwrix discuss what specific questions auditors are asking IT, how to prepare for an audit and what tools to use.
Active Directory Auditing Headaches and How To Solve Them
Originally Recorded: 02-20-2014
Keeping tabs on changes to Active Directory can be a challenge for even the most experienced IT administrator. In this 45-minute webinar Microsoft MVP and Petri IT Knowledgebase Contributing Editor John O’Neill Sr. will help you identify some primary AD auditing headaches and present some tips and advice on how to manage them. Nick Cavalancia from Netwrix Corporation will join to discuss what tools are available to help address these headaches and reveal how Netwrix Auditor can help manage AD changes.
Making Your AD Life Easy
Originally Recorded: 10-03-2013
Every IT Pro knows their day is unpredictable - full of one-off calls from users, bosses and peers alike all with requests you didn't know about the day before.
Watch this webinar to learn how to automate some of the more common Active Directory tasks to put more time back into your day.
Show Me the Money: Impossible Active Directory Problems Solved with Change Auditing
Originally Recorded: 09-23-2013
There are some things in Active Directory that you simply can't do. Or can you? With so many tasks and not enough time, IT Pros need simple solutions to some of the most perplexing problems in AD today.
Join industry expert Greg Shields from Concentrated Tech and Netwrix's Nick Cavalancia as they discuss how to deal with some of the more challenging AD issues today using change auditing.
Event Log Management 101: Consolidation, Archiving, Alerting, Reporting
Originally Recorded: 08-10-2012
Event log data is a unique source of information for security, audit, compliance and troubleshooting. But native tools don't provide consolidation, archiving and reporting features, required to effectively utilize event data and comply with external regulations.
Watch this 33-minute webinar to learn how you can collect event logs from multiple computers across the network, receive alerts on most critical events and store all events in a compressed format that enables convenient analysis of archived event log data.