Learn about the best practices of IT infrastructure auditing, get your questions answered and discover how Netwrix helps you gain visibility into your hybrid IT environment
Netwrix has become an Approved CPE Provider. Join our webinars and earn your CPE credits!
See what the new Netwrix Auditor 9.8 has to offer, including helping you further strengthen the security of your Windows infrastructure and SharePoint data. Join Netwrix team as we demonstrate how to:
... and much more
Sign up for the live demo now!
Jak dużo wiesz o zachowaniu użytkowników w Twoim środowisku IT? Jeśli ktoś nagle będzie próbował uzyskać dostęp do poufnych plików i folderów, których wcześniej nie używał, jak szybko to zauważysz? Niestety z doświadczenia wiemy, że szkodliwe działania często pozostają niewykryte przez długi czas.
Zapoznaj się z dogłębną analizą nieprawidłowego zachowania użytkowników wykonaną przez Netwrix Auditor, aby dowiedzieć się:
Webinar zostanie poprowadzony w języku polskim przez Netwrix i Bakotech.
Active Directory manages access to your organization's critical business resources, so any breach of security or misconfiguration can prove catastrophic. The free GUI tools provided by Microsoft are good for performing one-off operations but aren't designed for bulk changes or queries. In this webinar, Russell Smith will show you how to use PowerShell to manage Active Directory and track configuration changes. Jeff Melnick will join him to demonstrate Netwrix solutions that enable you to manage AD even more effectively.
By the end of the session, you’ll learn how to:
See what the new Netwrix Auditor 9.8 has to offer, including helping you further strengthen the security of your Windows infrastructure and SharePoint data. Join Netwrix team as we demonstrate how to:
... and much more
Sign up for the live demo now!
See what Netwrix Auditor has to offer, including how you can prevent data breaches by staying in control of your sensitive and regulated data. Join a Netwrix systems engineer as he demonstrates how to:
Sign up for the live demo now!
A recurring problem we hear about is dumpster diving – where salvaging waste that was discarded by organizations proves of value to hackers. Ultimately, dumpster diving can derail organizations’ objectives.
Addressing the dilemma of how to identify dark data and dispose of redundant, outdated, or trivial (ROT) information from unmanaged or poorly managed file shares and siloed repositories, can be costly. From not only maintaining unneeded servers, but also the risks of data breaches, hacker activity, and acting on erroneous information for decision making.
This webinar explores the business ramifications of unmanaged and potentially toxic data, and provides a solution to cleanse repositories, with easy-to-use tools for ongoing management. See a live demo of the process for generating an inventory of file shares, based on a variety of different variables. And leave with a clear understanding of the why, what, and how of cleansing content to obtain business advantages.
We are excited to showcase the functionality of our newest product — Netwrix Data Classification! This software reveals the true value of information you store and cures both your information security and governance headaches.
Join us for a live demo and learn how to:
This mostly-demos webinar will showcase a couple of the new security features, straight from Chapter 10 of the Active Directory Administration Cookbook that you can use to up your organisation's security game. See for yourself what they offer (and what they don't) and how your organisation may benefit from you applying them in the right way.
You’ll see such features as:
• Fine-grained password
• Account lockout policies
• LAPS
• Active Directory Recycle Bin
• Group Managed Service Accounts
• Protected Users group
If someone suddenly starts to access sensitive files and folders that they rarely used before, how quickly would you notice? Unfortunately, malicious insider activities often go undetected for a long time.
Take part in this deep dive to learn how to:
• How to analyse data access trends and sudden activity spikes
• How to detect compromised accounts in your environment
• How to investigate incidents efficiently and determine the best response
Знаете ли достатъчно много за поведението на потребителите във Вашата ИТ средата? Ако някой изведнъж започне да достъпва файлове и директории с чувствителна информация, които рядко са използвали преди, колко бързо можете да забележите? За съжаление зловредната активност на служителите в организациите често бива засечена прекалено късно.
Участвайте в този технически уебинар, за да видите наживо способностите на NETWRIX Auditor да анализира и открива аномалното потребителско поведение и да научите:
Уебинарът ще се проведе съвместно с NETWRIX и КОМПЮТЪР 2000 и ще бъде на български език.
See what the new Netwrix Auditor 9.8 has to offer, including helping you further strengthen the security of your Windows infrastructure and SharePoint data. Join Netwrix team as we demonstrate how to:
... and much more
Sign up for the live demo now!
See what the new Netwrix Auditor 9.8 has to offer, including helping you further strengthen the security of your Windows infrastructure and SharePoint data. Join Netwrix team as we demonstrate how to:
... and much more
Sign up for the live demo now!
We are excited to showcase the functionality of our newest product — Netwrix Data Classification!
This software reveals the true value of information you store and cures both your information security and governance headaches.
With solutions from Netwrix, you can reduce the exposure of your sensitive data by moving it to a safe location, deleting confidential pieces of content from it and more.
Take part in our deep dive to learn how to determine whether your organisation should be concerned about insider threats.
In this session, Liam Cleary shows how DLP looks for messages, files, and documents that contain sensitive information and advise you about how to configure and apply DLP policies to control the flow of data.
We are excited to showcase the functionality of our newest product — Netwrix Data Classification! This software reveals the true value of information you store and cures both your information security and governance headaches.
Find out how to use native management and security features to control and secure your Office 365 environment.
Working in a financial institution is a never-ending source of stress. Both implementing the proper security controls and proving your compliance during audits can feel overwhelming. Watch this industry-focused demo and discover how to be confident about the safety of your sensitive data and your compliance grade.
Texas recently passed a new law that requires school districts to designate a security coordinator, adopt a cybersecurity policy and report any breach of student personally identifiable data to the TEA. Are you ready for that?
The last several years have seen a massive proliferation of network devices. Despite their benefits, any single device could act as an entry point for hackers or malware.
Take part in a deep dive into risk assessment as Netwrix Solutions Engineer explains how to keep your IT infrastructure secure with Netwrix Auditor.
Tighter data protection regulations have forced organizations to put data security at the top of their priority list. Join this panel of experts to discover why companies fail to ensure data security and how to avoid the same fate.
See what Netwrix Auditor has to offer, including how you can prevent data breaches by staying in control of your sensitive and regulated data.
See the new Netwrix Auditor in action! In this webinar, we demonstrate how the new features and enhancements in Netwrix Auditor 9.8 can help you further strengthen the security of your Windows infrastructure and SharePoint data.
Despite the increasing popularity of cloud storage and SharePoint, Windows file servers still play an important role in the enterprise. Understanding who has access to data and keeping file servers secure isn't an easy task. In an era when regulatory compliance is a top concern for many organisations, controlling file server security is more critical than ever.
Active Directory manages access to your organisation's critical business resources, so any breach of security or misconfiguration can prove catastrophic. The free GUI tools provided by Microsoft are good for performing one-off operations but aren't designed for bulk changes or queries. In this webinar, Russell Smith shows you how to use PowerShell to manage Active Directory and track configuration changes.
See what the new Netwrix Auditor 9.8 has to offer, including helping you further strengthen the security of your Windows infrastructure and SharePoint data.
Inability to promptly detect changes and suspicious logon attempts to your Cisco and Fortinet devices leaves your organization vulnerable to attackers. Netwrix Auditor reports and alerts on modifications to each of your network devices, with the before and after values.
Most of IT pros share a lofty goal: to protect all the data that their organization stores. But the truth is, that’s an impossible mission; there’s just too much data. Fortunately, it’s also unnecessary.
In this webinar, Dave Shackleford of SANS Institute and Voodoo Security, discusses some of the security gaps that attackers use to breach organizations, based on his firsthand experience with clients.
See the new Netwrix Auditor in action! In this webinar, we demonstrate how the new features and enhancements in Netwrix Auditor 9.8 can help you further strengthen the security of your Windows infrastructure and SharePoint data.
In this webinar, Brian Johnson from 7 Minute Security reveals some of the security gaps that attackers use to breach organisations, based on his firsthand experience with clients. The coolest part of the session is when Brian demonstrates how you can catch attackers red-handed before they manage to take control of your systems.
In this webinar we talk about the Data Classification Toolkit, which provides more classification properties for meeting common regulatory compliance standards. But there are some gaps in FCI and that’s where Netwrix comes in.
To ensure the security and availability of your data, you need to track all changes and detect all failed logon attempts on your SQL servers. Watch this 30-minute webinar to find out how to conduct effective SQL server auditing.
See how to identify and protect structured and unstructured sensitive data. Learn about how an NPO is saving £80,000 annually thanks to Netwrix.
Proper setup and management of Group Policy are essential to mitigating the risk of security breaches, compliance failures and system downtime. This session covers the third section of Exam 70-742, which is about Group Policy management.
Once you have your domain controllers and AD groups set up, it’s time to learn how to configure security policies, maintain Active Directory, and spot changes that could jeopardize security or availability.
This session focuses on effective installation and administration of Active Directory. In addition to providing step-by-step training from an AD expert, the session also explores the potential pitfalls of AD configuration.
Find out how to analyze data access trends and sudden activity spikes in order to detect compromised accounts in your environment.
In this session, Liam Cleary and Bob Cordisco will answer all the questions you submitted during the previous sessions, give you advice about how to solve problems in your Office 365 environment and demonstrate additional Netwrix Auditor functionality for Office 365.
There are hundreds of ways that HIPAA rules can be violated — improper disclosures of PHI, unauthorized access, failure to conduct risk analysis, failure to maintain and monitor PHI access logs, and many more! But most violations come not from malicious intent...
Microsoft’s Security & Compliance Center is designed to help you manage compliance features across the platform and implement advanced threat protection, including data loss prevention (DLP). Liam will show how DLP looks for messages, files, and documents that contain sensitive information and advise you about how to configure and apply DLP policies to control the flow of data. Then Bob will demonstrate how Netwrix Auditor delivers more accurate classification results, with lower false positives/negatives than standard Office 365 rules.
What if we could better protect our companies by preventing users from picking over 500 million known bad passwords? And better yet, what if we could do this for free?
You can manage your enterprise’s cloud environment through the Office 365 Admin Center. For some tasks, you can use Microsoft PowerShell, which is especially useful for bulk operations, such as provisioning multiple user accounts at once. Our expert, Liam, will give you thorough insight into Office 365 administration tools, and then Dave will show you how Netwrix Auditor’s reporting features can help you track changes and receive alerts about critical modifications, so you can quickly investigate and respond to improper changes in your Office 365 environment.
Password cracking is no longer rocket science but a handy skill for any penetration tester, system defender or anyone who simply enjoys a good geeky project. Join our webinar series to learn how to set up cracking tools in the cloud and better protect your AD environment.
Get useful tips and tricks for protecting your IT infrastructure in an ever-changing cybersecurity world in just 15 minutes. Watch this St. Patrick's Day session to discover the most recent breach patterns: who, when and where could steal your sensitive data.
Some of Netwrix Auditor’s features are well-known and appreciated by our customers. Others, not so much. It’s not that these features aren’t great; rather, it’s that we don’t talk about them much or their benefits are not evident at first sight. We hate to think our customers are missing out on some really cool functionality, so we’ve decided to bring these under-valued features out of the shadows and into the spotlight they deserve.
How can you and your team investigate and resolve the issue as quickly as possible? Through the power of automation! By using PowerShell one-liner commands and short scripts, you can research, report on and remediate a wide range of issues.
Watch the technical session about managing file systems with PowerShell as Russell Smith shares commands that enable you to get a permissions report, audit permissions changes on a file server and find over-permissioned folders.
Do organizations battle insider threats? They try to. Are they successful at mitigating the risk? Not so much. Watch our deep dive demo to learn how to identify security weak spots so you can remediate them before they are exploited.
In this video tutorial, Russell Smith will show you how to use PowerShell to manage Active Directory and track configuration changes.
Hackers love it when we choose weak or leaked passwords for our most important accounts. What if we could better protect our companies by preventing users from picking over 500 million known bad passwords? And better yet, what if we could do this for free?
Learning how to crack passwords is fun and incredibly useful for assessing the security of your IT environment. It used to be a considerable time and money sponge, requiring you to drop a big chunk of change on a beefy desktop and invest some serious time in building and configuring it. The good news is that now, thanks to the power of the cloud, we can build a rocking virtual cracking box that can try millions of password guesses per second — all for about a dollar an hour.
All too often, organizations treat contractors, suppliers and partners as if they were full-fledged employees, giving them regular end-user credentials. While you might place a lot of trust in these third parties, it’s wise to take extra precautions when providing credentials to people from outside your organization.
Wouldn’t it be great to spend less than 5 minutes a day on risk assessment and go home with no worries about your organization’s security? Believe it or not, Netwrix Auditor can help you do just that!
If you had a hacker sneaking around your network right now, how would you know?
Get useful tips and tricks for protecting your IT infrastructure in an ever-changing cybersecurity world in just 15 minutes. Watch this Christmas Special episode to make sure you stay off Santa's Naughty List for your Privileged Account management.
In this webinar, Adnan Hendricks, cloud solution architect and Microsoft MVP, explores Azure AD conditional access policies and multifactor authentication and explain how you can strengthen user credentials and reduce your attack surface area.
A new GDPR-like law was signed in June. If you think that it won’t impact you because your company isn’t based in California, we have bad news for you: CCPA applies to all organizations that store the personal information of California residents.
Too many organisations wait until an employee’s error results in a breach before they take employee security training seriously. Computer-based training and occasional email blasts are simply not enough. You need a company-wide security awareness program that encourages cooperation and communication, not just compliance with security policy and procedures.
While the insider threat is dominating the headlines and boardroom discussions, there’s another critical issue lurking in the shadows: a global shortage of experienced cybersecurity professionals. As organisations adopt cloud technologies, data volumes grow and IT complexity increases, this lack of talent can lead to data breaches, compliance failures and other costly errors.
If you want to make full use of our product’s functionality and discover cool but underrated features of Netwrix Auditor, watch this webinar on demand.
Se, hvad den nye Netwrix Auditor 9.7 har at tilbyde, herunder at spotte angreb på dit netværksudstyr og se, hvem der har adgang til filer i din SharePoint Farm.
Breaches resulting from insider misdeeds are front-page news on a regular basis. It’s up to IT pros to understand the techniques attackers use, educate their users to avoid common traps, and take the necessary steps to avoid breaches.
Netwrix Auditor can not only improve organisation’s security and compliance but also liberate you from many routine tasks. Just learn how to configure it properly, and you’ll finally have time to work on all the strategic projects you’ve had to keep on the back burner!
Organizations adopt SharePoint readily because it’s extremely powerful and easy to use, but all too often, they fail to take the time to really understand the security concerns and implement appropriate security practices.
See what Netwrix Auditor has to offer, including how you can prevent data breaches by staying in control of your sensitive and regulated data.
See what Netwrix Auditor has to offer, including how you can prevent data breaches by staying in control of your sensitive and regulated data.
The new Netwrix Auditor 9.7 is already available! Watch this exclusive webinar to learn how the latest version of the product empowers you to strengthen network security and speed incident investigation and response.
The new Netwrix Auditor 9.7 is already available! Watch this exclusive webinar to learn how the latest version of the product empowers you to strengthen network security and speed incident investigation and response.
It has been almost 6 months since the GDPR came into force. In this webinar, GDPR consultant Ann Barrett will help us explore how the task of achieving compliance has already evolved during that time. We will also reveal several alarming trends in IT security and highlight the key areas you should focus on to stay compliant.
Do you ever lie awake for hours despite your comfortable bed because doubts about your organization’s security posture won’t stop swirling in your head? We're pretty sure you do. Watch this special webcast where Brian Johnson shares common “easy wins” that pentesters use to break into networks and handy free tools that will help you sleep safe and sound.
Get useful tips and tricks for protecting your IT infrastructure in an ever-changing cybersecurity world in just 15 minutes. This Halloween, we’ve prepared some horrifying stories which shocked and kept IT pros awake at night in 2018.
Although cloud providers claim that technology is mature enough to handle any security-related issues, ensuring data integrity in the cloud and proving it to compliance auditors are still among the top concerns for the majority of companies.
Group Policy is more important than ever. One errant change, and 1, 2 or 1000 machines may not be in compliance any longer. Windows has some built in protections to tell you when Group Policy changes occur, but does it go far enough?
Office 365 has become the platform of choice for document collaboration and sharing. If you’re using Microsoft Office 365 or planning to migrate there, understanding the types of security attacks you can expect is imperative.
Too many organizations wait until an employee’s error results in a breach before they take employee security training seriously. Computer-based training and occasional email blasts are simply not enough. You need a company-wide security awareness program.
HIPAA’s “Wall of Shame” lists all breaches that affected at least 500 individuals. In the past two years alone, 394 breaches made the list, almost a half of which was the result of unauthorized access or disclosure. How can you set risk-appropriate access controls and keep your organization off the “wall of shame”?
As we continue to upgrade Netwrix Auditor’s functionality to satisfy more security and compliance use cases, we want to make sure you are using the platform to its full potential. Join our webinar to learn how new Netwrix Auditor – Data Discovery and Classification Edition can add value to your existing deployment.
Get useful tips and tricks for protecting your IT infrastructure in an ever-changing cybersecurity world in just 15 minutes. In this session, we’ll update you on recent data theft incidents and offer techniques to deter data theft by departing employees.
While the insider threat is dominating the headlines and boardroom discussions, there’s another critical issue lurking in the shadows: a global shortage of experienced cybersecurity professionals.
Proper setup and management of Group Policy are essential to mitigating the risk of security breaches, compliance failures and system downtime. This session covers the third section of Exam 70-742, which is about Group Policy management.
Once you have your DCs and AD groups set up, it’s time to learn how to configure security policies, maintain AD, and spot changes that could jeopardize security or availability. Watch this webinar to prepare for the second section of Exam 70-742, which is dedicated to continuous management of Active Directory.
Analytics have named 2017 “the year of the healthcare breach” — which is exactly what they called 2016. As the threats continue to grow, you need strategies for protecting your organisation. In this hands-on session, we will discuss ways to withstand cyber attacks directed against the healthcare industry.
Watch our recorded crash course and get answers to questions such as:
Breaches resulting from insider misdeeds are front-page news on a regular basis. Unfortunately, the average employee misses a critical common thread across many these stories: that the root cause of the incident was a non-malicious but uninformed person just like them. It’s up to IT pros to understand the techniques attackers use, educate their users to avoid common traps, and take the necessary steps to avoid breaches.
To minimize security and compliance risks, as well as reduce costs on under-utilized hardware and software, IT pros need to inventory all IT assets their organization has and track changes to them. If done manually, these tasks require hours of tedious work, so many organizations seek tools that streamline the process.
This webinar covers the first section of Exam 70-742, which focuses on effective installation and administration of Active Directory. In addition to providing step-by-step training from an AD expert, the session also explores the potential pitfalls of AD configuration and ways to ensure your configuration enhances the security of your IT environment.
You probably know that hackers have been using the registry’s Run and RunOnce keys for decades to automatically start their malware when a user logs on. While those keys are still being used in attacks, there are many others you need to know about as well. In this webinar, Windows security expert Randy Franklin Smith shines a light into several dark corners of the registry that bad guys are now exploiting.
This time, white hat hacker Liam Cleary will focus on Office 365 cybersecurity — a major concern for organizations that are moving all or part of their on-premises environments to the cloud. Watch this webinar and learn how to run simulated attacks to test your end users and teach them what not to do.
Netwrix Auditor can not only improve organization’s security and compliance but also liberate you from many routine tasks. Just learn how to configure it properly, and you’ll finally have time to work on all the strategic projects you’ve had to keep on the back burner!
Passing your compliance audits is critical. After all, failures can lead to stiff penalties, damage to your organization’s reputation, and even dismissal of CIOs or other staff members. To help you avoid these unpleasant consequences and keep your IT environment secure, we’ve assembled expert advice and tips.
ITProToday and Netwrix experts get together to discuss new variants of the Spectre and Meltdown vulnerabilities, which enable an attacker to obtain access to sensitive information on affected systems.
In all the gigabytes or terabytes of data you store, can you identify the sensitive files that require protection the most? Watch this webinar to learn how you can use data classification to strengthen access control and mitigate the risk of security incidents and compliance failures.
To inflict damage on critical systems or steal the data, hackers need administrative-level access. Gaining the permissions is not a simple task, since most operating systems have built-in protections against privilege escalation. But many attackers do succeed.
This demo is an excellent opportunity for both beginners and experienced users of the platform to explore the key functionality in our new product version — Netwrix Auditor 9.6. Learn how you can classify and secure your data.
Once hackers have breached your perimeter, they often lurk in your network for months, looking for valuable data to steal. This first-hand session is packed with actionable information that will help you detect attacks before it’s too late.
Are you aware of what is happening across your IT environment? Are you certain your data is secure? Watch the recording now as Liam Cleary, our expert hacker, reveals what types of attacks to be on the lookout for and how to identify them quickly.
GDPR is a four-letter word that has been evoking fear and panic for months now, and while this may be a European regulation, the impact is being felt around the globe, especially in the United States and Canada. Watch the recording to learn how to be GDPR compliant.
This demo is an excellent opportunity for both beginners and experienced users of the platform to explore the key functionality in our new product version — Netwrix Auditor 9.6. Learn how you can classify and secure your data.
This demo is an excellent opportunity for both beginners and experienced users of the platform to explore the key functionality of Netwrix Auditor 9.6. Learn how you can classify and secure your data.
To inflict damage on critical systems or steal the data, hackers need administrative-level access. Gaining the permissions is not a simple task, since most operating systems have built-in protections against privilege escalation. But many attackers do succeed.
Once hackers have breached your perimeter, they often lurk in your network for months, looking for valuable data to steal. This first-hand session is packed with actionable information that will help you detect attacks before it’s too late.
Are you aware of what is happening across your IT environment? Are you certain your data is secure? Watch the recording now as Liam Cleary, the white hat hacker, reveals what types of attacks to be on the lookout for and how to identify them quickly.
Meet Netwrix Auditor – Data Discovery and Classification Edition, which provides complete visibility into where sensitive files are, what content is inside them, who can access the files and who actually uses them.
Watch this session to investigate answers to frequently asked crucial questions about the GDPR. Ian Grey shares his cyber security expertise to provide tips on achieving and maintaining GDPR compliance.
Now you feel ready for the 25th of May. The problem is that it’s not a one-time action, you should make sure that you are continuously maintaining compliance with the GDPR.
The EU regulation on data protection becomes enforceable from the 25th of May. We bet you’ve learnt it all: what the GDPR is, who the data controller and data subject are and more. However, do you actually know what to do with all this knowledge now?
Meet the brand-new Netwrix Auditor Data Discovery and Classification Edition, which provides complete visibility into where sensitive files are, what content is inside them, who can access the files and who actually uses them.
Meet the brand-new Netwrix Auditor Data Discovery and Classification Edition, which provides complete visibility into where sensitive files are, what content is inside them, who can access the files and who actually uses them.
Are you worried that you don’t know where to start to pass an upcoming HIPAA audit? To help you, a renowned HIPAA consultant David Ginsberg will spotlight best practices for addressing the HIPAA Security Rule, with a focus on the Audit Controls standard.
Watch our webinar to learn about the main provisions of the GDPR, the challenges you face as a result and how GDPR compliance can actually be advantageous to your organization.
Effective IT risk management requires continuous risk assessment and mitigation. Netwrix Auditor 9.5 makes it easy to understand your current risk profile, pinpoint and prioritise your vulnerabilities, and know what steps to take to remediate them, so you can maintain security and regulatory compliance.
Watch our webinar and learn how to:
Last year we spent a lot of time, and rightly so, on Active Directory and domain controllers. But don’t forget your member servers. That’s where your data actually resides and bad guys can make a lot of noise once inside a member server that you won’t hear if you are only watching Active Directory.
In this product demo, you'll learn how Netwrix Auditor for Active Directory provides complete visibility into what is happening across your critical systems. This will help you to streamline compliance, strengthen security, and simplify root cause analysis.
It’s a daunting struggle to manage both Active Directory and Azure AD, let alone ensure the security of such deployments. How can you monitor critical changes? Or prove compliance with the certifications your organisation needs?
In this webinar, you will learn how Netwrix Auditor can help you to:
Get an abundance of ready-to-go recommended practices, so you’ll be able to start with Netwrix Auditor 9.5 the right way, immediately.
Effective IT risk management requires continuous risk assessment and mitigation. Netwrix Auditor 9.5 makes it easy to understand your current risk profile, pinpoint and prioritize your vulnerabilities, and know what steps to take to remediate them, so you can maintain security and regulatory compliance.
Watch our webinar and learn how to:
Over the past year, there has been a steady increase in cyber attacks on both enterprises and public sector entities. Analyzing these attacks in detail will help to identify attack vectors that were used and demonstrate the need to better protect our IT environments.
Join IT experts Liam Cleary and Russell McDermott as they explain the top methods that attackers use to gain unauthorized access to your environment, using:
Get practical information about how to defend against the most common attacks using native Microsoft Windows tools and Netwrix Auditor. Watch this recorded webinar now!
It’s a daunting struggle to manage both Active Directory and Azure AD, let alone ensure the security of such deployments. How can you monitor critical changes? Or prove compliance with the certifications your organization needs?
In this webinar, you will learn how Netwrix Auditor can help you to:
Get an abundance of ready-to-go recommended practices, so you’ll be able to start with Netwrix Auditor 9.5 the right way, immediately.
In this technical webinar, we will guide you through the key functionality of Netwrix Auditor 9.5. You’ll learn how to use Netwrix Auditor more effectively to audit critical systems such as Active Directory, Windows file servers, Microsoft SQL Server and many more.
By the end of the session, you will know how to:
Meet Netwrix Auditor 9.5! The latest version of this visibility platform for user behavior analysis and risk mitigation provides even more features that empower you to identify, assess and reduce risks to your IT infrastructure and data.
Meet Netwrix Auditor 9.5! The latest version of this visibility platform for user behavior analysis and risk mitigation provides even more features that empower you to identify, assess and reduce risks to your IT infrastructure and data.
What are you most afraid of? Clowns? Recent events like the recent Equifax breach and DNC hack? A sudden knock on the door by an unscheduled auditor? A sophisticated ransomware attack unleashed on your entire domain?
In this webinar, we’ll walk you through the architecture and technology behind Netwrix Auditor 9.0 so you can deploy Netwrix Auditor 9.0 in the most efficient and effective way. You’ll learn about:
If you want to learn how to get the most out of Netwrix Auditor in your environment, this webinar is for you!
In this technical webinar, we will guide you through the key functionality of Netwrix Auditor 9.0. You’ll learn how to use Netwrix Auditor more effectively to audit critical systems such as Active Directory, Windows file servers, Microsoft SQL Server and many more.
By the end of the session, you will know how to:
Watch our recorded webinar and learn how to implement a least-privilege model and make sure it works, so you can minimise the damage malware can do, how to spot possible ransomware activity so you can quickly shut it down and more!
For years, organizations based their strategies around building a protected shell to secure their internal IT infrastructure, but with the cloud these shells became obsolete. Cloud services and mobile devices improved productivity but reduced security. So is cloud more or less secure than on-premises infrastructure?
Over the past year, there has been a steady increase in cyber attacks on both enterprises and public sector entities. Analyzing these attacks in detail will help to identify attack vectors that were used and demonstrate the need to better protect our IT environments.
Join IT experts Liam Cleary and Jeff Melnick as they explain the top methods that attackers use to gain unauthorized access to your environment, using:
Get practical information about how to defend against the most common attacks using native Microsoft Windows tools and Netwrix Auditor. Watch this recorded webinar now!
With all the attacks, data leaks and breaches, an efficient IT security strategy is now vital for organizations, large and small. All IT systems, from the personal laptop to the enterprise-class data center, are at risk from ransomware, unauthorized access and other threats.
Watch our recorded webinar and learn how to implement a least-privilege model and make sure it works, so you can minimize the damage malware can do, and how to spot possible ransomware activity so you can quickly shut it down and more!
Learn how to bring more visibility into administrator activity, group membership changes, security delegation changes, group policy changes and more.
Watch the recorded webinar and get tips on how to prevent sensitive data from being grabbed by a leaving employee!
Watch our recorded webinar and learn how to prepare for the GDPR and avoid surprises in 2018!
Watch our recorded webinar and learn how to detect abnormal user behavior that might result in data loss, mitigate the risk of data theft, minimize the damage an attacker can do, and more!
Watch our recorded educational webinar and learn how to shield your IT environment from ransomware!
Join Netwrix systems engineer for a live demo of Netwrix Auditor 9.0! This session is an excellent starting point for beginners and experienced users who want to explore the key functionality available in Netwrix Auditor 9.0.
Learn more about best practices in auditing changes to your critical IT systems, including Active Directory, Microsoft Exchange, file servers, Microsoft SQL Server, Windows Server, and others.
Watch the recorded demo of Netwrix Auditor 9.0. This session is an excellent starting point for beginners and experienced users who want to explore the key functionality available in Netwrix Auditor 9.0. By the end of the session, you will learn how to:
The avalanche of recent WannaCry Ransomware attacks proves that cybercriminals have been successful in creating new techniques and deceptive tactics that easily outpace traditional perimeter security. Under these conditions, what is your security plan to detect the threats that are already inside?
Watch the recorded webinar and learn how to:
Watch the recorded live demo of Netwrix Auditor 9.0 to learn more about how you can stay abreast of the activity happening across your file servers. During this session, we will show you how Netwrix Auditor enables complete visibility into:
Watch the recorded webinar and get tips on how to prevent sensitive data from being grabbed by a leaving employee!
Join the live webcast to see how Netwrix Auditor 9.0 helps IT pros to shield their IT environment from ransomware and malicious insiders.
Watch the recorded webinar and learn about top control processes that should be taken care of as matters of best practice or as core components of any IT compliance.
In this webcast, our experts will demonstrate new capabilities of Netwrix Auditor 9.0 and provide answers to all of your questions about the new version.
In this webinar, we'll walk through 10 of the most critical changes you need visibility into in your Active Directory, File Servers, Exchange, SharePoint, SQL Server and show how Netwrix Auditor can provide you with mechanisms to successfully deal with security challenges.
Watch a recorded webinar and learn more about how you can safeguard your IT environment by tracking down aberrant user behavior!
Watch the recorded product demo of Netwrix Auditor 8.5 to learn more about how you can stay abreast of the activity happening across your Active Directory and Microsoft Exchange Server.
The EU General Data Protection Regulation is coming, and it’s closer than you think. Are you worried that your organization’s IT security is not strong enough? Don’t know where to start or how to comply with requirements of this standard? We will demystify the GDPR and tell you everything you need to know about its most essential paragraphs.
Watch our crash course and and get answers to questions such as:
Watch the recorded demo of Netwrix Auditor 8.5. This session is an excellent starting point for beginners and experienced users who want to explore the key functionality available in Netwrix Auditor 8.5. By the end of the session, you will learn how to:
Watch our recorded webcast and learn how you can make smarter information management decisions for unstructured data.
ISO/IEC 27001 is an international standard applicable to organizations across all industries. Getting certified against it means adopting best practices in establishing an effective information security management system. Watch the recorded webinar and learn how you can achieve continuous ISO compliance!
Watch the recording of our new webinar and learn how to withstand a ransomware attack!
Watch our webcast and learn what you need to keep in mind when your data resides in the cloud.
Databases are used to keep an organization’s most valuable assets. When you hear about large amounts of sensitive data being stolen, the chances are that the data was residing in a database when it was attacked. For companies storing such information, visibility into those elements of IT infrastructure is essential from the viewpoints of data security, compliance with regulatory standards, and data availability for users and software applications.
Join our recorded webinar to learn:
• How to harden your database security and ensure its uninterrupted availability
• What are the most critical incidents in your Oracle Database and SQL Server environment that you need to keep an eye on
• And more!
The EU General Data Protection Regulation is coming to replace the Data Protection Directive 95/46/EC and impacts not only European companies, but everyone who offers goods or services to European Union residents and therefore processes any of their personal data. All these businesses must implement a reasonable level of data protection and privacy to meet the requirements of this inevitable regulatory standard. Watch the recorded webinar and learn what the GDPR is and how to deal with it!
Watch the recorded webcast to learn how to bring more visibility into user behavior across your file servers, detect anomalous activity spikes, changes to access permissions, overexposed data and more.
In this webcast, our experts will demonstrate new applications and features of Netwrix Auditor 8.5 and provide answers to all of yours questions about the new version.
Learn about the top 5 security actions in the hosted Exchange component of Microsoft Office 365 you need to be the first to know about.
Watch the recorded product demo to explore the key functionality available in Netwrix Auditor 8.0.
With the release of Netwrix Auditor 8.0, we’ve revealed some of the new and powerful features designed to deliver #completevisibility into hybrid cloud IT infrastructures to protect data at rest regardless of its location. But do you know, that there are new hidden features that only power users know about?
Watch the recorded webinar for a sneak peek at the top features of Netwrix Auditor 8.0 that you didn’t know existed.
Watch a recorded demo of Netwrix Auditor 8.0 to learn more about auditing file servers.
Watch the webinar recording and get up to speed quickly on how to start IT auditing and take advantage of it.
In this webcast, we’ll dive deep into IT auditing and discuss the top critical changes to audit in your IT infrastructure, best practices, and key tips and tricks for using Netwrix Auditor.
Watch the first session of the two-session online course “Getting Started with IT Auditing,” and get up to speed quickly on how to start IT auditing and take advantage of it.
Watch the recorded webinar to learn how to quickly detect excessive access rights, overexposed data, suspicious access attempts and more.
Learn how to detect insider threats and prevent breaches of unstructured data in EMC Isilon, VNX, VNXe and the latest versions of NetApp Data ONTAP.
Watch the recorded webinar session and learn how to protect data in the cloud by auditing changes to security settings and non-owner mailbox access in Microsoft Exchange Online.
Today, Microsoft SharePoint is one of the most popular and frequently used IT systems for collaboration, document management, content creation and sharing. Watcth the recorded webinar and learn why auditing is a must-have component of any company’s security strategy, and how it can enable visibility into what’s happening in Microsoft SharePoint.
Watch the recorded webinar session to learn how to configure the target environment to successfully audit Windows Server and Microsoft SharePoint.
New Netwrix Auditor 8.0 delivers #completevisibility into hybrid cloud IT infrastructures to protect your data at rest regardless of its location.
Watch the recorded webinar session to see what’s new in Netwrix Auditor 8.0. We’ll show you how to take advantage of the new functionality available and explore top features.
As a SIEM solution, Splunk collects and correlates vast amounts of machine data from anywhere in the IT environment, which can be used for various IT needs. However, being an event-based solution that relies on a single source of data, Splunk provides its data in a raw format with no granular details that can be critical for security and compliance.
Watch the recorded webinar and learn how to add actionable details to Splunk´s output data, drive down Splunk costs and much more.
Watch the recorded product demo session of Netwrix Auditor 7.1 to learn more about auditing file servers and Microsoft SQL Server. During this session, we will show you how Netwrix Auditor enables complete visibility into: Windows-based file servers; EMC Storage; NetApp Filers; Microsoft SQL Server and more!
According to the Global State of Information Security Survey 2016, the number of security incidents has grown by 38% this year. Cybercriminals have been successful in creating new techniques and deceptive tactics that outpace security efforts. In this recorded webinar session, you will learn how auditing can help mitigate the risk of data breaches and solidify your security strategy overall.
Join us for a live demo of Netwrix Auditor 7.1. to learn more about auditing Windows Server. During the session, we will guide you on how Netwrix Auditor enables complete visibility into:
Watch the recorded webinar session to learn how to configure the target environment to successfully audit Active Directory, Group Policy, and Exchange.
Watch the recorded webinar session and get an insight into how file system security can be assessed and addressed by asking just seven questions.
Watch the recorded webinar session to learn more about how to start auditing process with Active Directory:
Watch the second recorded webinar session to deep dive into Active Directory Auditing by learning more about:
During the second session we will showcase how to leverage the data of IT auditing process with key stakeholders whenever they need it. Learn more about the new Netwrix Auditor client, subscriptions and more.
All public companies must be compliant with SOX regulations. During this session, we will discuss:
The growing number of security risks and the tightening of compliance regulations require organizations to allocate bigger portions of their IT budgets on preventing breaches and passing compliance audits.
Watch the webinar recording and learn how to mitigate the risk of data breaches and avoid fines for non-compliance with regulatory standards by enabling complete visibility of IT infrastructure.
Watch the recorded webinar session and learn how the new feature allows you to quickly sort through your data and fine-tune search criteria until you find the information you are looking for. Find an answer to any possible question in several minutes. Export the results into a custom report, which can be saved for later use or shared with anyone.
All kinds of federal organizations must be compliant with FISMA regulation. During this webinar we will talk about:
All organizations that store and transmit credit card data and billing information need to ensure continuous compliance with all PCI requirements. Watch the recorded webinar session and learn more about:
With the release of Netwrix Auditor VEGA, we’re changing the way organizations find and access actionable audit data for investigating security incidents and passing compliance audits.
Watch the recorded webinar session and learn how to take advantage of the new functionality available in Netwrix Auditor VEGA, including:
Healthcare organizations and their business associates have to ensure HIPAA Compliance to protect health information. During the first webinar session you will learn about:
Microsoft SharePoint has found its way into many IT environments, just like yours; for many organizations, it has already become a critical service. Regardless of SharePoint deployment size and maturity, absence of proper change documentation and audits can lead to a serious risk.
Join Ron Charity, Enterprise Architect, and Ilia Sotnikov, Director of Product Management at Netwrix, to see real life examples from actual SharePoint deployments and find out how third party tools such as Netwrix Auditor are helping organizations meet regulatory compliance requirements, protect sensitive information, and minimize risks to business operations.
Keeping tabs on changes to Active Directory can be a challenge for even the most experienced IT administrator. In this 45-minute webinar, Microsoft MVP and Petri IT Knowledgebase Contributing Editor John O’Neill Sr., will help you identify some primary Active Directory auditing headaches and present some tips and advice on how to manage them.