Hi [[ session.user.profile.firstName ]]

Performance Monitoring by ExtraHop

  • Date
  • Rating
  • Views
  • Four Ways Network Traffic Analytics Can Supercharge Your SOC
    Four Ways Network Traffic Analytics Can Supercharge Your SOC
    Eric Ogren, Senior Analyst at 451 Research; Barbara Kay Sr. Director of Security Product Marketing at ExtraHop Recorded: Jun 27 2018 60 mins
    The network doesn’t lie. That’s one reason companies are increasingly turning to their network to simplify and speed up common SOC workflows. Network Traffic Analytics (NTA) complements log data and endpoint instrumentation with an objective view of threat behavior on the network, and dramatically reduces the time to detect and respond to threats.

    In this webinar, you will learn how your peers are using NTA technology based on a new market research from 451 Research, as well as ExtraHop’s approach to NTA that goes beyond just detecting threats to also include automated investigation and robust forensics capabilities.
  • Data-Driven IT in Travel & Tourism: How to Maintain a Competitive Advantage
    Data-Driven IT in Travel & Tourism: How to Maintain a Competitive Advantage
    Tyson Supasatit, PMM at ExtraHop and Jon Randall, Senior Solutions Architect, EMEA at ExtraHop Recorded: Jun 20 2018 33 mins
    The tourism industry is a highly competitive space; be it for airline operators, hotel booking sites, or travel fare aggregators. It is an industry that has been heavily digitised and in which a 2% profit is considered a good year. In this environment, IT teams in travel & tourism are constantly being asked to provide better, more secure digital experiences at less cost. The key to greater efficiency and performances is visibility into complex IT environments, where a single business transaction could involve 30 different hops across Citrix, Sabre applications, and third-party API calls.


    In this webinar, we'll be looking at real-life examples of how IT teams can leverage enterprise-scale IT analytics backed by AI to:

    - Improve application performance in highly complex IT estates
    - Reveal suspicious activity on their network
    - Provide business intelligence for reducing costs and improving profitability
  • Protecting Against Ransomware
    Protecting Against Ransomware
    Nick Frost (Principal Consultant, ISF) | Raja Mukerji (ExtraHop) | Patrick Grillo (Fortinet) | Rob McGovern (LogRhythm) Recorded: Jun 6 2018 45 mins
    What are the lessons learned from the biggest ransomware attacks to date (Wannacry, NotPetya)? How are organizations preparing against the next big attack?

    Join top security experts for this interactive Q&A discussion on:
    - Trends in ransomware attacks
    - Backups, patches and other ways to protect your data
    - How to bolster your organization's security culture
    - Other threats on the horizon

    Speakers:
    - Nick Frost, Principal Consultant, Information Security Forum (ISF)
    - Raja Mukerji, Co-Founder and President, ExtraHop
    - Patrick Grillo, Senior Director Solutions Marketing, Fortinet
    - Rob McGovern, Technical Product Manager, LogRhythm

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • A Bias for Action: Security Analytics for the Advanced SOC
    A Bias for Action: Security Analytics for the Advanced SOC
    Jon Oltsik, Sr. Principal Analyst, ESG, and Barbara Kay, Sr. Dir. Security, ExtraHop Recorded: May 17 2018 64 mins
    Orchestration and automation theory has graduated to a concrete architecture for implementation. An action-driven architecture supports more proactive analysis and investigation for more effective detection, triage, investigation, and response.

    The foundation of a successful security architecture in this model requires:
    - Rich, trustworthy data covering all aspects of the environment
    - Consolidated data sources and analytics processes
    - Automated investigation and response capabilities
    - Integration between tools and services for total coverage of every critical asset and data set.

    In this webinar, we'll discuss how to build an action-oriented security architecture, key use cases, and critical success factors.
  • TLS 1.3 and What It Means for Data Center Visibility
    TLS 1.3 and What It Means for Data Center Visibility
    Matt Cauthorn, VP of Security at ExtraHop and Tyson Supasatit, PMM at ExtraHop Recorded: Apr 25 2018 45 mins
    On March 21, the IETF approved the TLS 1.3 standard, which requires forward secrecy. This poses a problem for passive monitoring solutions because they will not be able to decrypt the traffic. In this webinar, you will learn about TLS 1.3's implications for enterprise performance and security monitoring, and how ExtraHop offers a novel method of decrypting traffic using ephemeral session keys without an inline deployment.
  • Assure the Network. Assure the Patient.
    Assure the Network. Assure the Patient.
    John Moyer, Cerner - Network Solutions Leader and Ryan Davis, ExtraHop - Product Marketing Recorded: Mar 22 2018 23 mins
    Every hospital room is a datacenter. By the year 2020, Internet-connected medical devices will outnumber people 2:1. There will be 13 devices per staffed bed, not just per room. And, an average of 89 vendors will access a hospitals network every week. These increasing trends will create unique challenges for healthcare institutions, such as:

    -Increased complexity due to siloed departments
    -Lack of visibility into east-west traffic
    -Security around the increasing amount of medical devices

    There’s a better way for hospitals to build a sustainable business model focused on lower costs and better outcomes. Cerner and ExtraHop can help IT health organizations prepare for this shift, by keeping their systems online and providing the quality care patients expect. ExtraHop and Cerner provide the ability to see, in real time and down to the transactional level, exactly what’s happening across your healthcare IT and clinical systems. This visibility isn’t just a nice to have, it is a must-have to keep your IT healthy.
  • Five Dangers that Can Sink Your Data Center Migration
    Five Dangers that Can Sink Your Data Center Migration
    Tyson Supasatit, PMM at ExtraHop; Eric Thomas, Director of Cloud Solutions at ExtraHop Recorded: Mar 20 2018 40 mins
    If you have a data center or application migration on the horizon, you need to be aware of the pitfalls. Out-of-date CMDBs, reliance on tribal knowledge, lack of performance reporting, and other gotchas can lead to project overruns and application performance issues.

    Thankfully, you can use data pulled from the network to discover assets, map dependencies, measure before-and-after baselines, and validate your project's success.

    Register for this webinar to learn more about how to overcome the common challenges in your data center migration project.
  • How A Better SecOps Workflow Can Reduce Wasted Time & Accelerate Investigations
    How A Better SecOps Workflow Can Reduce Wasted Time & Accelerate Investigations
    Jeff Costlow, Director of Security, and Mike Campfield, VP of Security Recorded: Mar 13 2018 58 mins
    Security operations need to balance a drive for greater efficiency with the need for agile and adaptive investigations. The security workflow paradigm of the last decade focused heavily on detection and alerting. Once a potential security problem is detected, the rest of the investigation and remediation process is essentially manual. Given the sheer volume of alerts and high ratio of false positives, this workflow is no longer sustainable. In this webinar, we'll discuss the parts of the current security paradigm that cause the most time waste, and introduce a new automated 3-in-1 workflow, enabled by ExtraHop Reveal(x), that can reduce wasted time and accelerate investigations for enterprise security teams:

    You'll learn:

    - Three top causes of time-waste in the SOC, and how to avoid them
    - How to focus manual effort on tasks that matter, and automate the rest
    - How the Reveal(x) 3-in-1 workflow meshes discovery, correlation, and investigation to reduce false positives and manual labor, and accelerate security investigations.
  • Behind Every Ticket is a Patient
    Behind Every Ticket is a Patient
    Rick Bradley - APCON, Ryan Davis - ExtraHop Recorded: Feb 20 2018 35 mins
    Many network operation teams struggle to address data friction issues by failing to leverage their network. Using a network as a real-time data source allows you to confidently maximize the value of IT data. Sign up to learn about an analytical approach to healthcare and how to leverage a network as a data source.
  • Cybersecurity & Healthcare: How prepared are you?
    Cybersecurity & Healthcare: How prepared are you?
    Ernie Hood, Senior Research Director with the Advisory Board and former Vice President and CIO at Group Health Recorded: Dec 12 2017 53 mins
    Securing your healthcare organization goes beyond investing in technology to secure your devices, data, and applications. In today's complex digital healthcare environment, your healthcare workflows broaden your risk exposure by interacting with multiple apps, devices, and users spread across multiple geographies. Securing these interactions and all of the components within these workflows requires investing in a comprehensive cybersecurity ecosystem that is more focused on business objectives and less focused on securing individual applications and devices.

    This webinar will discuss the pieces of a cybersecurity ecosystem model, and how this type of model requires policies, processes, and technologies that allow your healthcare organization to take a more proactive approach to risk management and security.

Embed in website or blog