Hi [[ session.user.profile.firstName ]]

Security Analytics by ExtraHop

  • Date
  • Rating
  • Views
  • 2019 and Beyond: Incident Detection and Response at Wire Speed
    2019 and Beyond: Incident Detection and Response at Wire Speed
    Chris Kissel, IDC, and Barbara Kay, ExtraHop Recorded: Dec 5 2018 54 mins
    While some innovations deliver material benefit, many aren’t worth your POC time. In this webinar, featured speaker Chris Kissel, Research Director, Security Products and head of the IDC security analytics and orchestration practice, will present new research on what will disrupt, what will innovate, and what will merely evolve in the security analytics market over the next several years. Futurescape trends provide insights on the best ideas enhancing incident detection and response and provide a look at the ideal use cases for the most beneficial new technologies.
  • 3 Ways to Use Your Network as a Force Multiplier for Incident Response
    3 Ways to Use Your Network as a Force Multiplier for Incident Response
    David Monahan, Senior Analyst, EMA and John Matthews, CIO, ExtraHop Recorded: Nov 28 2018 56 mins
    The shortage of skilled security professionals won’t end anytime soon, but you can improve your incident response (IR) capabilities now by taking advantage of your network traffic for early detection and more investigation. In this webinar, EMA Managing research Director David Monahan will join ExtraHop CIO John Matthews to explain how you can make your staff more productive by automatically prioritizing your most critical assets, providing context to alerts, and putting full transaction details at the fingertips of analysts during investigations.

    In this webinar, you’ll learn how to:
    - Use your network as a force multiplier for SecOps
    - Equip junior security staff to do more by providing them with greater context and analysis
    - Reduce your attack surface and prioritize response on your most critical assets
  • How to Get More Out of Your Splunk Deployment with ExtraHop
    How to Get More Out of Your Splunk Deployment with ExtraHop
    Scott Olson, Sr. Sales Engineer; Stephen DeSanto, Solutions Engineer Recorded: Nov 15 2018 44 mins
    Splunk is an excellent platform for analyzing machine data and orchestrating responses. ExtraHop extracts wire data events and metrics from network communications, and can send this information to Splunk for added accuracy and context.

    This webinar explains why ExtraHop and Splunk make such a great fit, and how you can use the ExtraHop App for Splunk to stream wire data such as details for DNS, database, storage, and more.
  • You Can't Outsource Risk: Shared Responsibility in the Cloud
    You Can't Outsource Risk: Shared Responsibility in the Cloud
    Barbara Kay, Sr Director of Security Product Marketing Recorded: Oct 24 2018 32 mins
    IT and Security teams are figuring out how to ensure the same level of security for their applications and data in the cloud as they have in traditional on-premises environments. While public cloud vendors offer some capabilities, there are several gaps that organizations need to fill when it comes to cloud-hosted workloads. In this webinar, you will learn about what cloud providers can help you with, what gaps you need to fill, and the role that network traffic analysis can play in securing your cloud environments.
  • Investigate East-West Attack Activities to Defend Critical Assets: A SANS Review
    Investigate East-West Attack Activities to Defend Critical Assets: A SANS Review
    Dave Shackleford, SANS Instructor and Founder of Voodoo Security; Barbara Kay, Sr Director of Security Product Marketing Recorded: Oct 4 2018 61 mins
    This SANS Institute review evaluates the ExtraHop Reveal(x) product and its ability to support detection, investigation and response for these late-stage attack activities.

    Reviewer Dave Shackleford puts ExtraHop Reveal(x) through its paces using a use case of an outside attacker who has compromised an internal system. The attacker is scanning the network, trying to gain access to a file share through brute force, pulling down data and exfiltrating that data. How does Reveal(x) perform in this scenario?

    Attendees at this webcast will learn about the role of machine learning in detecting and responding to threats and see how ExtraHop Reveal(x) can:

    - Assist in investigating incidents
    - Provide proactive threat hunting
    - Help with security hygiene and compliance
    - Integrate with other tools
  • Beyond the Breach: Recommendations for Effective Response
    Beyond the Breach: Recommendations for Effective Response
    Heather Stratford-Geibel (Stronger.tech) | Sushila Nair (NTT DATA) | John Matthews (ExtraHop) Recorded: Sep 19 2018 58 mins
    Discover the latest trends in cyber crime, your organization's vulnerabilities, and how to go about preventing, detecting and responding to a breach.

    Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:
    - Trends in breaches and cyber attacks
    - What to do (and not to do) after a breach
    - What's new on the threatscape
    - Best practices and recommendations for improving your security posture

    Speakers:
    - Heather Stratford-Geibel, CEO of Stronger.tech
    - Sushila Nair, Sr. Director, NTT DATA Services
    - John Matthews, CIO, ExtraHop
  • How Network Traffic Analytics Eliminates Darkspace for the SOC
    How Network Traffic Analytics Eliminates Darkspace for the SOC
    Christopher Crowley (SANS) and Barbara Kay (ExtraHop) Recorded: Aug 23 2018 63 mins
    The network doesnt lie. Thats one reason companies are increasingly turning to their network to simplify and speed up common SOC workflows. Network Traffic Analytics (NTA) specifically addresses key SOC challenges identified in the recent SANS SOC survey: Asset discovery and inventory, event correlation, and SOC/NOC integration.

    The NTA category is relatively new and focuses on facilitating detection and response of post-compromise activity, including command and control, reconnaissance, lateral movement, and exfiltration. Organizations primarily use NTA to gain visibility into East-West traffic within the environment, though it can also heighten visibility of North-South traffic traversing the perimeter. NTA tools complement log data and endpoint instrumentation with an objective view of threat behavior on the network, and dramatically reduce the time to detect and respond to threats.

    In this webcast, we'll cover:

    ∙ How your peers are using NTA technology to focus on what matters
    ∙ The impact of forward secrecy and TLS 1.3 encryption on network analysis
    ∙ How NTA can simplify CIS Critical Security Controls 1 and 2
    ∙ Boosting the productivity and expertise of junior analysts
    ∙ A live demo showing how ExtraHop Reveal(x) speeds key workflows
  • SOC Capabilities & Usefulness: SANS 2018 SOC Survey Results Pt 2
    SOC Capabilities & Usefulness: SANS 2018 SOC Survey Results Pt 2
    Christopher Crowley, Gary Golomb, Lital Grossman, John Moran, and John Pescatore Recorded: Aug 20 2018 62 mins
    As the network perimeter melts away, SOCs have no choice but to evolve. The use of cloud, mobile, personal and Industrial IoT are but a few of the technology innovations forcing this evolution. In this webcast, learn the tools and technologies SOCs are deploying to integrate and manage all their security, operational and response data for better protection, detection and response.

    In this webcast, SANS Principal Instructor Chris Crowley will discuss the results of the SANS 2018 SOC Survey, including:

    Differences between SOCs that identify as MSSPs and SOCs that do not identify as MSSPs
    Tools and technologies used to prevent, detect and respond to attacks
    SOCs' likelihood to address IoT and non-traditional IT
    Integration between tools for needed data sharing before, during and after events
    Automated and manual actions taken and the value of both
    Challenges holding organizations back from fully realizing SOC usefulness
  • No Single Definition of a SOC: Sans 2018 SOC Survey Results Part 1
    No Single Definition of a SOC: Sans 2018 SOC Survey Results Part 1
    John Pescatore (SANS), Christopher Crowley (SANS), and Barbara Kay (ExtraHop) Recorded: Aug 14 2018 62 mins
    While SOCs are maturing, staffing and retention issues continue to plague critical SOC support functions. In this webcast, learn how respondents to our 2018 SOC survey are staffing their SOCs, the value of cloud-based services to augment staff and technology, and respondents' level of satisfaction with the architectures they've deployed.

    In this webcast, SANS Principal Instructor Chris Crowley will discuss the following:

    The level of staffing in SOCs
    Outsourcing part (or all) of the SOC architecture
    Tools and technologies SOCs use to operate efficiently
    The value of distributed vs. centralized SOC functions
    Relationship between SOCs and NOCs
    Improvements resulting from integrative SOC functions for detection, prevention and response
  • From Reactive to Proactive - Getting the Most Out of Network Traffic Analytics
    From Reactive to Proactive - Getting the Most Out of Network Traffic Analytics
    Jeff Costlow, Dir of Security, ExtraHop; Kristy Westphal, VP, MUFG Union Bank; Melissa Duncan, Sr Sys Sec Eng, Charles Schwab Recorded: Aug 2 2018 57 mins
    They say “Packets don’t lie”. Instead of waiting to respond to incidents and anomalies, SecOps teams are using the network to enable proactive measures such as threat hunting, auditing encryption and other suspicious and out-of-policy behaviors existing in the dark alleys of the traffic corridor. Real time network traffic analytics (NTA) tools can help an organization shift from defensive to offensive and cut investigation time, enabling analysts to quickly correlate activities and test hypotheses. Join ExtraHop and (ISC)2 on August 2, 2018 at 1:00PM Eastern as we discuss proactive measures that can work for an organization, what activities to look for and how machine learning can help speed up these efforts.

Embed in website or blog