Wasting $1.37 million a year on false positives?
Hate it when you try to open an attachment and it’s blocked or how about getting alerts about cybersecurity threats that don’t exist? This is where Deep Instinct steps-in. In their analysis report, SE labs tested Deep Instinct against a range of file-based and fileless high-profile known malware campaigns as […]
PAM Pub Quizz
Want an opportunity to be crowned the Thycotic PAM Boss for 2021? Then now is your chance! Take part in our annual online PAM Pub Quiz on 1st April to test your knowledge, not only about Privileged Access and security, but also general knowledge, music and much more! Join […]
Active Directory Security and Hardening: An Ethical Hacker’s Guide to Reducing AD Risks
Approx. reading time: 8-10mins This blog is intended for: IT and System Admins IT Security IT Auditors Pen Testers Tech Geeks Anyone moving into a career in Cybersecurity Skip to most common Active Directory misconfigurations In this post, we’re going to focus on common cyber-attacks that target Active Directory (AD). […]
Privilege Manager 11: New privilege management capabilities for Unix and Linux
With the latest release of Privilege Manager, all endpoints and servers throughout your organization can now follow consistent least privilege and Zero Trust policies, whether they are Windows, Mac, or Unix/Linux. Until now, privilege security for Unix/Linux has been cumbersome and even risky. Unix/Linux has become the go-to operating system for […]
Deep Instinct ROI Estimator
Optimizing your security operations and driving down costs is more achievable than you think. With this interactive calculator, you can see for yourself how better security doesn’t have to entail bigger budgets! En savoir plus
OVERCOMING IT MONITORING TOOL SPRAWL
Are you using multiple tools for monitoring your IT infrastructure? It’s never easy to toggle between different consoles and dashboards for performance analysis and diagnostics. For years, IT managers have been seeking a single-pane-of-glass tool that can help them monitor and manage all aspects of their IT infrastructure – from […]
A live demonstration of automated penetration testing
In this webinar, you’ll learn how to conduct a live ethical attack with just the click of a button, using PenTera. With PenTera, every live endpoint and machine is checked, on all protocols, offering better, more complete coverage, with no need to install any agents. Unlike manual pen-testing, PenTera is always on […]
Zero Trust in 2021
Gain insights into how CISO’s can effectively prepare for PAM initiatives. Have you watched the videocast yet? Learn as Rob and Berthold discuss some of the key questions around Privileged Access and Zero Trust in 2021. Key topics include: What is a Privileged User in 2021? What is PAM in […]
Webinar-Best practices for preventing Insider Threats
Hi, In this era of remote work more enterprises are prone to insider breach. Threat vectors are becoming sophisticated and being initiated beyond your perimeter. Employees are lured into selling or disclosing credentials thereby handing over the keys to your crown jewels to the highest bidder. An efficient influx of […]