• RSS
  • Twitter
  • FaceBook
Home > White Papers > Preempt > Preempt On Demand Webinar

Preempt On Demand Webinar

Preempt

Attackers and malware are increasingly relying on a common set of tools to compromise identities and spread within a network. Tools like Mimikatz accompanied with common administrator tools like PsExec and WMI have become a standard part of an attacker’s arsenal to turn a single machine compromise into a full network breach. In this webinar we will take a look at why some of these tools are traditionally difficult to control, and introduce new countermeasures that let you fight back. In this webinar we will cover:

- An analysis of recent malware and attacks and the tools they used to spread through the network.

- A closer look at the underlying protocols supporting these tools, and the traditional challenges to controlling them.

- Introduce new controls that allow organizations to control NTLM in real-time, block pass-the-hash techniques, and adaptively control the use of NTLM in the network.

- How to gain visibility into PsExec, WMI, and RPC in general and how to create controls that distinguish valid from malicious use of these powerful tools.

Email this page
Published:  Nov 02, 2018
Type:  Webinar
Tags : 



Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter