Hi [[ session.user.profile.firstName ]]
Sort by:
    • The Seven Secret Sins of SIEMs
      The Seven Secret Sins of SIEMs Frank Jas - Cyphort Recorded: Jul 21 2017 4:00 pm UTC 31 mins
    • Cyphort completed three major research projects involving SIEM users in nearly 1000 organizations across the US. What we learned was quite surprising. We discovered seven secret sins of SIEMs that were causing various levels of pain and frustration among SIEM users.

      If you use a SIEM or are planning the purchase of one for your organization, the seven sins are must-know for effective Tier 1 incident response. The research results shared during the webinar include:

      - Discussion of the seven secret sins affecting the majority of SIEM users
      - The hidden (and significant) costs of owning a SIEM
      - Insight into why SIEMs often fail to deliver the security value users expect
      - The surprising staff productivity drain associated with using a SIEM

      Cyphort will demo its solution to the seven sins--the Anti-SIEM. The demo shows how Anti-SIEM delivers stronger security and improved productivity at a lower cost--everything SIEM users want.

      Special Viewing Offer-

      During the webinar, download a complimentary research report by the Ponemon Institute about the state of the SIEM market.

      The Cyphort Team

      Read more >
    • SPARK On Hadoop Is The Next Gen SIEM
      SPARK On Hadoop Is The Next Gen SIEM Tanuj Gulati, CTO Securonix & David Monahan, Research Director EMA Recorded: Jul 12 2017 5:00 pm UTC 64 mins
    • Today, 79% of security teams are overwhelmed with the volume of threat alerts they are receiving. Many of these SOC teams are forced into using decades old SIEM architectures to monitor their environments. The large alert volumes combined with the all too often requirement to manually prioritize alerts means 64% of critical tickets generated per day are not being worked leading to missed attacks, long incident response cycles and data breaches.

      In this webinar, you will learn
      · How Spark on Hadoop alleviates the security issues today
      · How a big data architecture enables distributed in-memory analytics on streaming data sets (up to 100x)
      · How Securonix SNYPR harnesses this revolutionary technology alongside industry standard Lambda architecture
      · The benefits of this architecture including real-time behavior & signature-less threat detection, powerful threat hunting capabilities

      Read more >
    • Cyphort Introduces the Anti-SIEM
      Cyphort Introduces the Anti-SIEM Franklyn Jones Recorded: Apr 19 2017 2:25 pm UTC 17 mins
    • Cyphort just introduced the innovative Anti-SIEM. It’s everything you want in a SIEM and less: Less Cost, Less Noise, Less Complexity, and Less Wasted Time.

      Here’s why you will find the Anti-SIEM quite interesting.

      Cyphort conducted extensive research with your peers in nearly 1,000 organizations across the US. The clear consensus from the majority of SIEM users is that they want more effective security analytics capabilities, and more detection and visibility into the specific advanced threats that are likely the root cause of those endless security alerts you deal with every day.

      The insights from that research enabled us to create a powerful software platform that combines advanced threat detection, actionable security analytics, and automated threat mitigation. It’s called the Anti-SIEM and its open architecture allows it to ingest data from all your security devices and provide a consolidated, timeline view of security incidents.

      Read more >
    • Ponemon Report: Challenges to Achieving SIEM Optimization
      Ponemon Report: Challenges to Achieving SIEM Optimization Dr. Larry Ponemon & Franklyn Jones Recorded: Mar 14 2017 5:00 pm UTC 43 mins
    • New research from Cyphort and the Ponemon Institute puts the spotlight on many significant pain points affecting the productivity and satisfaction of Security Operations Center (SOC) and incident response (IR) teams in large organizations.

      In this webinar, Dr. Larry Ponemon of the Ponemon Institute and Franklyn Jones, vice president of marketing at Cyphort, will discuss the key findings of the survey, including:

      * 70% want their SIEM to generate alerts that are more accurate, prioritized, and meaningful

      *78% of have 1 or less full-time staff assigned to SIEM administration, and yet 64% or organizations pay more than $1 million annually for external consultants and contractors to assist with SIEM configuration and management

      *Less than half of respondents say their SIEM supports the forensic analysis of security incidents

      Read more >
    • SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection
      SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection Sacha Dawes, Principal Product Marketing Manager, AlienVault Upcoming: Oct 17 2017 5:00 pm UTC 60 mins
    • SIEM solutions have been widely adopted to help IT teams collect and correlate data from a variety of security point products. However, traditional SIEM deployments require a great deal of time, money & expertise to properly normalize data feeds, create correlation rules to detect threats & continuously tune those rules to limit false positives. And, after all that work is done, it has to be continuously re-done as the network & threat landscape changes.

      AlienVault takes a different approach to SIEM. Join this webcast to learn how AlienVault Unified Security Management (USM) overcomes the most common SIEM challenges with:

      Built-in capabilities like asset discovery, vulnerability assessment, intrusion detection, orchestrated incident response, and log management
      Continuously updated correlation directives, vulnerability signatures, incident response guidance, and more
      Fully integrated, real-time threat intelligence from the AlienVault Labs Security Research Team and the AlienVault Open Threat Exchange (OTX)
      The ability to monitor on-premises and cloud environments including AWS and Azure, as well as cloud applications like Office 365

      Read more >
    • How Du Telecom Streamlined Its Security Ops with HPE ArcSight SIEM Solution
      How Du Telecom Streamlined Its Security Ops with HPE ArcSight SIEM Solution Tamer El Refaey, Senior Director, Security Monitoring and Operations, du Telecom and Arun George, Regional Sales Manager, HPE Recorded: Jun 13 2017 8:00 am UTC 51 mins
    • As a rapidly growing mobile and fixed line service provider, du Telecom was faced with protecting its growing network and IT infrastructure while controlling costs and efficiently managing IT operations. Recognizing this need, du Telecom embarked on a journey to transform its security operations as it knew that a strong security foundation — one that can automate security and compliance monitoring to cost-effectively support corporate growth — would be critical to its success. To achieve these goals, du Telecom turned to ArcSight.

      Join this webinar to participate in a candid conversation with Tamer El Bahey, Senior Director - Security Monitoring & Operations at du Telecom, as he shares how the company simplified its security operations across the enterprise and laid the groundwork for an award winning Security Operations Center (SOC) using ArcSight SIEM solution. Learn from du Telecom's approach and lessons learned which resulted in reduced security expenditures by 85% in 3 years.

      Register now to see how the power of ArcSight SIEM solution can also transform your Security Operation Center to operate more efficiently and protect against cyber threats.

      Read more >
    • Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM
      Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Michael Suby, Vice President of Research at Frost & Sullivan Recorded: Mar 22 2017 12:00 am UTC 36 mins
    • Unfortunately many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that transpired in “days or less” has risen from 67% to 84% over the last 10 years. Over this same time period, the percent of compromise discoveries that occurred in “days or less” also improved, but not enough to narrow the time gap between compromise and discovery. In other words, the bad guys are accelerating their exploits faster than the good guys are accelerating their ability to discover.

      The path to narrowing the time gap between compromise and discovery, and then neutralizing business-impacting incidents, is through a comprehensive and mission-oriented Security Information and Event Management (SIEM). A well-designed SIEM not only advances security objectives, but it also works to direct personnel and process for maximum impact. With limited resources and a rising number of attacks, not all solutions are created equal. You need to ensure they are getting the best bang for your buck.

      In this webinar, Michael Suby, vice president of research at the global research and consulting organization Frost & Sullivan, will discuss the factors that contribute to SIEM’s total cost of ownership.

      You’ll learn:

      • How to calculate the total cost of ownership of a SIEM
      • The basic functionality that every SIEM should have to confidently breeze through preliminary activities
      • The SIEM attributes that will have a lasting impact on your organization’s cost efficiency in effectively managing risk

      Join us to learn the features that should be on the top of your scorecard when evaluating a SIEM for either first-time deployment or replacement.

      Read more >
    • Don’t Let Your Legacy SIEM Be Your Kryptonite
      Don’t Let Your Legacy SIEM Be Your Kryptonite Girish Bhat, Director of Security Product Marketing at Splunk ; Risi Avila, Security Professional Services Consultant at Splu Recorded: Sep 5 2017 4:00 pm UTC 59 mins
    • It’s a bird, it’s a plane, no it’s just your legacy SIEM. Did you know your SIEM might be weakening your security powers? Your legacy SIEM could be:

      • Limiting your ability to collect, store and use security-relevant unstructured and structured data
      • Making it difficult to maintain your SIEM and requiring skilled staff to work around the clock just to keep the lights on
      • Burdening your security operations team by forcing them to chase false alarms while missing critical alerts
      • Failing to detect modern threats and putting your entire business at risk

      But have no fear, Splunk’s security experts are here to make you a security super hero again. Put on your cape and join us for this webinar to learn how Splunk can be used as a modern SIEM to solve a range of security use cases and more.

      Splunk’s security experts will share common SIEM replacement and migration scenarios and discuss how a department store, a financial services firm and a luxury retailer successfully migrated from their legacy SIEM to Splunk.

      Read more >
    • Learn How Equinix Uses Splunk as a Cloud-Based SIEM
      Learn How Equinix Uses Splunk as a Cloud-Based SIEM George Do, CISO at Equinix; Girish Bhat, Director of Security Product Marketing at Splunk Recorded: Aug 24 2017 4:00 pm UTC 62 mins
    • Security teams are tasked with minimizing risk and safeguarding the business while dealing with increasingly complex threats. In addition, they must have the flexibility to monitor across diverse infrastructure. Cloud-based SIEM enables security teams to spend precious time and energy on mitigating security risks rather than on deploying and managing infrastructure.

      Join this webinar to hear from George Do, CISO at Equinix, about how cloud-based SIEM, with Splunk Enterprise Security running on Splunk Cloud, delivers instant access to advanced security analytics, valuable context and detailed insights.

      You will also learn how Splunk Enterprise Security running on Splunk Cloud can:

      •Enable you to improve threat identification and risk mitigation
      •Reduce remediation cycle times
      •Demonstrate regulatory compliance
      •Scale your SIEM deployment while reducing TCO by 50 percent compared to legacy solutions

      Read more >
    • Don’t Let Your Legacy SIEM Be Your Kryptonite
      Don’t Let Your Legacy SIEM Be Your Kryptonite Girish Bhat,Director of Security Product Marketing at Splunk, Risi Avila, Security Professional Services Consultant at Splunk Recorded: Apr 27 2017 8:00 pm UTC 59 mins
    • It’s a bird, it’s a plane, no it’s just your legacy SIEM. Did you know your SIEM might be weakening your security powers? Your legacy SIEM could be:

      • Limiting your ability to collect, store and use security-relevant unstructured and structured data
      • Making it difficult to maintain your SIEM and requiring skilled staff to work around the clock just to keep the lights on
      • Burdening your security operations team by forcing them to chase false alarms while missing critical alerts
      • Failing to detect modern threats and putting your entire business at risk

      But have no fear, Splunk’s security experts are here to make you a security super hero again. Put on your cape and join us for this webinar to learn how Splunk can be used as a modern SIEM to solve a range of security use cases and more.

      Splunk’s security experts will share common SIEM replacement and migration scenarios and discuss how a department store, a financial services firm and a luxury retailer successfully migrated from their legacy SIEM to Splunk.

      Speakers
      Girish Bhat, Splunk director of security product marketing
      Risi Avila, Security professional services consultant

      Agenda
      10 mins – The challenges of having a legacy SIEM
      15 mins – The options to migrate
      15 mins – Customer success stories
      5 mins – Resources to guide and help you
      10mins – Q&A

      Read more >