Hi [[ session.user.profile.firstName ]]

Security Analytics and Compliance

  • Date
  • Rating
  • Views
  • Why you need to adopt an open architecture to secure your business
    Why you need to adopt an open architecture to secure your business Paul Brettle, ArcSight Architect, HPE Security Recorded: May 16 2017 45 mins
    With more security threats than ever before, organizations are looking to new ways to secure, manage and monitor their environment. Data sources are increasing and far higher volumes need to be sent to multiple destinations for real-time analytics and archiving. Traditional closed architectures are becoming an impediment to the growth and needs of security operations. Organizations today are, therefore, looking to adopt modern open standards and architectures.

    By embracing new, innovative and open standards, security organizations can look to solve complex problems today and equip themselves for the future. Explore how you can expand and grow your capabilities with simplicity, and more importantly in a predictable and cost-effective way.

    This webinar will cover the evolving approach to help you solve security issues with modern open architecture solutions. Learn why integration is key and where ArcSight comes in.
  • 6 Lessons for Cyber Threat Hunters
    6 Lessons for Cyber Threat Hunters Mary Karnes Writz and Alona Nadler, HPE Recorded: Apr 27 2017 46 mins
    Hunt teams are relative newcomers within the security operations domain. Many companies say they are doing “hunt” but when we dig deeper, we find the capabilities are ad hoc, with no measurable indicators of success nor formal organizational support. That means hunt teams are growing in popularity and use, but there is no “gold standard” yet for how they work. With increasing scarcity of skilled resources in cyber security and lack of efficient tools, it is challenging to build successful hunt practices inside an organization.

    Join this webcast to:
    •Gain a clear understanding of the current challenges of hunt and investigation procedures
    •Learn how to build “hunt” capabilities that search for security breaches
    •Increase speed, simplicity and effectiveness across the entire workflow of hunt and investigation with ArcSight’s new solution

    Mary Writz is a seasoned professional with more than 15 years of experience in cyber security and, under her services leadership role, her team filed 9 patents and built a successful hunt practice with a focus on Big Data, machine learning and visualization. Alona Nadler is a senior product manager for ArcSight with a background in Big Data analytics platform.
  • Get More Out of Your ArcSight Environment
    Get More Out of Your ArcSight Environment Steve Riley, Manager Technical Marketing, HPE Recorded: Apr 5 2017 32 mins
    Learn more about ArcSight workshops coming to a city near you. Understand what’s new with ArcSight, and see some of the dynamic hands-on labs we will be running including topics such as discovering multi-stage attacks using your ArcSight ESM. Register now to see what the buzz is all about.
  • Security Automation for Real-Time Detection and Response
    Security Automation for Real-Time Detection and Response Nathan Burke, VP of Marketing, Hexadite and Steven Forsyth, RnD Manager, HPE Security ArcSight Recorded: Dec 20 2016 42 mins
    The effectiveness of a security system depends on how quickly it detects and responds to threats. Is your security system able to tackle security challenges in near real time, while reducing false positives so analysts can focus on critical events and Indicators of Compromise (IOC’s)?

    HPE Security ArcSight ingests large volumes of security events and correlates against IOC’s in real time to identify potential threats. Hexadite Automated Incident Response Solution (AIRS) takes these security alerts in real time and performs investigation and remediation at scale.

    Learn how the combination of these two systems gives you the ability to:
    • Gain visibility across the entire IT footprint
    • Detect security threats in real-time
    • Automate incident investigation
    • Perform automated or semi-automated remediation actions
  • Beat hackers through visibility, precision and quick response
    Beat hackers through visibility, precision and quick response Travis Grandpre, HPE Director of ArcSight Product Marketing and Justin Kelso, HPE ArcSight Recorded: Oct 18 2016 40 mins
    As organizations scale, growing in size across physical and virtual borders, they rely on intelligent security operations to maintain the integrity of their security posture. Critical to building Intelligent Security Operations is the ability to gain visibility across boundaries, which means insight into not just networks and IT, but also operational data and IoT devices. This kind of visibility requires managing and maintaining the integrity of millions of events per second that are required to provide credible insights powering the Intelligent Security Operations.

    But visibility without context can become a distraction to resource constrained security operations’ intent on focusing on what matters and remediating threats. Providing context to the collected data through real-time correlation and analytics generated alerts helps to prioritize security analyst tasks, optimizing resources and saving time. Machine learning enrichment of data through the addition of user, entity and security context, helps security operations teams to run efficiently.

    These capabilities together empower you to track alerts and investigate threats at the speed of the attacker.

    Learn how ArcSight plans to lay the foundation for intelligent security operations by providing an open architecture to leverage your data for better detection, investigation and response to threats, while maintaining integrity.
  • SIEM is dead. Long Live the SIEM!
    SIEM is dead. Long Live the SIEM! Michael Mackrill, Security & Intelligence Operations Consulting Recorded: Feb 23 2016 16 mins
    SIEMs have been around for years and many companies are wondering if they actually got a return on their investment. Meanwhile, multiple vendors are claiming that their latest tool can do everything that a SIEM can and more! Can the SIEM survive?

    We believe that the SIEM is not dead. SIEM is evolving. It must be remembered though that a SIEM is a living, breathing creature that must be cared, fed and interacted with in order to thrive. SIEMs have gotten more robust and can be used to interact with other security programs in ways that they couldn’t a few years ago. Companies need to utilize the SIEM as their central pane of glass to see the threats to their environment and use integration with other tools to help ensure the security of their electronic data.
  • 6th Annual Ponemon Cost of Cyber Crime Global Study Results
    6th Annual Ponemon Cost of Cyber Crime Global Study Results Dr. Larry Ponemon, chairman and founder of the Ponemon Institute Recorded: Dec 10 2015 45 mins
    On average, the 58 United States companies participating in the 2015 Cost of Cyber Crime study lost $15 million due to cyber crime, an increase of 19 percent from $12.7 million in last year's study. And other countries are close behind. These are results from the recently completed Ponemon Institute 2015 Cost of Cyber Crime study. You know the risks, but you need the data to plan your defenses and demonstrate the cost of inaction.

    For a fuller look at these and other findings from the institute’s study, join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, to learn:

    -What cyber crimes are most common and most costly
    -The hidden internal and external costs you incur
    -What security defenses are most effective in reducing losses
    -How businesses with a strong security posture drive down costs
  • HPE Security ArcSight Analytics
    HPE Security ArcSight Analytics Justin Kelso, Regional Product Management Director, G.R “Chip”- Mesec Product Manager, Tim Wenzlau Product Manager Recorded: Oct 16 2015 53 mins
    Analytics, as they pertain to the security space, are a new horizon for most. With the universal rise in interest in applying analytics to security data and use cases many organizations are overwhelmed by the difficulties surrounding those technologies. Whether it is the cost and rarity of expert manpower, scale and speed of the data, or the immaturity of many of the technologies; many organizations need help making sense of this new frontier and how and where to apply it to their data sets. HPE Security ArcSight has taken the lead in making this emerging technology more readily consumable through the targeted use of analytics for particular datasets and use cases. In this vein HPE Security ArcSight has launched two security analytics offerings: User Behavior Analytics, and DNS Malware Analytics. Please join us in this webcast to learn more about these technologies and how they are making big impacts for security organizations of all sizes.

    Speaker #1
    Justin Kelso
    Regional Product Management Director, AMS, HPE Security ArcSight

    Speaker #2
    G.R “Chip” Mesec
    Product Manager ,DNS Malware Analytics, HPE Security ArcSight

    Speaker #3
    Tim Wenzlau
    Product Manager, User Behavior Analytics, HPE Security ArcSight
  • Adapting the ArcSight case user interface to your business
    Adapting the ArcSight case user interface to your business Sean Clapper, HP ArcSight, Security Intelligence & Operations Consulting Recorded: Aug 6 2015 54 mins
    Adapting the ArcSight case user interface to your business and using it to collect meaningful metrics.

    An insight on maximizing ArcSights case and metrics capabilities. Designing an intuitive custom case user interface tailored to your business. Optimize case management to promote cross collaboration, escalation and organization. Collecting and using case data to drive meaningful operational metrics.
  • Simplifying Compliance and Forensic Requirements with HP ArcSight Logger
    Simplifying Compliance and Forensic Requirements with HP ArcSight Logger Dave Shackleford, SANS Analyst and Sri Karnam, HP ArcSight Product Marking Manager Recorded: Apr 24 2015 61 mins
    Simplifying Compliance and Forensic Requirements with HP ArcSight Logger

    The ever-increasing amount of logging output that IT organizations need to retain to have an accurate picture of what happened in their systems-and when-is a classic "big data" problem. Data categorization and normalization are imperative when sifting through a mass of data that can exceed a petabyte, while eliminating false negatives can aid a forensic investigation. This webcast focuses on HP ArcSight Logger 6, featuring a review of the product by SANS senior analyst Dave Shackleford.

    Sign up for this webcast and be among the first to receive an advance copy of a SANS whitepaper discussing Dave's review of HP ArcSight Logger 6.

Embed in website or blog