Access our demo library to view BeyondTrust products in action.
Learn More Learn MoreComplete your PAM journey with detailed guidance, hands-on capability checklists, and more.
Learn More Learn MoreLearn why Gartner® has named BeyondTrust as a PAM Leader once again.
Learn More Learn MoreWatch the replays from our 2023 conference now!
Learn More Learn MoreOffering a wide array of services and benefits tailored to your specific needs
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreWhat can we help you with?
, –am CEST with Elie El Hayek, Solutions Engineer
How to protect your Windows endpoints against Microsoft vulnerabilities?
Today, a large number of organizations use Microsoft technologies to carry out their day-to-day tasks. Securing Windows endpoints is therefore an essential part of effective protection against malware and other sophisticated cyber-attacks.
Did you know?
More than 1,292 Microsoft vulnerabilities were reported in total in 2022, an all-time record for the last 10 years. Elevation of privileges remains the leading category of vulnerability.
So how can you better protect your organization and reduce the attack surface?
In this webinar, we will discuss the following topics:- Key trends in Microsoft 2022 vulnerabilities - Why does elevation of privilege remain the #1 vulnerability category for the 3rd year running?- Which approach should be adopted to mitigate vulnerabilities even when a patch is not available?
Elie El Hayek est Solutions Engineer chez BeyondTrust.
Avant de rejoindre BeyondTrust, Elie occupa les postes de Sales Engineer chez Vaornis et chez Orange Business Services. Ces expériences lui ont permis d’acquérir des compétences sur la sécurisation des données on-premise et dans le cloud, la conformité aux réglementations de sécurité et des politiques de confidentialité ainsi que dans la détection et réponse aux menaces.
Ce qui anime Elie aujourd’hui, c’est l’accompagnement des clients BeyondTrust dans leurs projets de mise en place de stratégie de sécurité des ressources et infrastructures informatiques.