Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Netwrix Auditor for Exchange - Overview

Netwrix Auditor for Exchange simplifies IT auditing across your Exchange Online and on-premises Exchange environment and provides actionable audit data, all in one place. See who has access to what, monitor non-owner mailbox access events, and track Exchange configuration and permission changes, so you can prevent data breaches, prove IT compliance and ensure ongoing availability of email services.

Netwrix Auditor for SharePoint - Overview

Netwrix Auditor for SharePoint empowers you to reduce the exposure of sensitive data and detect suspicious user behavior and policy violations before they result in data leaks or business disruptions. Plus, its ready-to-use intelligence enables you to automate many of the compliance and security-related tasks that until now required hours to complete so you can meet the demands of your organization without constantly being overburdened.

Elastic Security - Unified Protection for Everyone - Aug 13, 2020 Elastic meetup

Learn how the latest security capabilities in the Elastic Stack enable interactive exploration, incident management and automated analysis, as well as unsupervised machine learning to reduce false positives and spot anomalies — all at the speed and scale your security practitioners need to defend your organisation.

How to Secure the network of your GKE Cluster

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.

How to Secure the network of your GKE Cluster

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.

How to Implement Network Policy in Amazon EKS to Secure Your Cluster

By default, pods are non-isolated; they accept traffic from any source. The Amazon EKS solution to this security concern is Network Policy that lets developers control network access to their services. Amazon EKS comes configured with Network Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network policy and a live demo implementing each use case.

Combating cyberthreats with a sound PAM strategy in 2020

In this on-demand webinar, we'll walk you through reasons a PAM program is necessary, introduce the typical PAM maturity curve, and discuss real-world use cases on how a PAM program will fit into your overall enterprise IT operations. In addition, we'll look at ManageEngine's strategy and offerings to help you build a sound, foolproof PAM program.