Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Creating threat analytics on the endpoint John Bambenek, President | Bambenek Consulting Security teams are at now loss for telemetry from their devices -- the struggle is to make sense of it all. Many breaches occur not because detection ... April 4, 2023 9:00pm Are your endpoints safe? Extending managed detection and response capabilities Rakesh Shah, AVP Product Management – Cybersecurity Organizations are looking for ways to protect against threats across a growing attack surface, and extended detection and response, or XDR, can help d... 1 week ago | 30 mins What’s New in NOM? Brian Kaplan, Product Mgmt Lead, Network Operations Management and Jon Kies, Product Mkt Lead, Service Assurance, Micro Focus Please join our product team leaders for an enlightening discussion about the latest network observability research—what’s real, what’s hype—and what’... 3 months ago | 55 mins Understanding Endpoint Security Market and Customer Trends Paddy Harrington, Forrester Senior Analyst | Nathan Jenniges, BlackBerry Vice President, Strategy & Product Management BlackBerry recently commissioned Forrester Consulting to conduct a Total Economic ImpactTM Study of CylancePROTECT®. In this session, we focus on key ... 1 month ago | 18 mins Observability: What Does It Even Mean? Perry Correll, Principal Technical Content Manager Observability, Telemetry, Security data, or whatever term you prefer, is all about gathering the large amount of data generated by all your applicatio... 1 month ago | 38 mins Network Modernization: AIOps and a Bid for The Autonomous Network Bob Laliberte - Principal Analyst, ESG and Larry Lunetta - VP Portfolio Solutions Marketing at Aruba Being operationally efficient sits at the top of Digital Transformation initiatives. However, the distributed nature of IT is making this goal more ch... 4 months ago | 33 mins XDR Does Not Exist Without NDR Matt Bromiley & Erik Hjelmstad, NETSCOUT In today’s world of enterprise security, many technology options are available—perhaps too many. Despite all the options available, security teams sti... 2 months ago | 62 mins Protecting Your Cloud Presence by Analyzing Network Activity Guy Raz,Prin Eng/ExtraHop;Kuldeep Beniwal IAM Architect, LendingClub; Richard Israelite Sr Dir,Addepar;Dunlap, Moderator Firewalls and endpoint agents only protect part of your risk surface. By leveraging several sources of network telemetry — including packets, flow lo... 4 months ago | 58 mins DX NetOps: Modern Network Monitoring with Broadcom Software Nagesh Jaiswal, NetOps Solutions Specialist | EMEA, APAC, ANZ, Agile Operations Division, Broadcom Software [India Time Zone] IT operations teams often struggle to assemble an effective network performance management (NPM) toolkit because the landscape is be... 9 months ago | 47 mins Altitude 2022: Riding the Request Tsunami - Scaling New Relic’s Growth. Andrew Hartnett, Vice President of Software Engineering at New Relic Continue with our 2022 Altitude Series. New Relic collects data, at a massive scale, from around the world. The company needed an edge partner that c... 2 months ago | 18 mins Load more