Free webinar

Log360 Integrations and Add-ons webinar

  • December 12 at 2 PM EST
  • 45 Mins

Presented by

Andy,Product expert

Why attend this webinar?

How closely do you track OU and group memberships within your Active Directory? Did you know careless group nesting could create nearly invisible vulnerabilities with respect to privileged access? How can you identify and close such vulnerabilities?

UEBA is a technology which uses a user-centric view of system activity with the goal of detecting when a user’s behavior departs from their norm. How does this technology help you detect insider threats or data exfiltration attempts in your network?

Threat intelligence capabilities are a must-have in any organization. How can you leverage such capabilities to understand what kinds of global threats your organization faces?

In this webinar, I’ll help you thoroughly understand the answers to all these questions, and more.

Agenda:

  • Tracking nested group membership and closing security loopholes
  • How a regular user can get elevated permission and how to track it
  • UEBA in Log360
  • Threat analytics with Log360
  • 2Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 3Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 4Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.

Thanks!

Your e-book is on its way.

If you don't find it in your inbox within the next few minutes, check your spam folder.

Closed

Zoho Corporation Pvt. Ltd. All rights reserved.

Claim Your Spot Now