Presenters: David Dingwall, Solutions Consultant, FoxT and Peter Tornberg, VP Engineering, FoxT

Register to View

Studies show that malicious insider fraud costs an organization even more time and money to recover from than a denial of service or web-based attack. Are you still relying on sudo, password vaulting, or monitoring to control privileged user access to your Unix, Linux and Windows servers and desktops? If so, you may be leaving yourself wide open to a security breach, which will cost your organization, on average, $8.9M dollars. Join McAfee and FoxT to discover the latest best practices and recent innovations for privileged access management. 

Register to View

 

Presenter: Jonas Iggbom, Director of Product Management for FoxT

The integration of FoxT solutions with McAfee ePolicy Orchestrator (ePO) allows the management of authentication and authorization policies for users with both elevated and normal privileges to servers and applications. The integration also enables the use of McAfee ePO for both solution deployment and reporting.

View Demo

Presenter: Jonas Iggbom, Director of Product Management for FoxT

There are several approaches for controlling privileged user access and eliminating the sharing of functional accounts. But what makes the most sense for your organization? What are the latest techniques that you should consider adopting? Is it time to upgrade to a more effective approach? Watch the 30 minute on-demand webinar highlighting the latest techniques and best practices for privileged access management.

Register to View

Presenters: Bob West, Echelon One CEO and Jonas Iggbom, Director of Product Management for FoxT

With breaches becoming more sophisticated and your brand and bottom line at stake, the path to protect assets lies with properly implementing server access controls, as well as understanding the shortcomings of in place solutions, the adoption of best practices and the constant awareness of threats – both internal and external.

Bob West, CEO of Echelon One, a leading security research firm and former CISO of Fifth-Third bank, discusses some startling findings from a recent Echelon One Privileged Access Management Survey, and identifies these persistent threats and the appropriate actions that companies need to be aware of when implementing effective server access controls.

Register to View

The growing use of mobile devices and movement of resources to the Cloud are adding further complexity to access management administration, enforcement, and auditing. In addition, there are still basic access management challenges that need to be addressed. These challenges will be due in part to some of these common predictions in IT and Security for 2012.

Register to View

Watch a fifteen minute introduction to FoxT ServerControl.

Register to View

Watch a five minute introduction to FoxT ApplicationControl.

Register to View

Discover how to centralize access management and privileged account control over Windows, Linux and Unix servers in this 30 minute presentation and demo of FoxT ServerControl.

Register to View

Presenter: Matt Archibald, CISO at Applied Materials

Learn how Applied Materials is controlling access across diverse servers and streamlining the associated compliance reporting requirements.

Register to View