Deep Dive: How to Conduct Effective SQL Server Auditing

About this webinar

Recorded: May 13, 2019

SQL Server stores all kinds of data, from customer information and credit card numbers to intellectual property. If your server is not properly secured, this critical data is an easy target for hackers as well as disgruntled employees. To ensure the security and availability of your data, you need to track all changes and detect all failed logon attempts on your SQL servers.

Join us to learn how to answer security-related questions such as these:

  • Who removed records from your SQL database?
  • What is the name of each removed object?
  • When did each modification occur?
  • Which users failed to connect to a SQL Server instance?
  • How many logons were attempted by each user?
  • And many more
Hosted by
Adam Stetson,
Systems engineer

Securing Your Network Devices in the Era of Cyber Threats

The last several years have seen a massive proliferation of network devices. Despite their benefits, any single device could act as an entry point for hackers or malware. Network administrators must take a hard look at routers, access points, IoT devices and a variety of other network devices to safeguard them from cyber threats. The result can be clear visibility into network activity for maximum security and performance. In this informative webinar, you will learn:

  • Strategies for performing device risk assessments.
  • Methods to spot and remediate unauthorized  changes or change errors.
  • Why identity is a critical factor in maintaining device security.
  • Actionable strategies you can use right now to secure your network devices.
12pm EDT
25 July, 12pm EDT
Register Now