Hi [[ session.user.profile.firstName ]]
Sort by:
    • Find Threats Lurking on your Systems with Host-based Intrusion Detection and Ali Find Threats Lurking on your Systems with Host-based Intrusion Detection and Ali Brian Bledsoe & Don Shin Recorded: Jun 14 2016 3:00 pm UTC 59 mins
    • Host-based intrusion detection systems (HIDS), work by monitoring activity that is occurring internally on a host. HIDS look for unusual or nefarious activity by examining logs created by the operating system, looking for changes made to key system files, tracking installed software, and sometimes examining the network connections a host makes. AlienVault USM integrates HIDS with other key security controls to help you get the most out of host-based monitoring, including:
      Analyzing system behavior and configuration status to track user access and activity
      Detecting system compromise, modification of critical configuration files (e.g. registry settings, /etc/passwd), common rootkits, and rogue processes
      Correlating HIDS data with known IP reputation, vulnerability scans and more
      Logging and reporting for PCI compliance

      Read more >
    • Unify your Defenses for More Effective Threat Detection & Investigation Unify your Defenses for More Effective Threat Detection & Investigation Tom D'Aquino, VP of Worldwide Sales Engineering, AlienVault Recorded: Oct 19 2015 9:45 pm UTC 31 mins
    • Network IDS is one of the most effective tools for sniffing out attackers in your network. However, correlation of IDS events is needed to minimize noise and focus on the alerts that really matter. Most SIEM solutions ship with a set of "out of the box" correlation directives. But without specific knowledge of which IDS tool and signature set you're using, those rules are all but useless. Writing your own correlation directives is certainly an option, but that requires a great deal of time and expertise to do effectively, and re-do as the network and threats change.

      Join this webcast to learn:

      Why "one size fits all" SIEM correlation directives are ineffective
      How a unified SIEM + IDS solution simplifies threat detection and investigation
      Why real-time threat intelligence is essential to detect modern threats

      Read more >
    • ThreatTrack Integration with Tenable: Bolstering Threat Detection Capabilities ThreatTrack Integration with Tenable: Bolstering Threat Detection Capabilities Charles Hessifer, Senior Sales Engineer, ThreatTrack Recorded: Jan 19 2016 7:00 pm UTC 54 mins
    • Join us Tuesday, Jan. 19, to see how ThreatSecure Network, which detects advanced threats and anomalous network behavior to disrupt cyberattacks, integrates with Tenable’s SecurityCenter and Log Correlation Engine (LCE) to streamline threat and risk detection capabilities for your organization.
      Learn how this integration will enable teams to:

      ·Decrease the time of incident detection and reporting

      ·Analyze data and make informed decisions on threat severity via a single interface

      ·Demonstrate and determine the impact of malware across the network

      ·Recognize and respond to post-threat detection changes on critical assets

      Discover how to empower your team with enhanced continuous monitoring, compliance, vulnerability and advanced threat detection, and maximize your Tenable SecurityCenter and LCE investments.

      Read more >
    • Improve Threat Detection for Education Organizations with AlienVault USM Improve Threat Detection for Education Organizations with AlienVault USM Anthony Mack Recorded: Jun 10 2015 8:25 pm UTC 61 mins
    • Securing your network from threats is a constantly evolving challenge, especially for education organizations where IT security resources are limited. AlienVault has helped many education organizations get the security visbility they need, on a budget.
      Join us for a special live demo of our AlienVault Unified Security Management (USM) solution, focused specifically on the needs of education organizations. You'll hear first-hand from one of your peers, Matthew J. Frederickson, from Council Rock School District, about how our USM solution has helped him improve threat detection and incident response.

      We'll also walk through a product demo to show how USM makes it easy to:
      Discover all IP-enabled assets on your network
      Identify vulnerabilities like unpatched software or insecure configurations
      Detect network scans and malware like botnets, trojans & rootkits
      Speed incident response with built-in remediation guidance for every alert
      Generate accurate reports for regulatory compliance

      Join us to learn how USM makes it easy to get the insights you need, starting on Day 1.

      Read more >
    • Improve Threat Detection for State & Local Government with AlienVault USM Improve Threat Detection for State & Local Government with AlienVault USM Anthony Mack Recorded: Jun 2 2015 5:55 pm UTC 61 mins
    • Securing your network from threats is a constantly evolving challenge, especially for state and local governments where IT security resources are limited. AlienVault has helped many government organizations get the security visbility they need, on a budget.
      Join us for a special live demo of our AlienVault Unified Security Management (USM) solution, focused specifically on the needs of state & local government. You'll hear first-hand from one of your peers, Danny Santiago, Systems Administrator for the City of Lewiston, ID, about how our USM solution has helped him improve threat detection and incident response.

      We'll also walk through a product demo to show how USM makes it easy to:
      Discover all IP-enabled assets on your network
      Identify vulnerabilities like unpatched software or insecure configurations
      Detect network scans and malware like botnets, trojans & rootkits
      Speed incident response with built-in remediation guidance for every alert
      Generate accurate reports for regulatory compliance

      Join us to learn how USM makes it easy to get the insights you need, starting on Day 1.

      Read more >
    • Unify your Defenses for More Effective Threat Detection & Investigation Unify your Defenses for More Effective Threat Detection & Investigation Tom D'Aquino, VP of Worldwide Sales Engineering, AlienVault Recorded: May 12 2015 8:35 pm UTC 31 mins
    • Network IDS is one of the most effective tools for sniffing out attackers in your network. However, correlation of IDS events is needed to minimize noise and focus on the alerts that really matter. Most SIEM solutions ship with a set of "out of the box" correlation directives. But without specific knowledge of which IDS tool and signature set you're using, those rules are all but useless. Writing your own correlation directives is certainly an option, but that requires a great deal of time and expertise to do effectively, and re-do as the network and threats change.

      Join this webcast to learn:
      Why "one size fits all" SIEM correlation directives are ineffective
      How a unified SIEM + IDS solution simplifies threat detection and investigation
      Why real-time threat intelligence is essential to detect modern threats

      Read more >
    • Understanding the 2015 NSS Labs Breach Detection Tests Understanding the 2015 NSS Labs Breach Detection Tests Steve Duncan, Trend Micro Recorded: Oct 20 2015 12:00 pm UTC 41 mins
    • In the past months, a cascade of significant data breaches have occurred resulting in the loss of millions of customer records, intellectual property and financial data.  These losses are usually the result of a targeted attack (sometimes known as an APT) and over the past few years many vendors have addressed this problem through Breach Detection Systems.  Not all solutions to these advanced threats are equal however, but benchmarking their effectiveness can be difficult.  NSS Labs recently put top breach detection systems through a grueling series of real-world tests and evaluated their ability to detect targeted attacks and deliver an effective return on investment.  This webinar will discuss the various approaches vendors take to addressing targeted attacks, and how they performed in the 2015 Breach Detection System tests.

      Read more >
    • Understanding the 2015 NSS Labs Breach Detection Tests Understanding the 2015 NSS Labs Breach Detection Tests Steve Duncan, Trend Micro Recorded: Oct 15 2015 3:00 am UTC 41 mins
    • In the past months, a cascade of significant data breaches have occurred resulting in the loss of millions of customer records, intellectual property and financial data.  These losses are usually the result of a targeted attack (sometimes known as an APT) and over the past few years many vendors have addressed this problem through Breach Detection Systems.  Not all solutions to these advanced threats are equal however, but benchmarking their effectiveness can be difficult.  NSS Labs recently put top breach detection systems through a grueling series of real-world tests and evaluated their ability to detect targeted attacks and deliver an effective return on investment.  This webinar will discuss the various approaches vendors take to addressing targeted attacks, and how they performed in the 2015 Breach Detection System tests.

      Read more >
    • How to Leverage Log Data for Effective Threat Detection How to Leverage Log Data for Effective Threat Detection Tom D'Aquino, Systems Engineer Recorded: Jun 26 2014 6:00 pm UTC 61 mins
    • Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements

      Read more >
    • Tolly Test Report – WLAN Interference Detection & Identification Tolly Test Report – WLAN Interference Detection & Identification Kevin Tolly, founder of Tolly Group and Chris Hinsz, Product Marketing Manager, AirMagnet Recorded: Aug 6 2015 6:00 pm UTC 57 mins
    • In this live webinar, Kevin Tolly, founder of the Tolly Group will review the results of the Tolly Test Report (June 2015.) AirMagnet commissioned Tolly to benchmark the interference identification and detection of their Spectrum XT and compare it to the MetaGeek Wi-Spy DBx + Chanalyzer.

      The Bottom Line.

      AirMagnet Spectrum XT provides:

      •Automatic interference identification and classification of devices
      •100% accuracy of identification at all distances tested
      •Simple and intuitive signature adoption with ability to share with others
      •Multi-brand support to locate devices quickly

      Join us to get the full story.

      About the Speakers:

      Kevin Tolly is the founder of The Tolly Group, which has been a leading provider of third-party validation services in the IT industry for more than 26 years.

      In his career of over 30 years, Tolly has designed and run corporate networks, evaluated a wide range of leading-edge information technologies, written extensively about technology and presented to audiences all over the world.

      He has published and spoken on topics related to security, LAN/WAN infrastructure, application acceleration, virtualization, wireless, data protection and more. The company he founded works with leading-edge vendors to provide them with the crucial third-party validation of their product claims.

      Chris Hinsz, Sr. Product Manager with Fluke Networks manages the AirMagnet Mobile toolset at Fluke which includes Survey PRO, WiFi Analyzer, and Spectrum XT among others. Chris has been working in the Wi-Fi industry for over 15 years attending both IEEE802.11 meetings and Wi-Fi Alliance meetings in that time. Chris was previously at Motorola Solutions where he managed Access Point products and represented Motorola Solutions on the Wi-Fi Alliance Board of Directors.

      Read more >
    • How to Leverage Log Data for Effective Threat Detection How to Leverage Log Data for Effective Threat Detection Tom D'Aquino, Systems Engineer Recorded: Feb 19 2014 10:25 pm UTC 61 mins
    • Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data.

      Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements. In this session, you'll learn:

      *What log data you always need to collect and why
      *Best practices for network, perimeter and host monitoring
      *Key capabilities to ensure easy, reliable access to logs for incident response efforts
      *How to use event correlation to detect threats and add valuable context to your logs

      Read more >
    • How to leverage log data for effective threat detection How to leverage log data for effective threat detection Tom D'Aquino, Systems Engineer Recorded: Feb 19 2014 10:25 pm UTC
    • Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data.

      Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements. In this session, you'll learn:

      *What log data you always need to collect and why
      *Best practices for network, perimeter and host monitoring
      *Key capabilities to ensure easy, reliable access to logs for incident response efforts
      *How to use event correlation to detect threats and add valuable context to your logs

      Read more >
    • Securing the Enterprise with Real-time Threat Detection Securing the Enterprise with Real-time Threat Detection Mike Davis, Chief Technology Officer, CounterTack Recorded: Jun 25 2014 6:00 pm UTC 31 mins
    • Organizations lack the protection and controls on mobile endpoints, mainly laptops and mobile devices. As a result, it is difficult for security teams to effectively defend against unknown threats, particularly when executives travel to geographical areas where connecting to seemingly trusted networks only becomes a risky move based on the fact that criminals are ready to pounce on unsuspecting users. In this webinar we will walk through an advanced endpoint attack in real-time, showing how the behaviors and events are detected, while discussing the necessary steps security teams should follow from detection to infection to response. You will learn how real-time endpoint threat detection lets operators understand the context of operating system and network threats; collecting critical information that they can act on if threats start to become more aggressive or pervasive.

      Read more >