Hi [[ session.user.profile.firstName ]]
Sort by:
    • Malware Detection - How to Spot Infections Early with AlienVault USM Anywhere
      Malware Detection - How to Spot Infections Early with AlienVault USM Anywhere Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: May 16 2017 5:00 pm UTC 53 mins
    • Malware has been a thorn in the side of IT pros for years, and will continue to be for years to come as new strains and variants evolve. The impact of malware to your business can be huge, as was demonstrated last year by the Mirai botnet, one of the largest and most disruptive distributed denial of service (DDoS) attacks of 2016. Join us for a webcast covering the essentials of malware detection, along with a demo of how to detect malware with AlienVault USM Anywhere.

      In the webcast, you'll learn:

      Common types of malware and the challenges of detecting them
      Why you need both signature and anomaly detection to protect against malware
      How USM Anywhere can alert you of malware infections so you can take action quickly
      What to do when you detect malware activity on your network

      Hosted By
      Sacha Dawes
      Principal Product Marketing Manager
      Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha currently lives in Seattle, though soon moving to Austin, TX where he is based.

      Read more >
    • Shorter, Faster Threat Detection and Response with AlienVault and Cisco
      Shorter, Faster Threat Detection and Response with AlienVault and Cisco Jeff Olen, Product Manager, AlienVault Recorded: Apr 24 2017 6:00 pm UTC 38 mins
    • Threats continue to increase in sophistication and frequency, your environment is getting more complex with the addition of cloud infrastructure, and your siloed security tools leave you struggling to get a unified view of your security posture. How can you reduce the time to detect and defend against malware in today’s environment? It’s not enough to wait for malware to reach your network or endpoints before you try to detect and stop it. What if you could identify and block threats earlier? With Cisco Umbrella and AlienVault USM Anywhere, you can.

      Join us for a 45-minute webcast to learn how you can quickly improve your threat detection and response time with AlienVault USM Anywhere and Cisco Umbrella. During this session, you’ll learn about each product and see how the integration enables you to:

      Focus on threat response and not writing complex security analytics rules
      Get prioritized, contextual alarms leveraging threat intelligence from both Cisco and AlienVault
      Automate policy enforcement between the platforms for rapid response
      Enhance threat visibility and reduce mean time to detection & response

      Hosted By Jeff Olen, Product Manager
      Jeff joined the AlienVault product management team in 2016, with a primary focus on the USM Anywhere platform. He has more than 15 years of experience managing award-winning software products in a variety of industries including security, education, legal and digital media.

      Read more >
    • Get Powerful Threat Detection for the Cloud
      Get Powerful Threat Detection for the Cloud Danielle Russell, Sr. Product Marketing Manager Recorded: Mar 14 2017 5:00 pm UTC 48 mins
    • Cloud computing promises advantages such as lower IT cost, increased agility and better support of business functions. However, cloud security concerns continue to top the list of barriers to cloud adoption.

      AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. USM Anywhere extends our award-winning approach to threat detection, Unified Security Management (USM), to the cloud. Whether you are looking to secure your AWS & Azure cloud environments, hybrid cloud or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.

      Viewers will learn how easy is to:
      - Discover all assets across your AWS, Azure and on-premises environments
      - Scan for vulnerabilities across cloud-based and physical assets
      - Detect emerging threats with real-time, integrated threat intelligence
      - Monitor asset logs including Azure Insights, AWS CloudTrail, S3 and ELB
      - Respond quickly to incidents & conduct thorough investigations

      About the Presenter:

      Danielle is a Senior Product Marketing Manager at AlienVault, responsible for product messaging and positioning, go-to-market strategy, and sales enablement. Prior to AlienVault, Danielle held a marketing leadership position with an IT software company in the telecommunications industry. Danielle earned a B.S. Life Sciences Communication from the University of Wisconsin.

      Read more >
    • Find Threats Lurking on your Systems with Host-based Intrusion Detection and Ali
      Find Threats Lurking on your Systems with Host-based Intrusion Detection and Ali Brian Bledsoe & Don Shin Recorded: Jun 14 2016 3:00 pm UTC 59 mins
    • Host-based intrusion detection systems (HIDS), work by monitoring activity that is occurring internally on a host. HIDS look for unusual or nefarious activity by examining logs created by the operating system, looking for changes made to key system files, tracking installed software, and sometimes examining the network connections a host makes. AlienVault USM integrates HIDS with other key security controls to help you get the most out of host-based monitoring, including:
      Analyzing system behavior and configuration status to track user access and activity
      Detecting system compromise, modification of critical configuration files (e.g. registry settings, /etc/passwd), common rootkits, and rogue processes
      Correlating HIDS data with known IP reputation, vulnerability scans and more
      Logging and reporting for PCI compliance

      Read more >
    • Accelerate threat detection and incident response through a managed SOC service
      Accelerate threat detection and incident response through a managed SOC service Sridhar Karnam, Director, Product Marketing at Arctic Wolf Networks Recorded: Jan 23 2017 7:00 pm UTC 31 mins
    • A SIEM is costly and complex, IDS/ IPS are not enough, threat intelligence is overwhelming, and a SOC takes years to build and an army of security staff to manage. So where do you start with security? How should you prioritize? How can you integrate all the tools? How many security staff will you need? How do you integrate a SOC and a NOC?

      Managed Detection and Response is the answer to all these questions. With a focus on detecting and responding to threats, the service configures the right combination of tools and provides the people and process to help you quickly implement the best security within your budget. With a simple subscription-based model, you will pay a fixed price that is not dependent on your data volume. It is time to throw your SIEM, IPS, and other point solutions out and move forward with MDR.

      This webinar covers how you can implement three years worth of work on your security roadmap in just 60 min.

      Read more >
    • Unify your Defenses for More Effective Threat Detection & Investigation
      Unify your Defenses for More Effective Threat Detection & Investigation Tom D'Aquino, VP of Worldwide Sales Engineering, AlienVault Recorded: Oct 19 2015 9:45 pm UTC 31 mins
    • Network IDS is one of the most effective tools for sniffing out attackers in your network. However, correlation of IDS events is needed to minimize noise and focus on the alerts that really matter. Most SIEM solutions ship with a set of "out of the box" correlation directives. But without specific knowledge of which IDS tool and signature set you're using, those rules are all but useless. Writing your own correlation directives is certainly an option, but that requires a great deal of time and expertise to do effectively, and re-do as the network and threats change.

      Join this webcast to learn:

      Why "one size fits all" SIEM correlation directives are ineffective
      How a unified SIEM + IDS solution simplifies threat detection and investigation
      Why real-time threat intelligence is essential to detect modern threats

      Read more >
    • A Simple Blood Test for Better Prostate Cancer Detection
      A Simple Blood Test for Better Prostate Cancer Detection Dr. Vernon Mustoe Recorded: Oct 5 2016 5:00 pm UTC 59 mins
    • Prostate cancer is the most common cancer among men. Fortunately, it can be detected early by monitoring PSA levels. However, PSA tests have limited specificity for cancer, resulting in numerous unnecessary biopsies each year, which creates the need for a more precise test to help with prostate cancer detection. In this webinar, Dr. Vernon Mustoe will discuss how a simple blood test can help provide more accurate information on what an elevated PSA level might mean and the probability of finding prostate cancer on biopsy. P.A.C.E. credit is available for your participation.*

      Dr. Vernon Mustoe is one of Beckman Coulter’s medical affairs managers, supporting customers with advanced clinical and technical issues. Having obtained his undergraduate and graduate degrees from New York University, he spent over 23 years in the clinical laboratory. Most recently, he was the Director of Clinical Chemistry and Assistant Director of Laboratory Services at Sisters of Charity Medical Center in Staten Island, N.Y. He has also taught Clinical Pathology at the Bayley Seton Physician Assistant School, as well as Clinical and Anatomic Pathology at the College of Staten Island Campus of the City University of New York. Dr. Mustoe has been with Beckman Coulter since 2001.

      Read more >
    • Improve Threat Detection for Education Organizations with AlienVault USM
      Improve Threat Detection for Education Organizations with AlienVault USM Anthony Mack Recorded: Jun 10 2015 8:25 pm UTC 61 mins
    • Securing your network from threats is a constantly evolving challenge, especially for education organizations where IT security resources are limited. AlienVault has helped many education organizations get the security visbility they need, on a budget.
      Join us for a special live demo of our AlienVault Unified Security Management (USM) solution, focused specifically on the needs of education organizations. You'll hear first-hand from one of your peers, Matthew J. Frederickson, from Council Rock School District, about how our USM solution has helped him improve threat detection and incident response.

      We'll also walk through a product demo to show how USM makes it easy to:
      Discover all IP-enabled assets on your network
      Identify vulnerabilities like unpatched software or insecure configurations
      Detect network scans and malware like botnets, trojans & rootkits
      Speed incident response with built-in remediation guidance for every alert
      Generate accurate reports for regulatory compliance

      Join us to learn how USM makes it easy to get the insights you need, starting on Day 1.

      Read more >
    • Improve Threat Detection for State & Local Government with AlienVault USM
      Improve Threat Detection for State & Local Government with AlienVault USM Anthony Mack Recorded: Jun 2 2015 5:55 pm UTC 61 mins
    • Securing your network from threats is a constantly evolving challenge, especially for state and local governments where IT security resources are limited. AlienVault has helped many government organizations get the security visbility they need, on a budget.
      Join us for a special live demo of our AlienVault Unified Security Management (USM) solution, focused specifically on the needs of state & local government. You'll hear first-hand from one of your peers, Danny Santiago, Systems Administrator for the City of Lewiston, ID, about how our USM solution has helped him improve threat detection and incident response.

      We'll also walk through a product demo to show how USM makes it easy to:
      Discover all IP-enabled assets on your network
      Identify vulnerabilities like unpatched software or insecure configurations
      Detect network scans and malware like botnets, trojans & rootkits
      Speed incident response with built-in remediation guidance for every alert
      Generate accurate reports for regulatory compliance

      Join us to learn how USM makes it easy to get the insights you need, starting on Day 1.

      Read more >