클라이언트: LogRhythm EMEA
양식: 백서
크기: 487KB
언어: 영어
날짜: 02.08.2018

Dissecting a Cloud Attack: Securing Azure with AzLog

Just because data, applications, and systems exist in Azure doesn’t mean your commitment to security, ability to monitor, and need to achieve compliance are any less. First, you need to collect security events, configuration changes, and access logs. Then you must centralize this data within a security information and event management (SIEM) platform to achieve visibility and maintain security.

To help you better understand what’s necessary and possible regarding logging and visibility of your Azure environment, we’ll take a look at an example of how a typical attack takes place, how to identify progression through the Cyber Attack Lifecycle using Azure’s AzLog functionality, and how to detect attackers moving laterally between the cloud and your on-premise network.

무료 다운로드
연락처 정보를 입력하고 다운로드 버튼을 클릭하십시오. 다운로드 링크가 포함된 이메일이 발송됩니다.
I consent to B2B Media Group GmbH with its affiliated companies and LogRhythm EMEA processing my data for marketing purposes, in particular for marketing-related contact via email and telephone.

You can withdraw your consent at any time by emailing privacy@b2bmg.com (subject: LogRhythm EMEA). Further information can be found in the Privacy Notice.

Privacy / download conditions:

Date: 1.8.2018

Client

  • B2B Media Group GmbH, Bahnhofstraße 5, 91245 Simmelsdorf (B2B MG)

Partner

  • LogRhythm EMEA
* 표시된 영역은 필수입니다