Para obter uma melhor experiência web, utilize o IE11+, Chrome, Firefox ou Safari.

Tracking the attacker's steps: Using PAM in your incident response toolkit

Tracking the attacker's steps: Using PAM in your incident response toolkit
Sob demanda
  • Data gravada:Nov. 2, 2021
  • Evento:Sob demanda
Tracking the attacker's steps: Using PAM in your incident response toolkit

A modern PAM solution will help you catch attackers trying to impersonate your privileged users, but what happened before that alarm went off? How did the attacker get access? Learn how integration with a security orchestration and response (SOAR) platform can help you gain those insights.

Palestrantes

Shannon Mathers

PAM Product Architect - One Identity

Assistir a seu webcast gratuito

Por favor, aguarde...

triangle-down check
Ao fazer o download, você se inscreverá para receber nosso e-mail marketing. Para cancelar sua inscrição, siga as etapas descritas em nossa Política de Privacidade.

reCAPTCHA protege este site. Confira a Política de Privacidade e os Termos de Uso do Google.