InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Advanced Threat Detection and Investigation

Presented by

Lloyd McGregor and Oscar Buijten

About this talk

Cybersecurity continues to grow more complex as attackers devise new means of gaining access to networks, data and identities. At the same time, the number of disruptive cyber-attacks is increasing at an alarming pace. IT executives understand the importance of monitoring their environments to detect and respond to more frequent and ever-evolving security threats. However, many organizations lack sufficient in-house resources with the specialized expertise, knowledge and tools needed to stop advanced threats. Join this webinar to learn what it takes to effectively detect and respond to threats with 24x7 security operations that include security monitoring, incident analysis and incident response. Dell Technologies security experts will share a real-life security event, and explain how our analysts: • Discover an event’s origin and follow the paths spreading outward from the event • Then ascertain whether there is malicious intent • And determine remediation steps to neutralize the attack This webinar will conclude with a review of managed detection and response services and what customer factors make this approach worth considering as well as characteristics that might favour developing internal capabilities.
Dell Technologies EMEA Webinar Channel

Dell Technologies EMEA Webinar Channel

37954 subscribers319 talks
Enabling Transformation
Webinar channel dedicated to IT and digital business transformation through trusted hybrid cloud and big-data solutions, built upon a modern data center infrastructure that incorporates industry-leading converged infrastructure, servers, storage, and cybersecurity technologies.
Related topics