Hi [[ session.user.profile.firstName ]]

AlienVault

  • Date
  • Rating
  • Views
  • Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
    Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Jan 9 2018 37 mins
    As you've likely heard, Meltdown and Spectre are vulnerabilities that exist in Intel CPUs built since 1995. Hackers can exploit Meltdown and Spectre to get hold of information stored in the memory of other running programs. This might include passwords stored in a password manager or browser, photos, emails, instant messages and even business-critical documents.

    Join us for a technical webcast to learn more about these threats, and how the security controls in AlienVault Unified Security Management (USM) can help you mitigate these threats.

    You'll learn:

    What the AlienVault Labs security research team has learned about these threats
    How to scan your environment (cloud and on-premises) for the vulnerability with AlienVault USM Anywhere
    How built-in intrusion detection capabilities of USM Anywhere can detect exploits of these vulnerabilities
    How the incident response capabilities in USM Anywhere can help you mitigate attacks

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager
    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
  • CISO Perspective: How using the NIST Cyber Security Framework improves security
    CISO Perspective: How using the NIST Cyber Security Framework improves security John McLeod, CISO, AlienVault Recorded: Nov 30 2017 63 mins
    The National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) is widely recognized as an effective roadmap for improving threat detection and compliance. However, many smaller IT security teams with limited resources have trouble implementing and maintaining the recommended security controls and processes. That's where AlienVault can help.

    In this webcast, AlienVault CISO John McLeod will provide insights into how AlienVault approached implementation of NIST CSF and accelerated the process using their own Unified Security Management (USM) platform.

    Join this webcast for:
    - An overview of security controls recommended by NIST CSF
    - Best practices for approaching adoption of NIST CSF
    - How a unified security toolset can greatly simplify this process
    - A demo of the AlienVault Unified Security Management (USM) platform
  • Adding the S to MSP: Making Money in a Competitive Market
    Adding the S to MSP: Making Money in a Competitive Market Mike LaPeters, VP Global Channel Sales & Mike Calonica, VP American Sales Recorded: Nov 14 2017 35 mins
    Anybody can deliver technology, but these days Managed Service Providers (MSPs) also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.

    In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:
    - Current threats and how they are evolving
    - Comprehensive threat protection for the cloud
    - Unified security for detecting threats and responding to incidents
  • How to Solve your Top IT Security Reporting Challenges with AlienVault
    How to Solve your Top IT Security Reporting Challenges with AlienVault Sacha Dawes Principal Product Marketing Manager, AlienVault Recorded: Oct 31 2017 55 mins
    If you needed to provide reports to management or an auditor to prove that your IT security controls are in place and working, how long would it take you to do that? And, how many different tools would you need to consult? The AlienVault Unified Security Management (USM) platform integrates many of the core security capabilities you need along with built-in reports to help you implement IT security best practice frameworks like the NIST Cybersecurity Framework (CSF), as well as demonstrate compliance with PCI DSS, HIPAA and other regulations.

    Join this webcast to see how the USM platform makes it easy to:
    - Automate log collection, analysis and event correlation in a single console
    - Continuously scan for new assets and vulnerabilities
    - Get alerted of suspicious behavior like privilege escalations, account changes, malware and ransomware threats, and more
    - Simplify compliance with pre-built and customizable reports mapped to numerous regulatory requirements
  • SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection
    SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Oct 17 2017 61 mins
    SIEM solutions have been widely adopted to help IT teams collect and correlate data from a variety of security point products. However, traditional SIEM deployments require a great deal of time, money & expertise to properly normalize data feeds, create correlation rules to detect threats & continuously tune those rules to limit false positives. And, after all that work is done, it has to be continuously re-done as the network & threat landscape changes.

    AlienVault takes a different approach to SIEM. Join this webcast to learn how AlienVault Unified Security Management (USM) overcomes the most common SIEM challenges with:
    - Built-in capabilities like asset discovery, vulnerability assessment, intrusion detection, orchestrated incident response, and log management
    - Continuously updated correlation directives, vulnerability signatures, incident response guidance, and more
    - Fully integrated, real-time threat intelligence from the AlienVault Labs Security Research Team and the AlienVault Open Threat Exchange (OTX)
    - The ability to monitor on-premises and cloud environments including AWS and Azure, as well as cloud applications like Office 365
  • Standing in the Gap: Ransomware and the Role of the MSP
    Standing in the Gap: Ransomware and the Role of the MSP Garrett Gross, Director of Field Enablement, AlienVault Recorded: Sep 28 2017 33 mins
    Ransomware continues to be one of the most intrusive and pervasive threats today. With organizations of every size and vertical being a potential target, the opportunity exists for traditional MSPs to offer security-as-a-service to help customers protect, detect and respond to such threats.

    But, just how bad is the ransomware threat? It's worse than you may think and organizations are not doing enough to combat it.

    Hear from industry expert Nick Cavalancia and Garrett Gross, Director of Field Enablement, from AlienVault as they discuss:

    - The current state of the ransomware threat
    - Common ransomware scenarios, responses, and outcomes
    - The opportunity that exists for MSPs to stand in the gap
  • How Smart Security Teams Use Cyber Threat Intelligence
    How Smart Security Teams Use Cyber Threat Intelligence Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Sep 19 2017 58 mins
    As malware and ransomware become more commercialized, and the evolution of threats accelerates, it’s hard for organizations to keep up – even when they have multiple security products deployed. The latest SANS Cyber Threat Intelligence Survey showed that organizations using threat intelligence can gain dramatic improvements in visibility into threats, to enable a faster and more accurate response.

    Join AlienVault for this practical session to learn how smart security teams are integrating cyber threat intelligence into their day to day operations. You'll learn:
    - What threat intelligence is, and how it speeds threat detection and incident response
    - Key questions to help you evaluate threat intelligence sources and plan for integrating it into your operations
    - How AlienVault USM Anywhere integrates threat intelligence with other security capabilities to save valuable time
    - A demo of AlienVault USM Anywhere showing how threat intelligence adds valuable context to alarms
  • Tracking Access, Sharing and Administration of Files in SharePoint Online
    Tracking Access, Sharing and Administration of Files in SharePoint Online Sacha Dawes, Principal Product Marketing Manager, AlienVault. Randy Smith, CEO, Monterey Technology Group, Inc. Recorded: Sep 14 2017 83 mins
    Cloud-based file applications like SharePoint and OneDrive for business mean any document in your company is seconds away from being shared to the world with a unique URL that takes people directly to the file.

    Given this, how do you remain compliant and exert some level of control and accountability over your organization’s documents?

    In this webinar, Randy Smith of Ultimate Windows Security will zero in on how the UAL can answer these questions:

    -Who viewed this file?
    - Who was been downloading an abnormal amount of files?
    -When was this file downloaded and by whom?
    -…and more!

    Sacha Dawes of AlienVault will then show you how AlienVault Unified Security Management (USM) accomplishes all of this and more – such as enriching audit events with geo location based on the ClientIP field, and enabling alerting and reporting on SharePoint and OneDrive events.
  • AlienVault Partner Program: An Intro to AlienVault USM
    AlienVault Partner Program: An Intro to AlienVault USM Mike LaPeters, VP Global Channel Sales & Garrett Gross, Director of Field Enablement Recorded: Aug 17 2017 60 mins
    Watch our partner webcast to learn about our award-winning, easy-to-sell AlienVault® USM™ platform and the AlienVault Partner Program. SIEM solutions integrate and analyze the data produced by other security technologies but unfortunately most mid-market organizations don't have the resources and time to create and maintain the data correlation rules that make SIEM solutions useful. This offers an opportunity for you to capitalize on the benefits of AlienVault USM. Once your prospects understand our approach to unified security management, it becomes a very quick sales cycle.

    An intro to AlienVault USM
    How to identify prospects quickly with a simple set of questions
    How to sell the benefits of USM for easier and faster threat detection
  • How to Grow and Accelerate your Managed Security Business
    How to Grow and Accelerate your Managed Security Business Garrett Gross, Director Field of Enablement Recorded: Aug 17 2017 33 mins
    Security continues to be one of the top three IT concerns for SMB, mid-market and large enterprise customers. Security and Cloud continue to be the top two industry/market spend opportunities for the channel to invest in, according to CompTIA’s 2016 Annual IT Report. The opportunity for MSPs to become Managed Security Service Providers (MSSPs) is exploding – as is the opportunity for MSSPs to strengthen and expand their bottom line and market share. If you are interested in expanding your current MSP practice with security offerings, please watch this “How-to" discussion on building and growing an MSSP. We discuss best practices and illustrate what “best in class” looks like when it comes to:

    Common security challenges for the mid-market
    Considerations when selecting security vendor partners and ensuring a profitable practice
    Operational, financial, and process considerations that are key to a successful MSSP
    Essential skills critical to build successful MSSPs
    Solutions, business resources, tools, and programs available to enable the success of an MSSP
    In addition, we discuss some common mistakes MSSPs make and how to avoid those when building your practice.

Embed in website or blog