Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Angriffe durch „Advanced Threat Analytics“ erkennen

601 views

Published on

SBA Research widmet sich in diesem Vortag innovativen, kürzlich von Microsoft akquirierten Security-Technologien, die das Security-Portfolio ergänzen und Enterprise-Kunden im Rahmen ihrer bestehenden Microsoft-Lizenzen neue Verteidigungsmöglichkeiten bieten. Wir konzentrieren uns dabei auf „Advanced Threat Analytics“ und wie es vor internen Angriffen schützen kann.

Published in: Technology
  • DOWNLOAD FULL BOOKS, INTO AVAILABLE FORMAT ......................................................................................................................... ......................................................................................................................... 1.DOWNLOAD FULL. PDF EBOOK here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB Ebook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. doc Ebook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. PDF EBOOK here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB Ebook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. doc Ebook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... .............. Browse by Genre Available eBooks ......................................................................................................................... Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, Cookbooks, Crime, Ebooks, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult,
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

Angriffe durch „Advanced Threat Analytics“ erkennen

  1. 1. SECURE YOUR ENTERPRISE Microsoft Advanced Threat Analytics
  2. 2. WHAT IS CYBERCRIME? 2016 - SBA Research gGmbH
  3. 3. Cybercrime is… 2016 - SBA Research gGmbH …Money € 57 Billion Damage due to cybercrime in the EU 10.000 Criminal complaints / year in Austria $ 500 Billion Estimated cybercrime damage worldwide
  4. 4. Cybercrime is… 2016 - SBA Research gGmbH …Business
  5. 5. Cybercrime is… 2016 - SBA Research gGmbH …Sophisticated Source: Mandiant M-Trends Report 2016
  6. 6. ADVANCED ATTACKS NEED ADVANCED DEFENSES Microsoft Advanced Threat Analytics (ATA) 2016 - SBA Research gGmbH
  7. 7. Threat Analytics in a Nutshell 2016 - SBA Research gGmbH
  8. 8. Threat Analytics detects…
  9. 9. How it works 2016 - SBA Research gGmbH
  10. 10. Reconnaissance 2016 - SBA Research gGmbH
  11. 11. Password Guessing 2016 - SBA Research gGmbH
  12. 12. The Archenemy of Windows Pass-the-Hash • Attacker uses stolen password hash to target clients • Search until higher privilged account is found • Compromise other systems or whole infrastructure 2016 - SBA Research gGmbH
  13. 13. Kerberos Pass-the-Ticket 2016 - SBA Research gGmbH
  14. 14. DEMOS Detecting Zone Transfers, Failed OWA Logins, and Pass-The-Ticket Attacks 2016 - SBA Research gGmbH
  15. 15. Andreas Tomek SBA Research gGmbH Favoritenstraße 16, 1040 Wien +43 699 11518148 atomek@sba-research.org

×