Hi [[ session.user.profile.firstName ]]

AlienVault

  • Date
  • Rating
  • Views
  • AlienVault Partner Program: An Intro to AlienVault USM
    AlienVault Partner Program: An Intro to AlienVault USM Mike LaPeters, VP Global Channel Sales & Garrett Gross, Director of Field Enablement Recorded: Aug 17 2017 60 mins
    Watch our partner webcast to learn about our award-winning, easy-to-sell AlienVault® USM™ platform and the AlienVault Partner Program. SIEM solutions integrate and analyze the data produced by other security technologies but unfortunately most mid-market organizations don't have the resources and time to create and maintain the data correlation rules that make SIEM solutions useful. This offers an opportunity for you to capitalize on the benefits of AlienVault USM. Once your prospects understand our approach to unified security management, it becomes a very quick sales cycle.

    An intro to AlienVault USM
    How to identify prospects quickly with a simple set of questions
    How to sell the benefits of USM for easier and faster threat detection
  • How to Grow and Accelerate your Managed Security Business
    How to Grow and Accelerate your Managed Security Business Garrett Gross, Director Field of Enablement Recorded: Aug 17 2017 33 mins
    Security continues to be one of the top three IT concerns for SMB, mid-market and large enterprise customers. Security and Cloud continue to be the top two industry/market spend opportunities for the channel to invest in, according to CompTIA’s 2016 Annual IT Report. The opportunity for MSPs to become Managed Security Service Providers (MSSPs) is exploding – as is the opportunity for MSSPs to strengthen and expand their bottom line and market share. If you are interested in expanding your current MSP practice with security offerings, please watch this “How-to" discussion on building and growing an MSSP. We discuss best practices and illustrate what “best in class” looks like when it comes to:

    Common security challenges for the mid-market
    Considerations when selecting security vendor partners and ensuring a profitable practice
    Operational, financial, and process considerations that are key to a successful MSSP
    Essential skills critical to build successful MSSPs
    Solutions, business resources, tools, and programs available to enable the success of an MSSP
    In addition, we discuss some common mistakes MSSPs make and how to avoid those when building your practice.
  • Threat Intelligence: The MSP’s Secret Weapon
    Threat Intelligence: The MSP’s Secret Weapon Garrett Gross, Director Field of Enablement Recorded: Aug 17 2017 34 mins
    One of the biggest challenges when creating a managed security offering is developing threat intelligence and instrumenting it with existing security controls. This challenge is magnified exponentially as a company's client base grows and needs evolve.

    In this session, you’ll learn about the benefits of building your service offering around a unified security platform and how integrated threat intelligence accelerates the detection process. We’ll also recommend how MSSPs can leverage open threat sharing communities and custom intelligence development to maximize revenue and differentiate themselves from the competition.

    Attend this Webchat and you will also learn:

    The importance of developing a comprehensive understanding of not only the different data types collected for analysis, but also the ways in which the data types interact with each other
    The need for an intelligent approach to identifying the latest threats to achieve the broadest view of threat vectors, attacker techniques and effective defenses
    Why the use of coordinated rule set updates is key to maximizing the effectiveness and efficiency of threat intelligence
    and to ensuring that your clients are protected no matter how (and how often) their business grows and needs change
  • A Step-By-Step Guide to Building a Profitable Security Practice
    A Step-By-Step Guide to Building a Profitable Security Practice Garrett Gross, Director of Field Enablement Recorded: Aug 17 2017 33 mins
    As your clients work on their 2017 budgets, they will be paying a lot of attention to security. It’s probably the top priority for most of them. Threat profiles have expanded, new attack vectors have emerged and legacy systems simply can’t keep up. It’s not nearly enough to sell some security software or deploy a few firewalls. For IT service providers, this presents both a challenge and an opportunity. On one hand, your customers need new security solutions that you haven’t delivered before. But on the other hand, your customers want to pay you for services that will increase both your revenues and profits.

    Given that your customers will want their security challenges addressed immediately, you need to rapidly develop the skills and services required to get the job done.

    In this fast-paced session, join experts from AlienVault and MSPmentor to outline a step-by-step process you can follow to build a thriving, profitable security practice. Key topics to be addressed include:

    The five vital technology tools you need to run an effective security practice
    A detailed profile of the target customers most likely to adopt IT services to help accelerate your sales process
    A map for building and pricing your security service packages to meet customers’ needs (and for building your profits)
  • Adding the S to MSP: Making Money in a Competitive Market
    Adding the S to MSP: Making Money in a Competitive Market Mike LaPeters, VP Global Channel Sales & Mike Calonica, VP American Sales Recorded: Aug 17 2017 35 mins
    Anybody can deliver technology, but these days MSPs also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.


    In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:

    Current threats and how they are evolving
    Comprehensive threat protection for the cloud
    Unified security for detecting threats and responding to incidents
  • Use of Managed Security Service Providers (MSSPs) - Benefits, Challenges and Tre
    Use of Managed Security Service Providers (MSSPs) - Benefits, Challenges and Tre Garrett Gross Director, Field Enablement Recorded: Aug 17 2017 55 mins
    Research shows that about half of organizations deploy a mix of in-house and outsourced IT security. Companies turn to outsourced and managed security services providers to alleviate the pressures they face, such as assessing and remediating against new types of attacks, protecting their organization against data theft, and addressing skills shortages and filling resource gaps. The 2017 Spotlight Report covering MSSP usage revealed the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs.

    In this session you'll learn about key findings from this survey including:

    The predominant driver for organizations to consider managed security services
    The most critical capabilities organizations look for in MSSPs
    The most requested security services offered by MSSPs
    Key benefits respondents have achieved by partnering with an MSSP

    Whether you are evaluating using an MSSP, or are an MSSP yourself, join us to gain valuable insights into how MSSPs are helping their clients. We'll also provide an overview of how our report sponsor, AlienVault, enables the threat detection capabilities of many MSSP's with their unified threat detection platform, AlienVault USM
  • How to Simplify PCI DSS Compliance with a Unified Approach to Security
    How to Simplify PCI DSS Compliance with a Unified Approach to Security Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Aug 15 2017 59 mins
    Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of manual and labor-intensive tasks in order to access the necessary data and reports from many different systems and tools. And, even after compliance is achieved, many teams struggle to maintain the processes and reporting between audits. Join us for this webcast covering what capabilities are needed for PCI DSS compliance, and how to simplify implementation with a unified security toolset like AlienVault Unified Security Management.

    We'll cover:
    - What core security capabilities you need to demonstrate compliance
    - The top challenges in meeting and maintaining compliance with PCI DSS
    - Best practices to help you plan and prepare for an audit
    - How AlienVault Unified Security Management simplifies threat detection, incident response, and compliance
  • Stop Malware in its Tracks with Security Orchestration
    Stop Malware in its Tracks with Security Orchestration Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Jul 18 2017 60 mins
    Security professionals are locked in a vicious cycle, with malicious actors spinning out new threats daily and security teams racing to keep up. Reducing the time to detect and defend against malware is critical. What if you could identify and block threats earlier? With the security orchestration capabilities in AlienVault USM Anywhere, you can.

    USM Anywhere is a security monitoring platform that unifies security visibility across your cloud and on-premises assets. New AlienApps™ extend the capabilities of USM Anywhere by interacting with other IT security and IT operations products like Cisco Umbrella, Palo Alto Networks and Service Now to centralize the orchestration of incident response activities.

    Join us for this webcast to learn:

    - What security orchestration means, and why it has become essential for fast, efficient incident response
    - How USM Anywhere can automate incident response activities, saving valuable time
    - How AlienApps help you reduce the friction of integrating and orchestrating across your security point solutions

    About the Presenter:
    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space.
  • Petya Variant Ransomware: How to Detect the Vulnerability and Exploits
    Petya Variant Ransomware: How to Detect the Vulnerability and Exploits Sacha Dawes, Principal Product Marketing Manager. Chris Doman, Threat Engineer Recorded: Jun 27 2017 32 mins
    As you've likely heard, a variant of the Petya malware is spreading rapidly and is known to have affected organizations worldwide, regardless of size. This variant of Petya follows a similar attack method to last month's WannaCry ransomware, though it uses the PsExec and WMI services for distribution.

    Once compromised, the ransomware will overwrite the Master Boot Record (MBR), encrypt individual files that match a list of file extensions (including documents, archives, and more), and after a reboot of the system will present the user a message requesting a ransom in Bitcoin to decrypt the system. As with WannaCry, the ETERNALBLUE exploit toolkit (which was released by the Shadow Brokers group in April 2017) is suspected to be a key part of the attack.

    Join us for a 30-minute technical webcast to learn more about this Petya variant, and how the unified security controls in AlienVault USM Anywhere can help you quickly identify vulnerable systems and attacks.

    You'll learn:

    What the AlienVault Labs security research team has uncovered about this threat
    How to scan your environment (cloud and on-premises) for critical vulnerabilities with AlienVault USM
    How AlienVault USM leverages threat intelligence for early detection of threats like this variant of Petya
    How built-in response orchestration capabilities in AlienVault USM can stop the threat from spreading
  • The Shadow Brokers: How to Prepare for What’s Next After WannaCry
    The Shadow Brokers: How to Prepare for What’s Next After WannaCry Peter Ewane, AlienVault Security Researcher Recorded: Jun 20 2017 46 mins
    The Shadow Brokers are a hacking group who have published several leaks containing hacking tools from the National Security Agency (NSA), resulting in high profile malware attacks like the recent WannaCry ransomware attacks. So, what can we expect next as a result of the leaked hacking tools? The AlienVault Labs security research team has been analyzing the leaked information in an effort to understand potential attack vectors, and create the necessary threat intelligence updates for AlienVault products.

    Join us for a live, technical webinar on Tuesday, June 20th to learn more about the Shadow Brokers and what the AlienVault Labs team has uncovered about potential threats posed by the leaked tools.

    You’ll learn:
    A brief history of Shadow Brokers activity
    Analysis of the leaked hacking tools and exploits and their potential impact
    How to use information related to Shadow Brokers available in the Open Threat Exchange
    An overview of threat intelligence updates made to AlienVault products

Embed in website or blog