Netwrix Virtual. Customer Summit 2016

Similar documents
Top 5 NetApp Filer Incidents You Need Visibility Into

What s New in Netwrix Auditor 8.0. PRESENTER: Jeff Melnick Manager of Sales Engineering x 971

Top 5 Oracle Database Incidents You Need Visibility Into

What s New in Netwrix Auditor 9.5

4 Ways Your Organization Can Be Hacked

What s New in Netwrix Auditor 9.7

Netwrix Auditor. Know Your Data. Protect What Matters. Roy Lopez Solutions Engineer

Product Overview. Netwrix Auditor. Presenter: Jeff Melnick Manager of Sales Engineering x 971

Monitoring Active Directory: Both Azure AD and On-Premise AD and How Synchronization and Federation Play In

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer

The 3 Pillars of SharePoint Security

What the GDPR is and how to deal with it. Russell McDermott Sales Engineer +44 (0) x 2208

Withstanding Ransomware Attack: A Step-by-Step Guide Presenter:

Tracking changes in Hybrid Identity environments with both Active Directory and Azure Active Directory

HOW TO ENABLE AFFORDABLE ENTERPRISE VIDEO FOR EVERYONE

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Top 7 Questions to Assess Data Security in the Enterprise

How to Survive an IT Audit and Thrive Off It!

Netwrix Auditor for SQL Server

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

Back to Basics IT Infrastructure Configuration Tips & Tricks Active Directory / Group Policy / Exchange

Top Critical Changes to Audit

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach

SGS CYBER SECURITY GROWTH OPPORTUNITIES

Spectre, Meltdown, and the Impact of Security Vulnerabilities on your IT Environment. Orin Jeff Melnick

State of Office 365 Adoption & Risk A Dive into the Data. Jim Reavis, CEO, Cloud Security Alliance Brandon Cook, VP, Marketing, Skyhigh Networks

Securing Digital Transformation

Become an Active Directory Auditing Superstar: an all-in-one guide!

Outsmarting Ransomware: Hints and Tricks. Netwrix Corporation Adam Stetson System Engineer

The Black Box Institute

Converged Security - Protect your Digital Enterprise May 24, Copyright 2016 Vivit Worldwide

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

Comprehensive Database Security

2015 VORMETRIC INSIDER THREAT REPORT

locuz.com SOC Services

Hacker Explains Privilege Escalation: How Hackers Get Elevated Permissions

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

Creating a Hybrid Gateway for API Traffic. Ed Julson API Platform Product Marketing TIBCO Software

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

IBM Cloud Internet Services: Optimizing security to protect your web applications

IT Security Horrors That Keep You Up at Night

Keeping Tabs on the Top 3 Critical SharePoint Changes with Netwrix Auditor

Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Cisco Cloud Application Centric Infrastructure

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Total Threat Protection. Whitepaper

Go mobile. Stay in control.

SOX/COBIT Framework. and Netwrix Auditor Mapping. Toll-free:

Crash course in Azure Active Directory

GDPR Update and ENISA guidelines

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Mastering The Endpoint

How Secure is Blockchain? June 6 th, 2017

Accenture Intelligent Infrastructure in Action with EMC Pivotal Enabling Access to High Volume Consumer Data

ALIENVAULT USM FOR AWS SOLUTION GUIDE

Here s a look at some of the latest technology trends and key offerings from providers.

Transforming your network for the digital economy

Strategies for a Successful Security and Digital Transformation

Netwrix Auditor Add-on for Solarwinds Log & Event Manager

Don't 'WannaCry' No More: How to Shield Your IT Infrastructure from Ransomware. Netwrix Corporation Roy Lopez System Engineer

MEETING ISO STANDARDS

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Modern Database Architectures Demand Modern Data Security Measures

align security instill confidence

5 Steps to Government IT Modernization

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

Next Generation Authentication

Best Practices in Securing a Multicloud World

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Managing Microsoft 365 Identity and Access

Institute of Internal Auditors 2018 IIA CHICAGO CHAPTER JOIN NTAC:4UC-11

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

Building a Resilient Security Posture for Effective Breach Prevention

ADC im Cloud - Zeitalter

Angela McKay Director, Government Security Policy and Strategy Microsoft

CYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION

Netwrix Auditor Add-on for Privileged User Monitoring

Build a Software-Defined Network to Defend your Business

Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

ISO/IEC Controls

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware

Netwrix Auditor. Administration Guide. Version: /31/2017

IBM Future of Work Forum

Why Most IoT Projects Fail And how to ensure success with OSIsoft and Cisco Kinetic

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Taking Back Control of Your Network With SD-LAN

Cisco Enterprise Cloud Suite for Service Providers. Cisco Knowledge Network Data Center Jan 16, 2018

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

CAN MICROSOFT HELP MEET THE GDPR

Cisco Enterprise Agreement

Are we breached? Deloitte's Cyber Threat Hunting

Hitachi Enterprise Cloud Container Platform

Transcription:

Netwrix Virtual Customer Summit 2016

Welcome Michael Fimin Chief Executive Officer Phone: 1.949.407.5125 x1057 Email: Michael.Fimin@netwrix.com linkedin.com/in/michaelfimin

Agenda Michael Fimin Chief Executive Officer Welcome Jim Smith Director, Enterprise Accounts Why Visibility is a Must? Ilia Sotnikov Director, Product Management Product Update John Ross Vice President, Strategic Alliances Product Update Jeff Melnick Manager, Sales Engineering Product Demo Jeff Altneu Director, Customer Retention Customer Programs

Prize Drawing

How to Ask Questions 1. Type your question here 2. Click Send

Company update Recent Facts about Netwrix: Fast growth: Inc. 5000 for the fourth time Expansion into Europe, Australia, Asia 7,000 paying customers 230,000 IT pros worldwide using Netwrix products Awards:

Security Trends Hottest topics: Threat prevention Visibility Security Analytics

Cloud Security Survey Hybrid Cloud Infrastructure 65% Security and loss of physical control over data www.netwrix.com/go/cloudsurvey2015 69% Unauthorized Access Knowing who does what, when and where in the cloud provides security guarantees for 71% of enterprises

Netwrix Auditor 8.0 Hybrid Cloud Security Visibility and Governance Detect cyber threats and ensure better governance of data regardless of its location

Why Visibility is a Must? Jim Smith Director, Enterprise Accounts Phone: 1.949.407.5125 x2814 Email: Jim.Smith@netwrix.com linkedin.com/in/jim-smith-0b08b32

The IT World We Live in: The Device Mesh

Device mesh is the proliferation of smart, digital, wireless, sensor-based, interconnected devices that people use personally and professionally to access applications, systems and information. Other IT buzz words today: Internet of Things, Cloud Computing, Big Data, Advanced Analytics, Advanced Machine Learning, Bring-Your-Own-Device, Convergence, DevOps, PaaS/SaaS

Examples The ones that are growing in popularity: Self-driving cars. Connected smart home devices. Smart clothing. Personal health devices. Robots assistants. Other sensor-based devices and wearables for work and leisure.

Security Experts Predictions

Insider Threats Handling Will Become a Priority Insider threats outrank external attacks already today. Insider threats are becoming more difficult to deal with. A security focus will be set on establishing proper control over user activities inside corporate networks.

Insider threats stats 2015 IBM Cyber Security Intelligence Index Of all responsible for security attacks 2015 Vormetric Insider Threat Report How vulnerable is your organization to insider attacks? 45% Outsiders 89% More at risk than before 31% Malicious Insiders 23% Inadvertent Insiders

Sample Data Breaches That Could Have Been Prevented

We need your feedback?

Data Breaches of 2015

Big Data Needs Big Answers Who did what, when, where? Who has access to what? What system was compromised? What should I do next?

Visibility is the Answer Access to sensitive data Abnormal user activity Privilege abuse Changes to critical configurations Data exfiltration

Product Update Ilia Sotnikov Director, Product Management Phone: 1.949.407.5125 x5501 Email: ilia.sotnikov@netwrix.com linkedin.com/in/iliasotnikov @iliasotnikov

The Challenge Growing risks of both external attacks and insider threats Increasing numbers of devices, systems, and data to monitor and protect Limited budgets and resources

The Solution Addressing the challenge with visibility: More data readily available for incident investigation Efficient lenses to focus on what s important right now Integration with business and security workflows for higher efficiency Flexibility to adapt in a constantly changing environment

We need your feedback?

Introducing Netwrix Auditor 8.0 Regardless of data location gain complete visibility Office 365 EMC NetApp Windows File Server SharePoint

Introducing Netwrix Auditor 8.0 File Analysis reports make better information management decisions

Introducing Netwrix Auditor 8.0 RESTful API endless integration, auditing and reporting capabilities On-premises, virtual or cloud deploy Netwrix Auditor wherever you need it

Product Update John Ross Vice President, Strategic Alliances Phone: 1.888.638.9749 x1060 Email: John.Ross@netwrix.com linkedin.com/in/johnjross @johnjrosssr

Visibility for Cloud and Mobile users Users are everywhere. Internet of things (IOT) & Bring Your Own Device (BYOD). Cloud services: AWS, Azure or SoftLayer. Software Defined Networking (SDN).

RESTful API endless integration, auditing and reporting capabilities

Airwatch Data in Netwrix

We need your feedback?

On-premises, virtual or cloud deployment

Product Demo Jeff Melnick Manager, Sales Engineering Phone: 1.201.490.8840 x2832 Email: Jeff.Melnick@netwrix.com linkedin.com/in/jeffmelnick

Customer Programs Jeff Altneu Director, Customer Retention Phone: 1.949.407.5125 x2813 Email: Jeff.Altneu@netwrix.com linkedin.com/in/jeffaltneu

Customer Success Program Here to help you be successful with Netwrix Customer Success Team Anti-shelfware customersuccessna@netwrix.com 888-638-9749 ext: 2804 Customer advocate at Netwrix We help you leverage investment in Netwrix Renewals renewals@netwrix.com Up to date maintenance = new versions at no additional cost

How Do I Get Netwrix Auditor 8.0? Customers of Netwrix Auditor 1. Go to http://www.netwrix.com 2. Navigate to Support tab 3. Log in to the Customer Portal 4. Download the latest version of Netwrix Auditor Customers of Other Products 1. Go to http://www.netwrix.com/auditor.html 2. Download the free 20-day trial, schedule a one-to-one demo or request a quote + You can also test drive Netwrix Auditor 8.0 in your browser Note: Netwrix Auditor 8.0 will be available after 04/12/2016

Webinar What s New in Netwrix Auditor 8.0 April 21, 11:00 AM EDT Please check your e-mail for personal invitation soon

Questions?

And the Prize Goes to

Thank you!