Beyond Perimeter: Detecting Ransomware and Aberrant User Behavior

About this webinar

Recorded: June 22, 2017

The avalanche of recent WannaCry Ransomware attacks proves that cybercriminals have been successful in creating new techniques and deceptive tactics that easily outpace traditional perimeter security. Under these conditions, what is your security plan to detect the threats that are already inside? 

Watch the recorded webinar and learn how to:

  • Detect ransomware attacks like WannaCry once they are inside
  • Bring context to the data your SIEMs and other tools are already collecting
  • Gain true visibility into what’s really happening in your IT infrastructure
Hosted by
Jeff Melnick,
Systems Engineer
Jim Smith,
Vice President, Sales, North America

Mitigating IT risks with Data Classification and Access Control

Your company may maintain terabytes of data. Your reputation and financial future remain at stake if someone steals personally identifiable information (PII) from a single unaccounted-for file. Your organization may need to pass compliance audits; what controls do you have in place to identify, classify, and secure your data?

Join industry analyst Tim Warner and Netwrix system engineer Jeff Melnick to learn how to start a corporate data classification and protection scheme right now. Ask Jeff and Tim questions and leave the webinar armed with practical advice and next step actions.

21
June
1pm EDT
21 June, 1pm EDT
Register Now