How many hops do I need to get to your CEO?
Organisations face ever growing complexities with IT administrative rights for users. Can you confidently assess how many users have admin rights to their laptops, upper management devices and business critical systems? Plus, can you see who those users with admin rights are? It is likely you do not have 100% visibility today.
Lateral movement means using stolen credentials to move from computer to computer in a cyberattack. Nearly all cyberattacks involve lateral movement. Attackers sneak into one computer, access the login credentials active on that computer, and then use those credentials to move to other computers, such as laptops, desktops or servers. The most effective way to reduce an attacker’s ability to engage in lateral movement is by having clear, detailed and actionable reporting about users, endpoints and groups.
Tanium’s Impact
To provide IT organizations with the visibility they need to analyze access rights and the vulnerabilities they pose, Tanium created a new module called Impact, a software offering included in the Tanium Platform for managing endpoints with unparalleled visibility and control.
Tanium Impact analyzes relationships between users, groups, and endpoints at speed and scale to identify lateral movement potential. It provides the ability to visualize and contextualize the administrative realm and lateral movement risk, empowering prioritization of remediation efforts.
Join us in this webinar to learn more about how you can leverage Tanium Impact to gain visibility and control. You will learn:
Language: French
Speaker: Damien Bénazet, Technical Account Management, Tanium
Date | Lieu | Duration | Time of Event | Rappel |
---|