Search and destroy hard to detect security risks
Jun 5 2018

DATE
Jun 5, 2018

HOSTED BY
Citrix

Search and destroy hard to detect security risks

Like a trojan horse, they’re already inside your fortress wall. Weak or compromised credentials allow bad actors to pose as internal users exacerbating the problem. Far and away compromised credentials is the biggest security challenge faced by IT, a full 81% of hacking-related breaches used either stolen and/or weak passwords.* Attend this webinar and learn how Citrix Analytics uses machine learning to ferret-out these bad actors and importantly, stop their malicious behavior.

Learn the benefits of advanced analytics, including:

  • Building a digital fingerprint for individual users that lets you know when they are doing something unusual
  • Predictive and prescriptive analytics beyond descriptive and diagnostic analytics
  • Creating custom rules with conditions and actions to remediate problems
  • Halting ransomware and data loss prevention (DLP)

Speakers:

  • Martin Zugec, Senior Architect, Technical Marketing, Citrix
  • Blake Connell, Director of Product Marketing,Citrix

* Verizon Data Breach Investigations Report (DBIR) 2017