Hi [[ session.user.profile.firstName ]]

Using SIEM and Big Data to detect invisible threats

The alarming rise of advanced persistent threats (APTs) makes security analytics around Big Data an imperative. In light of the challenges of converting Big Data into actionable information with first generation SIEMs, security professionals have become skeptical about the ability to use SIEM beyond compliance needs. Yet, today’s advanced SIEM technology takes threat detection, understanding and response to a whole new level. Join us to learn how to use next generation SIEM technology to specifically detect security threats within an ocean of Big Data. Discover how the latest technologies in security analytics such as the quad-correlation methods of rules, statistics, risk, and history can help your organization execute SIEM best practices in detection with intelligence, integration, and ease.
Recorded Apr 10 2014 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Grant Babb, Product Manager – Big Data, Visualization, Analytics, McAfee
Presentation preview: Using SIEM and Big Data to detect invisible threats

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Rise of Advanced Malware and Evasive Network Attacks Recorded: Jun 18 2014 40 mins
    Steve Smith, Sr. Technical Marketing Manager, Intel Security
    Networking communication protocols make it possible for the internet to work. Unfortunately, criminals can use those trusted systems to obfuscate malicious data and penetrate your network defenses undetected. An advanced evasion technique (AET) is a method of delivering an exploit or malicious content into a vulnerable target so that the traffic looks normal and security devices will allow it to pass through. By combining attacks using several protocol layers, these advanced evasions bypass most existing security solutions undetected. Join us for a review of these attack techniques and a demonstration.
  • Using SIEM and Big Data to detect invisible threats Recorded: Apr 10 2014 51 mins
    Grant Babb, Product Manager – Big Data, Visualization, Analytics, McAfee
    The alarming rise of advanced persistent threats (APTs) makes security analytics around Big Data an imperative. In light of the challenges of converting Big Data into actionable information with first generation SIEMs, security professionals have become skeptical about the ability to use SIEM beyond compliance needs. Yet, today’s advanced SIEM technology takes threat detection, understanding and response to a whole new level. Join us to learn how to use next generation SIEM technology to specifically detect security threats within an ocean of Big Data. Discover how the latest technologies in security analytics such as the quad-correlation methods of rules, statistics, risk, and history can help your organization execute SIEM best practices in detection with intelligence, integration, and ease.
  • Protection Capabilities to Consider While Preparing for Advanced Malware Recorded: Mar 13 2014 42 mins
    Eric Ahlm, Research Director, Gartner; Pat Calhoun, SVP, Network Security Solutions, McAfee
    We learned a few things about advanced malware in 2013. Namely, zero-day and targeted attacks continued to evade more traditional protection methods. And while many organizations are stepping up detection efforts, there’s still more that can and should be done. So what will 2014 bring?

    Join McAfee and featured analyst firm Gartner for an in-depth look at what advanced threats are on the horizon for 2014 and what you can do to improve your security posture. Our conversation will cover:

    Threat predictions for 2014 and beyond
    Key capabilities to consider in your detection and protection arsenal
    Planning for a successful advanced malware protection strategy
McAfee solutions deliver complete virus protection and security.
McAfee lives for the challenge of protecting and liberating our customers by staying ahead of the bad guys in our relentless search for safe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Using SIEM and Big Data to detect invisible threats
  • Live at: Apr 10 2014 4:00 pm
  • Presented by: Grant Babb, Product Manager – Big Data, Visualization, Analytics, McAfee
  • From:
Your email has been sent.
or close