accent 1 accent 2
Icon-Check@3x
+1 CPE Virtual Connect! Replay

4 Ways Attackers Sidestep Your Endpoints

On-Demand

Cybercriminals constantly evolve their tactics to avoid detection. 

Join us as we demonstrate real-life attacks where attackers avoid the endpoint—like creating malicious Microsoft 365 apps or exploiting vulnerable remote access gateways. 

We’ll explain how these attacks work and provide strategies to defend against them. 

Replay

Watch Now

About this webinar...

As cyberattacks become more sophisticated and difficult to detect, it’s more important than ever for defenders to understand how they work in order to protect against them. In this session, you’ll see how attackers avoid your endpoints and how to detect signs of an attack, even without your EDR firing.

What you'll learn:

  • How to create a malicious Office macro 
  • How attackers exploit remote access gateways 
  • How a supply chain attack, like SolarWinds, works 
  • What to look for as a sign of compromise 
Snir Ben Shimol
Snir Ben Shimol Director of Cybersecurity, Varonis
Brian Vecci_circle
Brian Vecci Field CTO, Varonis
Headshot_DavidGibson_SQ-1
David Gibson Chief Marketing Officer, Varonis

Pre-Varonis, we would have spent tons of wasted hours looking through event logs to try and get a handle on what was happening. With Varonis, we have alerts that allow us to quickly understand and resolve situations.” 

- Security Engineer, Large Regional Healthcare System 

Want to see Varonis in action?

Request a demo