How to protect your corporate from advanced attacks – unveiling Microsoft Advanced Threat Analytics

Download this episode

Download Video

Download captions

Description

In today's world, attackers compromise non-privileged and privileged users, devices, server, etc. in order to gain access to the network and steal confidential information from businesses. A majority of the advanced security attacks are traced back to compromised user credentials. In this session, we will provide deep dive information on Microsoft Advanced Threat Analytics (ATA), a technology based on the recent acquisition of Aorato, which helps you identify security breaches before they cause damage.

Day:

2

Level:

300

Session Type:

Strategy

Code:

BRK3870

Room:

N228

Embed

Format

Available formats for this video:

Actual format may change based on video formats available and browser capability.

    The Discussion

    • User profile image
      stahtufiang

      // it's not the user, is your cheep lazy experts and  how they set up your system

    • User profile image
      SplitFire

      Guys, the video is corrupted.

      Starting 0:7:18 there is no sound till the end of the video!

      Please fix/replace it.

      Thanks.

    • User profile image
      Armen Kirakosyan

      Yea Advanced System is so stupid that it tells that it requires newer version of Windows on my Windows 10 to be installed ???!!!!

      bla bla bla bla

    • User profile image
      Jeff Sontag

      This system makes having dedicated administrative workstations, especially where domain and enterprise administrator credentials could be used, even more critical. If you don't say this up front, it gives the appearance that you are just trying to sell more stuff to discover attacks after it's too late, and you don't really care about the most critical element of all credential-stealing attacks. Please state unequivocally, in all your marketing materials, that without dedicated administrative workstations, and the political will, and the technical expertise, to keep these admin workstations segregated from internet and/or email-facing computers, this would all be for nothing.

    Comments closed

    Comments have been closed since this content was published more than 30 days ago, but if you'd like to continue the conversation, please create a new thread in our Forums, or Contact Us and let us know.