Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Unpacking Endpoint Detection and Response John Bruggeman, virtual CISO at CBTS ; Steve Cobb, CISO at One Source Communications As the methods and practices used to attack digital assets become more refined, the security tools to combat the threats must evolve, shifting from re... July 19, 2022 3:00pm Defining the Industry Standard for XDR Mike Storm, Cybersecurity Distinguished Engineer, Cisco Do your security goals feel out of reach? Take back control with Cisco's XDR solution. Learn how our SecureX platform unifies data, analytics, and aut... June 26, 2022 5:00pm Increasing your visibility through ESET Inspect James Rodewald, Security Services Team Lead ESET Inspect allows advanced visibility and traceability into how the threats that are stopped by ESET’s many layers of protection arrived on your end... 6 days ago | 17 mins Increasing your visibility through ESET Inspect James Rodewald, Security Services Team Lead @ESET ESET Inspect allows advanced visibility and traceability into how the threats that are stopped by ESET’s many layers of protection arrived on your end... July 7, 2022 6:00am Secure, Enterprise-Grade Remote Connectivity Michael Polaczy, Director Product Marketing at TeamViewer and Tobias Schmidt, Senior Project Manager at TeamViewer “The adoption of digitalization in many enterprises has accelerated – resulting in new risks” TeamViewer Tensor is here to enable you and your team t... 3 weeks ago | 48 mins Leveraging New Detection and Response Technology for the Next Generation of SOC Allie Mellen, Analyst, Forrester - Guest Speaker & Kumar Saurabh, CEO and Co-Founder, LogicHub LogicHub is pleased to welcome leading Forrester analyst Allie Mellen as a guest speaker to discuss how security professionals can build and mature th... 1 month ago | 61 mins Malwarebytes for Business: Product Demo Jarryd Boyd, Senior Sales Engineer With the threat landscape constantly evolving and organizations rolling out more security measures than before, businesses need simple solutions for m... 1 month ago | 43 mins 2022 MITRE ATT&CK Evaluations Explained Israel Barak, CISO; Cody Queen, Product Marketing Manager The MITRE ATT&CK evaluations test security vendors’ ability to quickly detect and stop tactics and techniques used by today’s threat actors. In this s... 1 month ago | 64 mins Beyond EDR: Modernizing Your Threat Detection and Response Program Dave Gruber, ESG; Bharath Vasudevan, Alert Logic Endpoint detection and response (EDR) tools are now mainstream for most, yet they often do not offer the proper breadth and coverage needed to secure ... 4 months ago | 48 mins Alphabet Soup: Making Sense of XDR, EDR, NDR and SIEM Andrew Hollister, Jonathan Zulberg, Tom Field XDR, EDR, NDR and SIEM. They are among the most prominent acronyms in cybersecurity. But what do they all mean, how do they work and how do the techno... 5 months ago | 22 mins Load more