Netwrix Workshop: EMC and NetApp Auditing
About this webinar
Watch the recorded webinar session and learn how to detect insider threats and prevent breaches of unstructured data in EMC Isilon, VNX, VNXe and the latest versions of NetApp Data ONTAP.
Hiding in Plain Sight: How Attackers Move through the Network Undetected
Once attackers have breached the perimeter, they often lurk in the network for months, looking for valuable data to steal. To stay hidden, they try to make their actions blend in with normal traffic.
By the end of this session, you will know:
· What techniques attackers use to traverse the network without raising alarms
· What native Microsoft tools can help you spot covert attacks
· How you can identify the hiding attacks by using Netwrix Auditor functionality