<

Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x

Webinar: Are Unknown Privileged Accounts Putting You At Risk?

Published on
325 Points
325 Views
Last Modified:
Experts Exchange
We connect you with people and information to solve problems, inspire learning and influence the future of technology.

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies and corporations that rely heavily on it for housing proprietary information as well as internal connections—but that’s not all.


When you take a system such as AD that’s already a focus of cyber terrorist attention and you add a large number of privileged credentials into the system, the risk only grows. Suddenly, the directory becomes porous with innumerable opportunities for invasion.


In a 2016 Cyberthreat Defense Report, it was discovered that only three out of 10 respondents felt confident in their company’s ability to monitor privileged users. This response raises awareness to the needs for secured and limited privileged credentials.


Companies like ManageEngine have seen the damage a high number of credentials can cause within a company, and they’ve set out to teach IT teams and AD technicians how to reduce privileged accounts while protecting the ones that remain.


On April 11th, Derek Melber, technical evangelist for ManageEngine’s ADSolutions team, will be presenting on the topic of tracking and securing credentials in Active Directory.


Join us to learn how to:


  • Create a honeypot Administrator account to track attacks
  • Ensure the built-in Administrator account is secured
  • Monitor activities performed by users that have privileges in Active Directory
  • Reduce membership in privileged groups
  • Be informed when any privileged group changes membership
  • Track changes to service accounts and ensure the highest level of security


Register Now


0
Comment
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
0 Comments

Featured Post

[Webinar] Lessons on Recovering from Petya

Skyport is working hard to help customers recover from recent attacks, like the Petya worm. This work has brought to light some important lessons. New malware attacks like this can take down your entire environment. Learn from others mistakes on how to prevent Petya like worms.

Join & Write a Comment

In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
In response to a need for security and privacy, and to continue fostering an environment members can turn to for support, solutions, and education, Experts Exchange has created anonymous question capabilities. This new feature is available to our Pr…

Keep in touch with Experts Exchange

Tech news and trends delivered to your inbox every month