Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Get Powerful Threat Detection for the Cloud
    Get Powerful Threat Detection for the Cloud Danielle Russell, Sr. Product Marketing Manager Recorded: Mar 14 2017 48 mins
    Cloud computing promises advantages such as lower IT cost, increased agility and better support of business functions. However, cloud security concerns continue to top the list of barriers to cloud adoption.

    AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. USM Anywhere extends our award-winning approach to threat detection, Unified Security Management (USM), to the cloud. Whether you are looking to secure your AWS & Azure cloud environments, hybrid cloud or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.

    Viewers will learn how easy is to:
    - Discover all assets across your AWS, Azure and on-premises environments
    - Scan for vulnerabilities across cloud-based and physical assets
    - Detect emerging threats with real-time, integrated threat intelligence
    - Monitor asset logs including Azure Insights, AWS CloudTrail, S3 and ELB
    - Respond quickly to incidents & conduct thorough investigations

    About the Presenter:

    Danielle is a Senior Product Marketing Manager at AlienVault, responsible for product messaging and positioning, go-to-market strategy, and sales enablement. Prior to AlienVault, Danielle held a marketing leadership position with an IT software company in the telecommunications industry. Danielle earned a B.S. Life Sciences Communication from the University of Wisconsin.
  • How to Configure your OSSIM Installation: Network IDS and syslog Collection
    How to Configure your OSSIM Installation: Network IDS and syslog Collection Mark Allen VP, Technical Sales Recorded: Mar 7 2017 57 mins
    Network IDS (NIDS) plays an important role in OSSIM by detecting the presence of malware, network attacks, and other malicious network activity. By correlating this information with events collected from other devices, OSSIM helps you connect the dots to detect potential threats.

    Join us for this user training webcast where our OSSIM experts will walk through:

    Configuring OSSIM NIDS including configuring your network interfaces for monitoring
    Enabling an interface for NIDS monitoring using the web interface
    Forwarding syslog events from your networking devices; routers, switches and firewalls to OSSIM
    Enabling appropriate AlienVault plugins to parse network events

    Mark Allen has been engaged in information security and system administration for over 15 plus years. Mark has extensive experience taking complex concepts and making them easier to understand. He has held a variety of technical roles from help desk to litigation support to systems engineer and IT Director for accounting and law firms and large companies such as Epicor, Dell, & Solarwinds.
  • Detect Ransomware Before it’s Too Late with AlienVault USM
    Detect Ransomware Before it’s Too Late with AlienVault USM Jim Hansen, VP Product Marketing Recorded: Feb 21 2017 61 mins
    By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.

    You'll learn:

    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage

    Jim Hansen is the VP of Product Marketing for AlienVault. Jim is responsible for creating and executing the go-to-market strategy for AlienVault’s family of Unified Security Management products. With more than 15 years in the technology and security space, Jim brings a deep passion for creating great products that deliver compelling value for customers. Prior to joining AlienVault in May 2013, Jim led the strategy and delivery to market of products for Splunk, BigFix (now IBM), and others.
  • How to Use OTX with OSSIM
    How to Use OTX with OSSIM Jake Mosher, Sr. Product Marketing Manager Recorded: Jan 26 2017 55 mins
    The AlienVault® Open Threat Exchange™ is an open platform for security research that provides a mechanism for updating your OSSIM instance with the latest threat intelligence from AlienVault Labs or other security researchers. By connecting your OSSIM instance to OTX, you will continuously receive updates from the researchers you trust to help detect relevant Indicators of Compromise (IoC's) in your environment. Or, you can use OTX for your own security research and to share your results with the community.

    Join us for this OSSIM training session covering how to:

    Set up an OTX account and link it to your OSSIM instance
    View OTX Pulses to get context on threats
    See how the OSSIM platform alerts you of IoCs from OTX in your environment

    Jake is a Sr. Product Marketing Manager at AlienVault, responsible for go-to-market strategy, product messaging and positioning, and sales enablement. Prior to AlienVault, Jake held various Product Marketing and Strategy roles at Symantec Corporation. Jake has an MBA from the University of Texas at Austin and a BA in Business Economics from UCLA.
  • Malware Detection: How to Spot Infections Early with AlienVault USM
    Malware Detection: How to Spot Infections Early with AlienVault USM Don Shin, Technical Product Marketing & Brian Bledsoe, Sales Engineer Recorded: Dec 8 2016 63 mins
    While malware has been a thorn in the side of IT pros for years, some of the recent variants observed by the AlienVault Labs security research team, like Mirai, have turned our own Internet of Things (IoT) devices into weapons against us. Join us for a live demo to learn about the most common types of malware, and how you can detect infections quickly with AlienVault USM.

    In this demo, we'll cover:
    Common types of malware (viruses, worms, Trojans/RATs, rootkits, and more)
    How new variants propagate while evading preventative security measures
    Signature versus anomaly detection (and why both are important)
    What to do when you detect malware activity on your network
    How USM can help identify malware infections so you can take action quickly

    Don has over 20 years of experience in product management and marketing, focused around the networking, security and semiconductors industries. His background includes roles with Ixia, Freescale and AMD, among other technology companies. At AlienVault, Don enjoys developing technical resources to help customers understand how to best leverage the AlienVault platform to solve their security challenges.

    Brian Bledsoe is part of AlienVault's Sales Engineering group. Brian has worked in technology consulting and sales for the past 18 years. His diverse background in hardware and software sales and deployment enables him to help organizations of all sizes reach their technology goals.
  • Brute Force Attacks: Keeping the Bots at Bay with AlienVault USM
    Brute Force Attacks: Keeping the Bots at Bay with AlienVault USM Jake Mosher & Brian Bledsoe Recorded: Nov 10 2016 59 mins
    Brute force attacks are relatively simple for attackers to implement and they can wreak havoc on your organization if you don’t detect them and shut them down quickly. Join us for a live demo, where we’ll demonstrate a brute force attack (simulated, of course!) and show how AlienVault USM can help you detect and investigate these types of attacks.
    You'll learn:
    How attackers can use brute force attacks to gain access to your network
    Measures you can take to better secure your environment to detect and prevent these attacks
    How AlienVault USM alerts you immediately of brute force attack attempts
    How to use AlienVault USM to investigate an attack and identify compromised assets
  • What You Need to Know about Ransomware and HIPAA Compliance
    What You Need to Know about Ransomware and HIPAA Compliance Chris Hendricks, Delta Risk & Garrett Gross, AlienVault Recorded: Oct 27 2016 49 mins
    The healthcare industry is one of the top targets for ransomware attacks, and the US Dept. of Health and Human Services Office for Civil Rights (OCR) has now stated that ransomware incidents should be treated the same way as other data breaches under the Health Insurance Portability and Accountability Act (HIPAA) unless there is substantial evidence to the contrary.

    In this webinar, we'll discuss:
    -Why the OCR guidelines are important
    -Why attackers are going after healthcare firms
    -How to detect a ransomware attack
    -Steps you can take to protect your organization
  • Transitioning from Managed Services to Managed Security: One Partner’s Success
    Transitioning from Managed Services to Managed Security: One Partner’s Success Garrett Gross & Tim Foley Recorded: Oct 25 2016 63 mins
    Over the past 10 years, IT managed services have become universally available and moving from a luxury to more of a must-have. Building on this notion of IT as a service, more companies are recognizing the need for a comprehensive security posture but may lack the ability or desire to manage in-house. This leaves the door open to whom will provide this security as a service.

    Join us as we explore one partner’s journey from managed services to managed security. Dataprise has been a leading provider of IT managed services for over a decade and now offers a complete managed security service.

    During this webcast, we’ll get an inside look into:

    The basics of becoming a MSSP
    Tools MSSPs use to build their service
    Common challenges in creating a managed security service
  • How to Simplify PCI DSS Compliance with AlienVault USM
    How to Simplify PCI DSS Compliance with AlienVault USM Don Shin & Victor Obando Recorded: Oct 13 2016 56 mins
    Demonstrating compliance with the new PCI DSS 3.2 is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks, along with the need to access data and reports from many different systems and tools. Join us for this technical demo to learn how AlienVault can simplify PCI DSS compliance and improve your overall security posture.

    We'll cover:

    Common PCI DSS compliance challenges
    Questions to ask as you plan and prepare for an audit
    Core capabilities needed to demonstrate compliance
    PCI DSS 3.2 reporting
    How AlienVault Unified Security Management simplifies compliance and threat detection
  • The Challenges of Threat Detection Today
    The Challenges of Threat Detection Today Brian Gillooly and Roger Thorton Recorded: Sep 19 2016 2 mins
    In this interview with Dark Reading at Blackhat 2016, Brian Gillooly and Roger Thorton discuss behavioral monitoring and many of the challenges that those in the security community face today.

Embed in website or blog