Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to

Introducing the Noname API Security Workshop

Have you ever wanted to learn how to protect your environment against API attacks? Well look no further! Noname Security just launched our new API Security Workshop to give technology professionals an interactive and hands-on learning experience. We've also partnered with ISC(2), the leading association for information security leaders like you, to offer 4 CPE credits for attending the workshop.

How to Configure Internet Explorer Settings and Open IE11 inside Edge through Group Policy

In this video, we explore a useful feature of Netwrix PolicyPak — the ability to configure Internet Explorer settings to dynamically set Internet Explorer Enterprise and Document modes. We also explain how to open an Internet Explorer tab inside Microsoft Edge.

Configure Group Policy Settings to Deploy Real GP using SCCM or Other Management Systems

Do you have endpoints that you'd love to manage using real Group Policy, but want to deploy the settings using something else? This video explains how to deliver Group Policy settings with Netwrix PolicyPak, including how to deploy templates, preferences and security settings to your endpoints using SCCM, KACE, Altiris or another desktop management system.

S2E1 Identity Security - Use Cases: The Drawing Board | CyberArk

"In this episode of The Drawing Board, you’ll learn how a holistic Identity Security approach can help organizations defend against threats. We’ll show you three “day in the life” examples of identities whose roles and responsibilities require comprehensive protection, as they access to sensitive resources in critical environments.

S2E2 User Behavior Analytics: The Drawing Board | CyberArk

As the hybrid workforce continues evolving, enterprises need stronger security controls to prevent identity-related breaches. In this episode of The Drawing Board, our experts discuss how user behavior analytics can help your organization capture and analyze workforce users’ access activity, enabling you to visualize risk, discover hidden insights and defend against attacks. You'll learn how insights from contextual data can help your security team – and your multifactor authentication capabilities – secure identities without compromising the user experience.

S2E4 Endpoint Privilege Management: The Drawing Board #5 | CyberArk

In this episode of The Drawing Board, our experts discuss five endpoint privilege management best practices to help you remove local admin rights – in way that helps protect against threats and ensure the business and its users remain nimble. The road to least privilege security requires balance, and our experts will show you how to achieve outcomes rooted in protection and productivity.

How to Use Group Policy and Netwrix PolicyPak to Remove Local Admin Rights

This video explains step-by-step how you can use Group Policy and Netwrix PolicyPak to get out of the local admin rights business. Start out by finding where you have local admin rights, and then remove the source using in-box GP preferences. Then use Netwrix PolicyPak to elevate your now-standard users so they can keep doing the (admin-like) things they always have.