BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Missed it Live? Watch the “Big Security Data” Webinar with 451 Research & eEye Here.

Posted February 29, 2012    Sarah Lieber

Recently, 451 Research and eEye hosted the webinar “Turning Your Big Security Data into a Big Advantage”. This discussion was on the topic of “Big Data” and how it relates to today’s security landscape. Featuring 451’s Andrew Hay, we covered how today’s enterprise IT and security teams can best leverage their ‘big security data’ to make more informed decisions and better protect their networks. Topics covered include:

  • The business value of ‘big security data’
  • How security teams can leverage ‘big security data’ to make more informed decisions
  • eEye’s take on how you can begin to leverage this information to drive a more dynamic security strategy
  • Andrew Hay’s insight into how this data is impacting the enterprise today
  • Live Q&A at the end of the webcast from members of the audience

For those of you who missed the live event, you’re in luck because we’re giving you access to the recording here.

For those of you who still have questions after watching the recording, I encourage you to continue the conversation in the comments section below. We’ll be sure to answer your questions in the order they’re received.

Tags:
, , , , , , ,

Leave a Reply

Additional articles

beyond-trust

PowerBroker for Windows – Most Innovative IAM Solution by Cyber Defense Magazine

Posted April 21, 2015    Scott Lang

PowerBroker for Windows has been selected as a winner by the 2015 Cyber Defense Magazine Awards Program in the category of “Most Innovative Identity and Access Management Solution”.

Tags:
, , ,
pbps-customer-campaign-image

Are you changing your passwords as often as the weather changes?

Posted April 20, 2015    Scott Lang

There is one thing that should change more frequently than the weather: Your privileged passwords. Why? If you’re like more than 25% of companies out there, then your current IT environment contains unmanaged accounts putting you at risk of data breaches and compliance violations, and you don’t have a process to control those accounts.

Tags:
, , , ,
webinar1

On Demand Webinar: Advanced Windows Tracing

Posted April 17, 2015    BeyondTrust Software

Webinar: Security MVP, Paula Januszkiewicz, shows Windows administrators how to be more aware of what happens whenever somebody does something within the system.

Tags:
, ,