Hi [[ session.user.profile.firstName ]]

AlienVault

  • Date
  • Rating
  • Views
  • Detect Ransomware Before it’s Too Late with AlienVault USM Anywhere
    Detect Ransomware Before it’s Too Late with AlienVault USM Anywhere Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Jun 13 2017 54 mins
    By now you've probably heard about ransomware like CryptoLocker, which encrypts your data and demands payment to unlock it. These threats are typically delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server they encrypt files throughout your network that can only be unlocked with a key from the attacker. Spotting infections quickly can limit the damage.

    AlienVault USM Anywhere uses several built-in security controls working in unison to detect ransomware. Join us for a live demo that will show you how USM Anywhere detects these threats quickly, saving you valuable clean up time and limiting potential damage from the attack.

    You'll learn:

    How AlienVault USM Anywhere detects ransomware
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Steps you should take to stop the threat and limit the damage
  • Malware Detection - How to Spot Infections Early with AlienVault USM Anywhere
    Malware Detection - How to Spot Infections Early with AlienVault USM Anywhere Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: May 16 2017 53 mins
    Malware has been a thorn in the side of IT pros for years, and will continue to be for years to come as new strains and variants evolve. The impact of malware to your business can be huge, as was demonstrated last year by the Mirai botnet, one of the largest and most disruptive distributed denial of service (DDoS) attacks of 2016. Join us for a webcast covering the essentials of malware detection, along with a demo of how to detect malware with AlienVault USM Anywhere.

    In the webcast, you'll learn:

    Common types of malware and the challenges of detecting them
    Why you need both signature and anomaly detection to protect against malware
    How USM Anywhere can alert you of malware infections so you can take action quickly
    What to do when you detect malware activity on your network

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager
    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha currently lives in Seattle, though soon moving to Austin, TX where he is based.
  • WannaCry Ransomware: How to Detect the Vulnerability and Exploits
    WannaCry Ransomware: How to Detect the Vulnerability and Exploits Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: May 14 2017 57 mins
    As you've likely heard, WannaCry is a new ransomware variant that takes advantage of a vulnerability in the Windows operating system (MS17-010) to encrypt the infected computer’s data and hold it hostage until a ransom is paid. In addition, the vulnerability enables WannaCry to quickly spread to other machines in the same environment – all without any human intervention. While Microsoft issued a patched to the vulnerability in March 2017, millions of computers have not been updated and remain susceptible to the attack.
    Join us for a technical webcast to learn more about WannaCry, and how the unified security controls in AlienVault USM Anywhere can help you quickly identify vulnerable systems and attacks.
    What the AlienVault Labs security research team has uncovered about this threat
    How to scan your environment (cloud and on-premises) for the vulnerability with USM Anywhere
    How USM Anywhere leverages threat intelligence for early detection of threats like WannaCry
    How built-in response orchestration capabilities in USM Anywhere can stop the threat from spreading
  • How to Use OTX with AlienVault OSSIM
    How to Use OTX with AlienVault OSSIM Skylar Talley, Product Manager Recorded: Apr 26 2017 42 mins
    The AlienVault® Open Threat Exchange™ is an open platform for security research that provides a mechanism for updating your OSSIM instance with the latest threat intelligence from AlienVault Labs or other security researchers. By connecting your OSSIM instance to OTX, you will continuously receive updates from the researchers you trust to help detect relevant Indicators of Compromise (IoC's) in your environment. Or, you can use OTX for your own security research and to share your results with the community.

    Join us for this OSSIM training session covering how to:

    Set up an OTX account and link it to your OSSIM instance
    View OTX Pulses to get context on threats
    See how the OSSIM platform alerts you of IoCs from OTX in your environment
    Hosted By
    Skylar Talley
    Product Manager
    Skylar joined AlienVault in January of 2017 as a Product Manger for USM Appliance and OSSIM. Before AlienVault, Skylar was a Product Manager at SpareFoot, a marketplace for self storage, and Waldo Photos, a seed stage photo sharing startup. Since joining the product team at AlienVault, Skylar has been focused on coming up to speed on AlienVault's diverse user base and all of the different ways that the USM Appliance product helps organizations address their security needs. Moving forward, he'll be responsible for all development work on USM Appliance and would love to talk to you about your experience with the product!
  • Shorter, Faster Threat Detection and Response with AlienVault and Cisco
    Shorter, Faster Threat Detection and Response with AlienVault and Cisco Jeff Olen, Product Manager, AlienVault Recorded: Apr 24 2017 38 mins
    Threats continue to increase in sophistication and frequency, your environment is getting more complex with the addition of cloud infrastructure, and your siloed security tools leave you struggling to get a unified view of your security posture. How can you reduce the time to detect and defend against malware in today’s environment? It’s not enough to wait for malware to reach your network or endpoints before you try to detect and stop it. What if you could identify and block threats earlier? With Cisco Umbrella and AlienVault USM Anywhere, you can.

    Join us for a 45-minute webcast to learn how you can quickly improve your threat detection and response time with AlienVault USM Anywhere and Cisco Umbrella. During this session, you’ll learn about each product and see how the integration enables you to:

    Focus on threat response and not writing complex security analytics rules
    Get prioritized, contextual alarms leveraging threat intelligence from both Cisco and AlienVault
    Automate policy enforcement between the platforms for rapid response
    Enhance threat visibility and reduce mean time to detection & response

    Hosted By Jeff Olen, Product Manager
    Jeff joined the AlienVault product management team in 2016, with a primary focus on the USM Anywhere platform. He has more than 15 years of experience managing award-winning software products in a variety of industries including security, education, legal and digital media.
  • How to Detect and Investigate Brute Force Attacks with AlienVault USM Anywhere
    How to Detect and Investigate Brute Force Attacks with AlienVault USM Anywhere Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Apr 18 2017 49 mins
    A brute force attack is one of the more common types of attack that malicious actors use to try and gain access to your IT servers, applications and data. In theory, a brute-force attack can be used to attempt to decrypt any encrypted data (except for data encrypted in an information-theoretically secure manner). These attacks are relatively simple for attackers to implement and they can wreak havoc on your organization when successful. However, many IT security teams may not be aware that they are at risk from these attacks, or what to do about them.

    Join us for a live demo where we'll demonstrate how the AlienVault Unified Security Management (USM) approach, delivered as a SaaS solution with our USM Anywhere offering, can help you detect and investigate these types of attacks.

    You'll learn:

    - How attackers can use brute force attacks to gain access to your network
    - Steps you can take BEFORE an attack to identify systems or applications that may be at greater risk
    - How USM Anywhere can alert you immediately of brute force attacks targeting your cloud, hybrid cloud and on-premises environments
    - How to use USM Anywhere to investigate brute force attacks and identify compromised assets

    About the Presenter:
    Sacha Dawes is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space.
  • Get Powerful Threat Detection for the Cloud
    Get Powerful Threat Detection for the Cloud Danielle Russell, Sr. Product Marketing Manager Recorded: Mar 14 2017 48 mins
    Cloud computing promises advantages such as lower IT cost, increased agility and better support of business functions. However, cloud security concerns continue to top the list of barriers to cloud adoption.

    AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. USM Anywhere extends our award-winning approach to threat detection, Unified Security Management (USM), to the cloud. Whether you are looking to secure your AWS & Azure cloud environments, hybrid cloud or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.

    Viewers will learn how easy is to:
    - Discover all assets across your AWS, Azure and on-premises environments
    - Scan for vulnerabilities across cloud-based and physical assets
    - Detect emerging threats with real-time, integrated threat intelligence
    - Monitor asset logs including Azure Insights, AWS CloudTrail, S3 and ELB
    - Respond quickly to incidents & conduct thorough investigations

    About the Presenter:

    Danielle is a Senior Product Marketing Manager at AlienVault, responsible for product messaging and positioning, go-to-market strategy, and sales enablement. Prior to AlienVault, Danielle held a marketing leadership position with an IT software company in the telecommunications industry. Danielle earned a B.S. Life Sciences Communication from the University of Wisconsin.
  • OSSIM Training: How to Get the Most Out of Policies & Actions
    OSSIM Training: How to Get the Most Out of Policies & Actions Javvad Malik, Community Manager/ Security Evangelist Recorded: Mar 13 2017 58 mins
    One of the most valuable capabilities of OSSIM is the ability to define policies to tune event processing and trigger actions based on certain types of events. This special user training webcast will walk you through how to use policies and actions to:

    Filter unnecessary events and false positives
    Trigger e-mail notifications for critical events
    Improve performance of OSSIM
    Turn security policies into security practice
  • How to Configure your OSSIM Installation: Network IDS and syslog Collection
    How to Configure your OSSIM Installation: Network IDS and syslog Collection Mark Allen VP, Technical Sales Recorded: Mar 7 2017 57 mins
    Network IDS (NIDS) plays an important role in OSSIM by detecting the presence of malware, network attacks, and other malicious network activity. By correlating this information with events collected from other devices, OSSIM helps you connect the dots to detect potential threats.

    Join us for this user training webcast where our OSSIM experts will walk through:

    Configuring OSSIM NIDS including configuring your network interfaces for monitoring
    Enabling an interface for NIDS monitoring using the web interface
    Forwarding syslog events from your networking devices; routers, switches and firewalls to OSSIM
    Enabling appropriate AlienVault plugins to parse network events


    Mark Allen has been engaged in information security and system administration for over 15 plus years. Mark has extensive experience taking complex concepts and making them easier to understand. He has held a variety of technical roles from help desk to litigation support to systems engineer and IT Director for accounting and law firms and large companies such as Epicor, Dell, & Solarwinds.
  • Detect Ransomware Before it’s Too Late with AlienVault USM
    Detect Ransomware Before it’s Too Late with AlienVault USM Jim Hansen, VP Product Marketing Recorded: Feb 21 2017 61 mins
    By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.

    You'll learn:

    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage

    Jim Hansen is the VP of Product Marketing for AlienVault. Jim is responsible for creating and executing the go-to-market strategy for AlienVault’s family of Unified Security Management products. With more than 15 years in the technology and security space, Jim brings a deep passion for creating great products that deliver compelling value for customers. Prior to joining AlienVault in May 2013, Jim led the strategy and delivery to market of products for Splunk, BigFix (now IBM), and others.

Embed in website or blog