Hi [[ session.user.profile.firstName ]]

Siemplify

  • Date
  • Rating
  • Views
  • More Data, More Problems: Why Your SOC Needs Context-Based Processes Now
    More Data, More Problems: Why Your SOC Needs Context-Based Processes Now
    Charles Sterner and Meny Har Recorded: Dec 13 2018 52 mins
    Security operations teams routinely wade through strings of data - user information, IP addresses, file hashes, alerts and so forth - in their quest to identify potentially malicious activity that may harm their organization. Yet the way this data is typically presented slows down SOC processes and can even obfuscate legitimate threats.
    Turning this endless stream of data into usable information is vital for security operations teams as they work to identify, investigate and mitigate threats across the enterprise. Adopting a context-based approach can bring focus to SOC activities and help security analysts see the most critical details more clearly.
    In this webinar, security operations experts Charles Sterner and Meny Har will take a look at how enterprise SOC teams can evolve to leverage context-based views and processes supported by security orchestration. And they will explore why a context-driven approach may be the key ingredient your security operations team needs to improve efficiency, enhance the quality of investigations and incident response and combat threats more effectively.
  • Automating 98% of Tier 1 Tasks with Security Orchestration
    Automating 98% of Tier 1 Tasks with Security Orchestration
    Brad Horsley & Nimmy Reichenberg Recorded: Oct 18 2018 48 mins
    See why Choice Solutions found security orchestration and automation to be the right solution for streamlining and improving its security operations. Get a practical look at how Choice Solutions leverages Siemplify to automate 98% of its Tier 1 activities, improve its ability to scale and deliver better, more effective threat detection and response services to its clients.
  • Accelerating Incident Response with Intelligence-Driven Security Orchestration
    Accelerating Incident Response with Intelligence-Driven Security Orchestration
    Al Cooley, Meny Har, Nimmy Reichenberg Recorded: May 23 2018 47 mins
    Security operations teams are modern-day detectives, combing through clues to thwart cyberthreats. But the deluge of alerts from disparate technologies, manual processes and multiple consoles often hinder teams from building the story they need to respond to truly malicious activity.
    Join Symantec and Siemplify on Wedensday, May 23, to see how intelligence-driven orchestration helps SOCs overcome these challenges by enabling deeper, higher quality investigations and expediting incident response. During this session you’ll learn:
    - The vital role context plays in security operations and how it powers incident investigation and response
    - How threat intelligence and security orchestration provide deeper insights to streamline alert validation, incident prioritization and response
    - How Siemplify and Symantec DeepSight Intelligence integrate, drive a standardized workflow and improve security incident response
  • Security Automation Quick Wins
    Security Automation Quick Wins
    Meny Har & Nimmy Reichenberg Recorded: Mar 7 2018 56 mins
    Security operations teams are embracing automation to combat alert overload and make the most of the security tools they have invested in. But the question we hear most often from companies we work with is - “where do I start?”
  • Running a SOC with Security Orchestration - Use Cases, Benefits and Impacts
    Running a SOC with Security Orchestration - Use Cases, Benefits and Impacts
    Amos Stern, CEO, Siemplify & Arthur Hedge, CEO, Castle Ventures Recorded: Nov 30 2017 47 mins
    Date: November 30, 2017
    Duration: 45 minutes
    Host: Amos Stern, CEO of Siemplify

    Whether an Enterprise SOC or an MSSP the challenges of too many alerts, disconnected tools and a shortage of analysts continue to plague security operations.

    Security Automation and Orchestration are increasingly looked to enable analysts to triage the tsunami of alerts flooding the organisation, provide context to accelerate investigation, and provide the playbooks and workflow to drive consistency and efficiency throughout security operations.

    In this webinar Amos Stern, CEO of Siemplify and, Arthur Hedge, CEO of Castle Ventures Corporation (a leading MSSP) discuss how Castle successfully utilizes Security Orchestration to transform their SOC.

    We'll explore:
    ---------------------------

    How to drive efficiency and effectiveness across security operations.

    The impact Security Orchestration & Automation can have on security operations.

    Direct ROI from Security Orchestration on delivery of Managed Security Services.

    What should security teams be looking for in Security Orchestration solution.


    Simply fill out the form to register!
  • Leveraging Security Orchestration & Automation to Improve Security Operations
    Leveraging Security Orchestration & Automation to Improve Security Operations
    Joseph Blankenship, Forrester | Amos Stern, Siemplify | Miguel Carrero, CRO Recorded: Sep 19 2017 62 mins
    Join us for this virtual panel discussion where guest speaker, Forrester's Joseph Blankenship and Siemplify's Amos Stern will present research and best practices driving Security Operations and how Security Orchestration and Automation are shaping the SOC of the Future.

    Security Automation and Orchestration are increasingly looked to enable analysts to triage the tsunami of alerts flooding the organization, provide context to accelerate investigation, and provide the playbooks and workflow to drive consistency and efficiency throughout security operations.

    In this discussion we will address:
    - How to drive efficiency and effectiveness across security operations
    - What does the SOC of the future look like and how do we get there
    - What should security teams be looking for in Security Orchestration

    Moderated by Miguel Carrero, Siemplify CRO.
  • SOC of the Future -- How to Run an Effective SOC
    SOC of the Future -- How to Run an Effective SOC
    Siemplify’s Miguel Carrero (EVP Strategy) & Meny Har (VP Product) Recorded: Jun 29 2017 33 mins
    The Security Operations Center (SOC) is the backbone of an effective cyber strategy. With the ever expanding digital footprint and heavy investment in detection, effective response to today’s cyber challenges run through Security Operations. Running an effective SOC is way more than tuning a SIEM or hiring more analysts. The building blocks of a SOC require thoughtful convergence of people, process, and technology;

    Executed effectively, a SOC brings visibility, confidence and efficiency throughout security operations and incident response. A properly implemented SOC can enable analysts to triage the tsunami of alerts flooding the organization, provide contextual data which allows analysts to appropriately prioritize incidents based on the severity of the threat, and ultimately greatly reduce time to remediate security issues by consistently executing processes.

    In this webcast, Siemplify’s Miguel Carrero (EVP Strategy) & Meny Har (VP Product), will introduce how to drive efficiency and effectiveness across security operations and how SOC Managers are taking back control to spot what’s important and act on it fast.
  • 2017 Security Operations Challenges - Featuring New ESG Research
    2017 Security Operations Challenges - Featuring New ESG Research
    Siemplify EVP Strategy, Miguel Carrero - Meny Har, VP of Product - COO Dennis Shaya Recorded: May 18 2017 42 mins
    In early 2017 Siemplify embarked on research with 150 security leaders across industry groups to better understand these challenges and priorities to improve Security Operations.

    Did you know…

    •Organizations are forced to knowingly ignore alerts - despite increased spending on security tools and personnel, nearly half of respondents have no choice but to ignore alerts that they believe SHOULD BE investigated due to the sheer volume of incoming threats. An additional 20% of organizations admit to ignoring over 50% of critical alerts.

    •More than 80% of organizations said they persistently lack adequate staff to meet the demands of their security operations.

    •Security operations must be centralized, orchestrated, and automated - A staggering 96% of respondents highlighted the need to take action in orchestrating their incident response processes and over 90% said they needed to explore varying degrees of automation to improve their response.

    Security Orchestration is looked to as the answer

    Security orchestration bridges the gap between alert overload and analyst capacity. Executed effectively, an orchestration platform creates the integrated fabric across the security footprint bringing simplicity, context, and efficiency throughout security operations and incident response.

    In this webinar we will explore these findings, how orchestration is helping organizations respond to these challenges, and what are the critical capabilities (building blocks) of an effective orchestration platform.

Embed in website or blog