Hi [[ session.user.profile.firstName ]]
Sort by:
    • Cyphort Introduces the Anti-SIEM
      Cyphort Introduces the Anti-SIEM Franklyn Jones Recorded: Apr 19 2017 2:25 pm UTC 17 mins
    • Cyphort just introduced the innovative Anti-SIEM. It’s everything you want in a SIEM and less: Less Cost, Less Noise, Less Complexity, and Less Wasted Time.

      Here’s why you will find the Anti-SIEM quite interesting.

      Cyphort conducted extensive research with your peers in nearly 1,000 organizations across the US. The clear consensus from the majority of SIEM users is that they want more effective security analytics capabilities, and more detection and visibility into the specific advanced threats that are likely the root cause of those endless security alerts you deal with every day.

      The insights from that research enabled us to create a powerful software platform that combines advanced threat detection, actionable security analytics, and automated threat mitigation. It’s called the Anti-SIEM and its open architecture allows it to ingest data from all your security devices and provide a consolidated, timeline view of security incidents.

      Read more >
    • Ponemon Report: Challenges to Achieving SIEM Optimization
      Ponemon Report: Challenges to Achieving SIEM Optimization Dr. Larry Ponemon & Franklyn Jones Recorded: Mar 14 2017 5:00 pm UTC 43 mins
    • New research from Cyphort and the Ponemon Institute puts the spotlight on many significant pain points affecting the productivity and satisfaction of Security Operations Center (SOC) and incident response (IR) teams in large organizations.

      In this webinar, Dr. Larry Ponemon of the Ponemon Institute and Franklyn Jones, vice president of marketing at Cyphort, will discuss the key findings of the survey, including:

      * 70% want their SIEM to generate alerts that are more accurate, prioritized, and meaningful

      *78% of have 1 or less full-time staff assigned to SIEM administration, and yet 64% or organizations pay more than $1 million annually for external consultants and contractors to assist with SIEM configuration and management

      *Less than half of respondents say their SIEM supports the forensic analysis of security incidents

      Read more >
    • Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM
      Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Michael Suby, Vice President of Research at Frost & Sullivan Recorded: Mar 22 2017 12:00 am UTC 36 mins
    • Unfortunately many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that transpired in “days or less” has risen from 67% to 84% over the last 10 years. Over this same time period, the percent of compromise discoveries that occurred in “days or less” also improved, but not enough to narrow the time gap between compromise and discovery. In other words, the bad guys are accelerating their exploits faster than the good guys are accelerating their ability to discover.

      The path to narrowing the time gap between compromise and discovery, and then neutralizing business-impacting incidents, is through a comprehensive and mission-oriented Security Information and Event Management (SIEM). A well-designed SIEM not only advances security objectives, but it also works to direct personnel and process for maximum impact. With limited resources and a rising number of attacks, not all solutions are created equal. You need to ensure they are getting the best bang for your buck.

      In this webinar, Michael Suby, vice president of research at the global research and consulting organization Frost & Sullivan, will discuss the factors that contribute to SIEM’s total cost of ownership.

      You’ll learn:

      • How to calculate the total cost of ownership of a SIEM
      • The basic functionality that every SIEM should have to confidently breeze through preliminary activities
      • The SIEM attributes that will have a lasting impact on your organization’s cost efficiency in effectively managing risk

      Join us to learn the features that should be on the top of your scorecard when evaluating a SIEM for either first-time deployment or replacement.

      Read more >
    • How du Telecom streamlined its security ops with HPE ArcSight SIEM solution
      How du Telecom streamlined its security ops with HPE ArcSight SIEM solution Tamer El Refaey, Senior Director, Security Monitoring and Operations, du Telecom and Arun George, Regional Sales Manager, HPE Upcoming: Jun 13 2017 8:00 am UTC 60 mins
    • As a rapidly growing mobile and fixed line service provider, du Telecom was faced with protecting its growing network and IT infrastructure while controlling costs and efficiently managing IT operations. Recognizing this need, du Telecom embarked on a journey to transform its security operations as it knew that a strong security foundation — one that can automate security and compliance monitoring to cost-effectively support corporate growth — would be critical to its success. To achieve these goals, du Telecom turned to ArcSight.

      Join this webinar to participate in a candid conversation with Tamer El Bahey, Senior Director - Security Monitoring & Operations at du Telecom, as he shares how the company simplified its security operations across the enterprise and laid the groundwork for an award winning Security Operations Center (SOC) using ArcSight SIEM solution. Learn from du Telecom's approach and lessons learned which resulted in reduced security expenditures by 85% in 3 years.

      Register now to see how the power of ArcSight SIEM solution can also transform your Security Operation Center to operate more efficiently and protect against cyber threats.

      Read more >
    • Don’t Let Your Legacy SIEM Be Your Kryptonite
      Don’t Let Your Legacy SIEM Be Your Kryptonite Girish Bhat,Director of Security Product Marketing at Splunk, Risi Avila, Security Professional Services Consultant at Splunk Recorded: Apr 27 2017 8:00 pm UTC 59 mins
    • It’s a bird, it’s a plane, no it’s just your legacy SIEM. Did you know your SIEM might be weakening your security powers? Your legacy SIEM could be:

      • Limiting your ability to collect, store and use security-relevant unstructured and structured data
      • Making it difficult to maintain your SIEM and requiring skilled staff to work around the clock just to keep the lights on
      • Burdening your security operations team by forcing them to chase false alarms while missing critical alerts
      • Failing to detect modern threats and putting your entire business at risk

      But have no fear, Splunk’s security experts are here to make you a security super hero again. Put on your cape and join us for this webinar to learn how Splunk can be used as a modern SIEM to solve a range of security use cases and more.

      Splunk’s security experts will share common SIEM replacement and migration scenarios and discuss how a department store, a financial services firm and a luxury retailer successfully migrated from their legacy SIEM to Splunk.

      Speakers
      Girish Bhat, Splunk director of security product marketing
      Risi Avila, Security professional services consultant

      Agenda
      10 mins – The challenges of having a legacy SIEM
      15 mins – The options to migrate
      15 mins – Customer success stories
      5 mins – Resources to guide and help you
      10mins – Q&A

      Read more >
    • Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM
      Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Michael Suby, Vice President of Research at Frost & Sullivan Recorded: Aug 24 2016 1:00 pm UTC 36 mins
    • Unfortunately many organisations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that transpired in “days or less” has risen from 67% to 84% over the last 10 years. Over this same time period, the percent of compromise discoveries that occurred in “days or less” also improved, but not enough to narrow the time gap between compromise and discovery. In other words, the bad guys are accelerating their exploits faster than the good guys are accelerating their ability to discover.

      The path to narrowing the time gap between compromise and discovery, and then neutralising business-impacting incidents, is through a comprehensive and mission-oriented Security Information and Event Management (SIEM). A well-designed SIEM not only advances security objectives, but it also works to direct personnel and process for maximum impact. With limited resources and a rising number of attacks, not all solutions are created equal. You need to ensure they are getting the best bang for your buck.

      In this webinar, Michael Suby, vice president of research at the global research and consulting organisation Frost & Sullivan, will discuss the factors that contribute to SIEM’s total cost of ownership.

      You’ll learn:

      • How to calculate the total cost of ownership of a SIEM
      • The basic functionality that every SIEM should have to confidently breeze through preliminary activities
      • The SIEM attributes that will have a lasting impact on your organisation’s cost efficiency in effectively managing risk

      Join us to learn the features that should be on the top of your scorecard when evaluating a SIEM for either first-time deployment or replacement.

      Read more >
    • Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM
      Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Michael Suby, Vice President of Research at Frost & Sullivan Recorded: Aug 18 2016 7:00 pm UTC 35 mins
    • Unfortunately many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that transpired in “days or less” has risen from 67% to 84% over the last 10 years. Over this same time period, the percent of compromise discoveries that occurred in “days or less” also improved, but not enough to narrow the time gap between compromise and discovery. In other words, the bad guys are accelerating their exploits faster than the good guys are accelerating their ability to discover.

      The path to narrowing the time gap between compromise and discovery, and then neutralizing business-impacting incidents, is through a comprehensive and mission-oriented Security Information and Event Management (SIEM). A well-designed SIEM not only advances security objectives, but it also works to direct personnel and process for maximum impact. With limited resources and a rising number of attacks, not all solutions are created equal. You need to ensure they are getting the best bang for your buck.

      In this webinar, Michael Suby, vice president of research at the global research and consulting organization Frost & Sullivan, will discuss the factors that contribute to SIEM’s total cost of ownership.

      You’ll learn:

      • How to calculate the total cost of ownership of a SIEM
      • The basic functionality that every SIEM should have to confidently breeze through preliminary activities
      • The SIEM attributes that will have a lasting impact on your organization’s cost efficiency in effectively managing risk

      Join us to learn the features that should be on the top of your scorecard when evaluating a SIEM for either first-time deployment or replacement.

      Read more >
    • SIEM is dead. Long Live the SIEM!
      SIEM is dead. Long Live the SIEM! Michael Mackrill, Security & Intelligence Operations Consulting Recorded: Feb 23 2016 4:40 pm UTC 16 mins
    • SIEMs have been around for years and many companies are wondering if they actually got a return on their investment. Meanwhile, multiple vendors are claiming that their latest tool can do everything that a SIEM can and more! Can the SIEM survive?

      We believe that the SIEM is not dead. SIEM is evolving. It must be remembered though that a SIEM is a living, breathing creature that must be cared, fed and interacted with in order to thrive. SIEMs have gotten more robust and can be used to interact with other security programs in ways that they couldn’t a few years ago. Companies need to utilize the SIEM as their central pane of glass to see the threats to their environment and use integration with other tools to help ensure the security of their electronic data.

      Read more >