before a Breach Occurs

D E E P

D I V E

How to Detect

Abnormal User Behaviour

How much do you know about the behaviour of the users in your IT environment? If someone suddenly starts to access sensitive files and folders that they rarely used before, how quickly would you notice? Unfortunately, malicious insider activities often go undetected for a long time.

How to investigate incidents efficiently and determine the best response

How to detect compromised accounts in your environment

How to analyse data access trends and sudden activity spikes

Join this session to learn:

Webinar Presenter

Daniel Goater, Solutions Engineer at Netwrix

Daniel now has over 8 years experience in the IT sector as a systems engineer. From supporting small businesses to Hedge Funds in London his experience in the field has helped him become conscientious and proactive whilst delivering customer satisfaction. Nowadays Daniel is guiding and implementing visibility solutions that help businesses achieve compliance, increase productivity and detect potential threats.

© 2019 Netwrix Corporation | 300 Spectrum Center Drive, Suite 200 Irvine, CA 92618 | EU Privacy Policy | EULA

© 2019 Computer Security Technology (CST) | 8-9 Lovat Lane, London EC3R 8DW | CSTL Privacy Statement

D E E P

D I V E

How to Detect

Abnormal User Behaviour before

a Breach Occurs

How much do you know about the behaviour of the users in your IT environment? If someone suddenly starts to access sensitive files and folders that they rarely used before, how quickly would you notice?

Detect compromised accounts in your environment

Analyse data access trends and sudden activity spikes

Investigate incidents efficiently and determine the best response

Learn how to: 

Webinar Presenter

Daniel Goater

Solutions Engineer, Netwrix

© 2019 Netwrix Corporation | EU Privacy Policy | EULA

© 2019 Computer Security Technology (CST)

8-9 Lovat Lane, London EC3R 8DW

CSTL Privacy Statement