Hi [[ session.user.profile.firstName ]]

Arctic Wolf Networks

  • Date
  • Rating
  • Views
  • Best Practices for Outsourcing Your IT Security
    Best Practices for Outsourcing Your IT Security Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf Recorded: Jun 19 2018 62 mins
    With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

    By attending, you’ll:

    - Understand best practices for working most effectively with third party providers
    - Discover what security functions can be handled by third parties and what should be kept in-house
    - Recognize how to avoid common pitfalls of working with third parties
    - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

    Save your seat now to learn more!
  • Protect & Improve Your Business: Top 5 Best Practices for Connected Devices
    Protect & Improve Your Business: Top 5 Best Practices for Connected Devices Sonu Shankar, Senior Product Marketing Manager, Arctic Wolf Networks Recorded: Jun 14 2018 30 mins
    IoT devices are increasingly connected to conventional IT infrastructures, to improve operational efficiencies and ease of remote management. IT leaders are now responsible for connecting doctors, nurses, patients, and medical devices, or enabling financial advisors on the road, to deliver services to their clients. From enabling services via remote mobile devices, to managing IP-connected cameras on-premises at the same time, running this new converged IT ecosystem, that includes Operational Technology (OT), can be a daunting task. Especially when your attack surface has now dramatically expanded.

    According to Verizon's 2017 Data Breach Investigations Report, a total of 51% of data breaches affected either financial services businesses (24%), healthcare organizations (15%), or public sector entities (12%). With the rise in data breaches in these industries, and the responsibility to manage this connected ecosystem, how do you protect your business from attacks targeting connected devices? Furthermore, how do you do this without the budget to build and staff a full-fledged Security Operations Center (SOC)?

    Join us to discover:

    - The top 5 best practices you can adopt to improve your overall security posture
    - How you can equip your business with the security capabilities of a large enterprise at a fraction of their costs
  • What Are the Key IT Security Services Covered by Third Parties?
    What Are the Key IT Security Services Covered by Third Parties? Narayan Makaram, Sr Director of Product Marketing - Arctic Wolf Recorded: Jun 5 2018 2 mins
    In this video clip, discover what security functions can be handled by third parties and what should be kept in-house. However, is this enough for you and your business?

    To watch the full webinar on how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it, click here: https://arcticwolf.com/resources/webinars/?utm_source=Arctic+Wolf+Networks&utm_medium=brighttalk&commid=321811
  • Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
    Analyst Insights: Trends Driving the Need for a SOC-as-a-Service Mark Bouchard, Co-Founder and COO - CyberEdge Group & Narayan Makaram, Sr. Director, Product Marketing - Arctic Wolf Networks Recorded: May 22 2018 57 mins
    Every company, regardless of size or industry, needs the advanced security capabilities provided by a security operations center (SOC). Until recently, only large enterprises had the means and resources to implement these essential technologies. So, where does that leave small to midsize enterprises (SMEs)?

    In this upcoming webinar, Tuesday, May 22, at 11am PT/2 pm ET, Co-founder and COO of CyberEdge Group, Mark Bouchard, will share insights on the cybersecurity challenges facing small to midsize enterprises (SMEs), drawing on data from the recently published 2018 Cyberthreat Defense Report. We will also hear from Sr. Director of Product Marketing of Arctic Wolf Networks, Narayan Makaram, on the SOC options available to SMEs and will help to identify the top 10 capabilities to look for in a SOC-as-a-service.

    By attending this webinar you will learn about:

    • Cybersecurity challenges facing the IT organization in small to midsize enterprises (SMEs)
    • Insights into what is driving the need for managed threat detection and response
    • The top 10 essential elements of a SOC-as-a-Service

    To discover how SMEs can get access to a SOC in the form of a SOC-as-a-service, register today!

    About our key speaker:

    Mark Bouchard, CISSP, is the Chief Operating Officer at CyberEdge Group, an award-winning research, marketing and publishing firm serving the needs of high-tech organizations worldwide. Before CyberEdge, Mark founded AimPoint Group, an independent IT research and consulting company specializing in information security. Prior to AimPoint Group, Mark was a Vice President at META Group (acquired by Gartner) where he helped hundreds of organizations worldwide address their IT challenges. A veteran of the U.S. Navy, Mark is passionate about ensuring the success of his clients.
  • Hybrid Defense: How to Defeat 2018's Biggest Threats
    Hybrid Defense: How to Defeat 2018's Biggest Threats Louis Evans, Product Marketing Manager - Arctic Wolf Networks Recorded: May 17 2018 32 mins
    There’s one certainty in cybersecurity: 2018's attacks are going to be even worse than the ones we've faced. So, how are cybersecurity experts and vendors gearing up to meet these new threats?

    In this webinar, we’ll touch on major industry trends like User Behavior Analytics and automated incident response, and take a deep dive into how three key innovations—hybrid AI, hybrid cloud security, and hybrid IT teams—are enabling even cash-strapped organizations to deploy world-class defenses.

    We’ll discuss how:

    - Human-AI hybrid solutions deliver security that’s more than the sum of its parts
    - SIEM solutions are rising to the challenge of new hybrid-cloud architectures for business
    - Expert-as-a-service solutions are transcending the challenges posed by both in-house and traditional consulting staffing strategies

    To see how you can beat the big threats of 2018, register now!
  • Why Native Security Features in AWS and Office365 aren't Enough
    Why Native Security Features in AWS and Office365 aren't Enough Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager at Arctic Wolf Networks Recorded: May 8 2018 49 mins
    Most businesses are rapidly moving to the cloud to be fast and nimble, reduce their cost structure, and reach more customers anywhere, anytime. These new architectures have powerful new capabilities—but also expose businesses to a new universe of risk.

    When dealing with outsourced infrastructure like AWS, or a SaaS solution like Office365, it is easy for IT managers to assume that security is out of their hands, for better or worse. But, this assumption may not always be true. Businesses must develop an active cloud security strategy as they pursue their migrations, and become a proactive security partner with their cloud providers—or they will find themselves vulnerable to attack.

    In this upcoming webinar, hear from security experts at Arctic Wolf Network (AWN), on:

    - The top cybersecurity risks and best practices for securing cloud deployments
    - How AWN security monitoring compliments the native security features in AWS and Office365
    - The role of AWN cloud security in integrating observations from cloud and on-premise systems

    To see how AWN CyberSOC™ can secure your cloud, register now.

    About our speakers:

    Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.

    Louis Evans is a new member of the Arctic Wolf team. He’s passionate about cybersecurity, defeating the next generation of threats, and Alan Turing.
  • Let's Talk About Security IT: Discover Why 24x7 Monitoring is Critical
    Let's Talk About Security IT: Discover Why 24x7 Monitoring is Critical Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks Recorded: May 2 2018 52 mins
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to exploits that were previously only available to highly skilled nation-state actors.

    Without access to the large IT budgets to fend off these bad actors, small and medium businesses continue to struggle with determining the right approach to cyber security. Lacking the resources to build or staff a Security Operations Center (SOC), companies continue to invest in endpoint and perimeter security products. However, even with several security products deployed, breaches keep occurring. So, is there a way you could detect data exfiltration attempts early, even if the attackers were able to evade your endpoint defense mechanisms?

    In this webinar, we talk about:

    - Why investing heavily in endpoint and perimeter security products may not be enough
    - The top reasons why 24x7 security monitoring is critical to defend your business from today’s attackers
    - How you can transform your cyber security strategy today with advanced threat detection and response

    To discover why 24x7 monitoring is critical, register now.
  • Discover the SIEMple Life with a Managed SOC
    Discover the SIEMple Life with a Managed SOC Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager at Arctic Wolf Networks Recorded: May 1 2018 59 mins
    Most security information and event management (SIEM) customers are struggling to achieve meaningful success a year or more after initial deployment. This is especially true with mid-market companies, where shrinking IT security budgets and shortage of skilled cyber security resources have forced them to reconsider investing in a SIEM, and seriously look at managed security services options.

    Before CIOs/CISOs take a leap of faith into any kind of managed security service, they want to be able to measure ROI with an outsourced managed solution, as opposed to managing their own SIEM. In this webinar, hear from security experts on:
    - What does it take to build and manage your own SIEM in-house?
    - What security SIEM blind spots can you avoid with a managed security service?
    - How do you determine ROI of a managed service as compared to a SIEM?
  • SOC This Way: Trends Driving the Costs of SME Cybersecurity
    SOC This Way: Trends Driving the Costs of SME Cybersecurity Louis Evans, Product Marketing Manager - Arctic Wolf Networks Recorded: Apr 26 2018 60 mins
    Cybercrime’s threat to small and medium enterprises (SMEs) continues to grow, and legacy security solutions no longer deliver adequate protection. This environment is pushing an increasing number of companies to explore advanced threat detection and response strategies, including in-house Security Operations Centers (SOCs). However, the budgeting stage of SOC planning often delivers a nasty case of sticker shock—and companies that push through find that SOC costs can exceed even pessimistic projections.

    In this webinar we’ll explore the factors that drive surprising SOC costs:

    - Cybersecurity skills shortage
    - Staffing for risk
    - Hidden product requirements and pricing

    To see how a new category of SOCaaS solutions can help businesses control these costs while achieving advanced cybersecurity, register now!
  • Top 5 Best Practices for Connected Devices: Two/Multi-Factor Authentication
    Top 5 Best Practices for Connected Devices: Two/Multi-Factor Authentication Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks Recorded: Apr 25 2018 2 mins
    In this clip, we share another of the top 5 best practices you can adopt to improve your overall security posture and recognize how you can equip your business with the security capabilities of a large enterprise, at a fraction of their costs!

Embed in website or blog