Hi [[ session.user.profile.firstName ]]

HPE Enterprise Security Products

  • Date
  • Rating
  • Views
  • 6 Lessons for Cyber Threat Hunters
    6 Lessons for Cyber Threat Hunters Mary Karnes Writz and Alona Nadler, HPE Recorded: Apr 27 2017 46 mins
    Hunt teams are relative newcomers within the security operations domain. Many companies say they are doing “hunt” but when we dig deeper, we find the capabilities are ad hoc, with no measurable indicators of success nor formal organizational support. That means hunt teams are growing in popularity and use, but there is no “gold standard” yet for how they work. With increasing scarcity of skilled resources in cyber security and lack of efficient tools, it is challenging to build successful hunt practices inside an organization.

    Join this webcast to:
    •Gain a clear understanding of the current challenges of hunt and investigation procedures
    •Learn how to build “hunt” capabilities that search for security breaches
    •Increase speed, simplicity and effectiveness across the entire workflow of hunt and investigation with ArcSight’s new solution

    Mary Writz is a seasoned professional with more than 15 years of experience in cyber security and, under her services leadership role, her team filed 9 patents and built a successful hunt practice with a focus on Big Data, machine learning and visualization. Alona Nadler is a senior product manager for ArcSight with a background in Big Data analytics platform.
  • Hunting for Security Threats: Best Practices
    Hunting for Security Threats: Best Practices Mary Karnes Writz, Head of Applied Innovation, HPE Security Professional Services Recorded: Apr 4 2017 51 mins
    Have you been planning on establishing hunting capabilities but just can’t seem to get it started? Check out this webinar to gain a clearer understanding on hunt teams and their effectiveness.

    This webinar will deep dive into successes and most importantly lessons learned from Hewlett Packard Enterprise’s own journey with leveraging emerging capabilities and hunting techniques with customers. From solving data ingestion challenges to detecting bank heists, learn from HPE’s years of building hunt teams.

    Get a broader view of the ecosystem of breach hunting technology so you can execute your own successful hunt strategy.
  • How to automate security investigation and remediation for real time response
    How to automate security investigation and remediation for real time response Barak Klinghofer, Co-Founder and CPO, Hexadite and Steven Forsyth, RnD Manager, HPE Security ArcSight Recorded: Mar 29 2017 49 mins
    The effectiveness of a security system depends on how quickly it detects and responds to threats. Is your security system able to tackle security challenges in near real time, while reducing false positives so analysts can focus on critical events and Indicators of Compromise (IOCs)?

    HPE Security ArcSight ingests large volumes of security events and correlates against IOCs in real time to identify potential threats. Hexadite Automated Incident Response Solution (AIRS) takes these security alerts in real time and performs investigation and remediation at scale.

    Learn how the combination of these two systems gives you the ability to:
    • Gain visibility across the entire IT footprint
    • Detect security threats in real-time
    • Automate incident investigation
    • Perform automated or semi-automated remediation actions
  • Key Findings from the 2017 State of Security Operations Report
    Key Findings from the 2017 State of Security Operations Report Kerry Matre, Director, Security Portfolio Marketing, HPE Recorded: Jan 25 2017 34 mins
    Taking your Security Operations Center (SOC) to the next level has never been more critical. Organizations around the globe are investing heavily in cyber defense capabilities to protect their most critical assets. Don’t miss this webinar to explore key findings from the 2017 State of Security Operations report on cyber defense organizations’ capabilities and maturity.

    Learn what the most successful SOCs in the world are doing right, regional trends in the maturity of cyber defense capabilities and best practices to apply within your organization. Get the latest information on:

    • Opportunities in automation
    • Threat hunt teams and whether they are working
    • New compliance regulations impacting SOCs

    Register now and gain insight on the next steps your business can take to mature security operations in 2017.
  • Why you need to adopt an open architecture to secure your business
    Why you need to adopt an open architecture to secure your business Paul Brettle, ArcSight Architect, HPE Security Recorded: Jan 24 2017 45 mins
    With more security threats than ever before, organizations are looking to new ways to secure, manage and monitor their environments. The cost and scope associated with this issue are huge. Security environments have traditionally been closed, sealed and ‘secured’ by nature; but as organizations look to solve problems, they are embracing the idea of adopting open standards and architectures.

    By embracing new, innovative and open standards, security organizations can look to solve complex problems in a modern new way. Explore how you can expand and grow your capabilities with simplicity, and more importantly in a predictable and cost-effective way.

    This webinar will cover the evolving approach to help you solve security issues with modern open architecture solutions. Using the right approach and the right technologies are important to addressing requirements of log data storage, analysis, analytics and advanced security monitoring. Learn why integration is key and where ArcSight comes in.
  • Best Practices for Securing your DNS against Advanced Malware
    Best Practices for Securing your DNS against Advanced Malware Chip Mesec, Product Manager and Sam Pierre, Product Marketing Manager, Hewlett Packard Enterprise Recorded: Jan 19 2017 44 mins
    The challenge with detecting malware is that it easily gets past traditional security solutions, placing your DNS infrastructure in harm’s way before you even notice it’s there. Hear how DNS operates and malware utilizes the DNS protocol to communicate with outside threats and exfiltrate data from an enterprise.

    This webinar is ideal for IT and security managers who have limited experience with DNS or malware but are interested in how threats use this often overlooked protocol.

    Viewers will learn:
    •Practical strategies to protect your enterprise from bad DNS traffic
    •Best practices for securing your DNS infrastructure
  • Beat Hackers Through Visibility, Precision and Quick Response
    Beat Hackers Through Visibility, Precision and Quick Response Travis Grandpre, HPE Director of ArcSight Product Marketing and Justin Kelso, HPE ArcSight Recorded: Jan 17 2017 40 mins
    As organizations scale, having a robust security posture is critical. To achieve this, organizations rely on intelligent security operations. Visibility plays a crucial part in this. This means having visibility across boundaries, not just across networks and IT, but also into operational data and IoT devices.

    Join this presentation to learn:

    •What's needed to enable visibility into millions of events per second
    •How to provide context to the collected data
    •Role of machine learning in real-time correlation and analytics
    •How to prioritize security analyst tasks, optimize resources and save time

    Discover the capabilities powering intelligent security operations that enable you to track alerts and investigate threats at the speed of the attacker.
  • The Fortify Ecosystem: Seamless integration into the development toolchain
    The Fortify Ecosystem: Seamless integration into the development toolchain Scott Johnson, Director of Product Management, Fortify Recorded: Jan 12 2017 39 mins
    Organizations moving at DevOps speed can easily integrate security testing into their Software Development Life Cycle (SDLC) workflow. Join this presentation to discover how built-in application security testing can become a seamless part of your coding process.

    Viewers will learn:

    - How integrations spanning all stages of development, deployment and production enable application security testing into the development tool chain

    - How to empower your developers to test for security vulnerabilities earlier, build better code and secure your software
  • Powering HPE Security ArcSight with Innovations in Connectors
    Powering HPE Security ArcSight with Innovations in Connectors Farid Merchant and Bhuvana Krishnamurthy, HPE Recorded: Dec 16 2016 42 mins
    Connectors sound like a simple way of getting data from point A to point B. But that understates the tremendous power built into and delivered by connectors. This technical webinar discusses innovations in connectors to help customers detect threats originating from their cloud apps such as Office365, AWS and Box. Get an introduction to Quick Flex, the next-generation parser creation tool that makes connector upgrades quick and easy. Learn about the separation of the parser from the framework and its availability on HPE Security ArcSight Marketplace.
  • Hunting for Security Threats – Lessons Learned
    Hunting for Security Threats – Lessons Learned Mary Karnes Writz, HPE Recorded: Dec 14 2016 35 mins
    Have you been planning on establishing hunting capabilities but just can’t seem to get it started? Check out this webinar to gain a clearer understanding on hunt teams and their effectiveness. This webinar will deep dive into successes and most importantly lessons learned from Hewlett Packard Enterprise’s own journey with leveraging emerging capabilities and hunting techniques with customers. From solving data ingestion challenges to detecting bank heists, learn from HPE’s years of building hunt teams. Get a broader view of the ecosystem of breach hunting technology so you can execute your own successful hunt strategy.

Embed in website or blog