Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Customers Describe Value of ThreatOptics
    Customers Describe Value of ThreatOptics
    Dr. Andreas Rohr, CISO, Large Energy Utility; Kevin Moore, Director of IT, Fenwick & West, LLP; Mike Horn, CEO, NetCitadel Recorded: Apr 23 2014 3 mins
    Customers describe the value of ThreatOptics how their problems were solved with ThreatOptics purpose-built design. You'll hear customers describe how the ThreatOptics "single-pane-of-glass" centralizes and integrates a view of network threats, automates containment and response actions, and provides incident intelligence and context for analysts. Lastly, you'll hear customers describe the real time and operational savings from using the platform
  • ThreatOptics Demo - Automated Incident Response
    ThreatOptics Demo - Automated Incident Response
    Chris Wollick, Sr. Incident Response Guru Recorded: Mar 6 2014 6 mins
    ThreatOptics from NetCitadel is a threat management platform that enables Automatic Incident Response with a clean and easy to use UI. Based-on a SOC workflow, ThreatOptics investigates, mitigates, and contains threats reported by Advanced Malware Devices like FireEye and SIEMs like ArcSight. This demo provides a quick view into how built-in source connectors, built-in enforcement adapters, threat intelligence gathering, and the seamless workflow is turning automated incident response into a reality.
  • Automated Incident Response: The Pressing Need to Improve Incident Response
    Automated Incident Response: The Pressing Need to Improve Incident Response
    John Oltsik, Senior Principal Analyst, ESG Recorded: Feb 20 2014 6 mins
    If you cut your Incident Response times by >50% and eradicated false positives, would it help your security posture? Incident response is fraught with manual processes that span tedious collection through decision making that requires advanced security analytical skills. In this webcast you'll receive research about the critical gaps and systemic limitations that are leaving businesses at risk for prolonged breaches and data loss. You'll also learn about technology that automates the manual processes, alleviates the cybersecurity skills gap, and accelerates mitigation and containment activities. NetCitadel ThreatOptics is designed to close the incident response “loop” as it takes security alerts, adds threat intelligence and context, prioritizes threats for response, and automates mitigation and containment activities.
  • Avoid Death by 1000 Security Alerts
    Avoid Death by 1000 Security Alerts
    Neil Stratz, VP Customer Solutions, NetCitadel Recorded: Dec 10 2013 43 mins
    Modern threat detection technologies can create large volumes of security alerts as they discover threats or detect signs of potential infection. Reimaging every system suspected of infection can lead to productivity-killing downtime, but may be unnecessary when the security alert is triggered by non-malicious files, low priority system anomalies, or false alarms. In this session, Neil Stratz discusses examples of evasive malware that can lead to wasted incident response efforts, highlight example pitfalls of conventional IR processes, and recommend a series of steps and methods to leverage contextual data and existing security devices to ensure an effective and rapid response.
  • Closed Loop: Detect and Contain APTs with FireEye and NetCitadel
    Closed Loop: Detect and Contain APTs with FireEye and NetCitadel
    Mike Horn, CEO and Co-founder Recorded: Nov 20 2013 39 mins
    Today’s new breed of cyber attacks easily bypass traditional defenses and have IT security organizations searching for new ways to protect themselves. Advanced malware, zero-day exploits, and targeted advanced persistent threats (APTs) are prompting incident response teams to re-examine their existing IT security defense and response strategies in order to protect their users, data, and reputation.

    Attend this webinar with FireEye and NetCitadel to learn:
    • What are the traits of Advanced Malware and why traditional security defenses are failing
    • Why traditional incident response processes can't keep up with the volume and sophistication of today's attacks
    • How a new approach to detection, analysis, and response can dramatically reduce exposure and risk

Embed in website or blog