Hi [[ session.user.profile.firstName ]]

Best Practices for Protecting Your Applications on Azure

Microsoft Azure is experiencing enormous growth as an increasing number of organizations turn to Azure to more easily launch and scale applications and services, and achieve the benefits of using the cloud. Azure offers several native platform capabilities and services to help ensure these workloads are secure, easy to manage, and able to scale to meet demand. Organizations are rethinking their approach to securing these dynamic environments, not because cloud platforms are insecure themselves, but because the vast majority of legacy on-premises security products and strategies do not work for cloud workloads. 

Join Alert Logic team member Vince Bryant, Cloud Platform Partner Executive, for an in-depth webinar where we will discuss best practices for securing applications running on Azure and in multi-cloud deployments, including: 

• Five things you must consider when securing applications running on Azure or multi-cloud deployments 
• Tips for addressing your responsibilities in the Microsoft Azure Shared Security Model 
• Case study: Learn how Bentley Systems addressed customer and compliance requirements in their multi-cloud deployments
Recorded Feb 15 2017 35 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Vince Bryant, Cloud Platform Partner Executive
Presentation preview: Best Practices for Protecting Your Applications on Azure

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Security Redefined: The Journey to Increased Security Maturity Apr 23 2020 4:00 pm UTC 45 mins
    John Pirc, Director, Product Manager at Alert Logic
    As we head into 2020, the one thing constant is change. There continues to be change in the threat landscape, change in regulations, change among security vendors, and change in the form of new technologies. All of this change can lead to both confusion and complexity. Security professionals agree that in order to reduce risk for their organizations they should simplify operations. The challenge is understanding where to start.

    Join John Pirc, Director, Product Management at Alert Logic, as he shares his knowledge in the fourth of a four-part webinar series aimed to demystify and educate on the fundamentals of cybersecurity today. Attendees will gain insights to help evolve their security strategies to confidently reduce risk and complexity within their own organizations.

    In the fourth session, The Journey to Increased Security Maturity, you will learn about:

    • Raising security maturity of an organization
    • The role of partners on your journey
    • Establishing and measuring KPI's

    John Pirc is a seasoned security expert with multinational security and business experience spanning over 20 years. John is a published author and frequently takes the stage to speak at Security industry events and has been interviewed on multiple live TV engagements. John’s greatest professional achievements include working for the Central Intelligence Agency, authoring three books, and being published in Time Magazine.

    Alert Logic is the industry’s first SaaS-enabled managed detection and response (MDR) provider, delivering unrivaled security value. Our purpose-built technology and team of MDR security experts protect your organization and empower you to resolve whatever threats may come. Founded in 2002, we are headquartered in Houston, Texas.
  • Stories from the SOC: Identifying infected machines through anomalous behavior Apr 21 2020 2:00 pm UTC 45 mins
    Dan Pitman, Principal Security Architect & Aled Evans, Solution Engineer
    Polymorphic malware is notoriously hard to detect, requiring more than a signature-based approach. In this Story from the SOC learn about how Alert Logic detected the Emotet malware through analysis of unusual behaviour on a customer’s network.

    A Security Operations Center (SOC) provides proactive threat monitoring, threat detection, and advice to stop threats quickly. But you may be surprised at what goes on behind the scenes to keep you safe. Our SOC analysts monitor for malicious activity 24/7 to separate the needles you need to care about from the rest of the stack of needles. With cybersecurity experts watching over your business, you have the freedom to focus on what’s important —developing innovative solutions and growing your business.

    You’ll hear:

    • Real-world experiences and techniques used to defend against attempted attacks and breaches
    • Strategies to help you proactively identify and address high risk areas
    • The critical role a SOC plays in a 24/7 defensive cybersecurity strategy
  • Stories from the SOC: Discovering crypto miners and how the attacker reacted Apr 16 2020 2:30 pm UTC 45 mins
    Dan Pitman, Principal Security Architect & Josh Davies, Solution Engineer
    In this Story from the SOC learn about how Alert Logic detected and helped our customer eliminate cryptomining malware that had infected them before they joined us, and how we went on to clear out a strong foothold the attacker had gained.

    A Security Operations Center (SOC) provides proactive threat monitoring, threat detection, and advice to stop threats quickly. But you may be surprised at what goes on behind the scenes to keep you safe. Our SOC analysts monitor for malicious activity 24/7 to separate the needles you need to care about from the rest of the stack of needles. With cybersecurity experts watching over your business, you have the freedom to focus on what’s important —developing innovative solutions and growing your business.

    You’ll hear:

    • Real-world experiences and techniques used to defend against attempted attacks and breaches
    • Strategies to help you proactively identify and address high risk areas
    • The critical role a SOC plays in a 24/7 defensive cybersecurity strategy
  • Security Redefined: Understanding Different Security Controls Apr 9 2020 4:00 pm UTC 45 mins
    John Pirc, Director, Product Manager at Alert Logic
    As we head into 2020, the one thing constant is change. There continues to be change in the threat landscape, change in regulations, change among security vendors, and change in the form of new technologies. All of this change can lead to both confusion and complexity. Security professionals agree that in order to reduce risk for their organizations they should simplify operations. The challenge is understanding where to start.

    Join John Pirc, Director, Product Management at Alert Logic, as he shares his knowledge in the third of a four-part webinar series aimed to demystify and educate on the fundamentals of cybersecurity today. Attendees will gain insights to help evolve their security strategies to confidently reduce risk and complexity within their own organizations.

    In the third session, Understanding Different Security Controls, you will learn about:

    • Endpoint, network, cloud
    • Mapping best practices to regulatory compliance
    • Addressing the security gaps

    John Pirc is a seasoned security expert with multinational security and business experience spanning over 20 years. John is a published author and frequently takes the stage to speak at Security industry events and has been interviewed on multiple live TV engagements. John’s greatest professional achievements include working for the Central Intelligence Agency, authoring three books, and being published in Time Magazine.

    Alert Logic is the industry’s first SaaS-enabled managed detection and response (MDR) provider, delivering unrivaled security value. Our purpose-built technology and team of MDR security experts protect your organization and empower you to resolve whatever threats may come. Founded in 2002, we are headquartered in Houston, Texas.
  • Compliance: Staying One Step Ahead Recorded: Apr 2 2020 11 mins
    Tony Bailey, Director of Product Marketing
    On average companies are allocating up to 14.3%1 of their IT budget on compliance solutions. In addition, companies are forced to dedicate a significant amount of employee resources for managing these solutions.

    A recent PCI compliance survey found that only 10% of companies were fully compliant2. As the number of breaches continues to increase, compliance standards will only become more rigorous. How can your company stay ahead of compliance without exhausting your resources and budget?

    In this webinar, we will share how you can stay diligent when it comes to compliance with help from Alert Logic. We will discuss how we can help meet compliance requirements across multiple regulations with application monitoring and log management. We are helping companies stay one step ahead of compliance without exhausting their security resources.

    [1] Ponemon Institute report: The True Cost of Compliance with Data Protection Regulations

    [2] 2018 SecurityScorecard Retail Cybersecurity Report
  • Security Redefined: Demystifying Regulatory Compliance Recorded: Mar 26 2020 43 mins
    John Pirc, Director, Product Manager at Alert Logic
    As we head into 2020, the one thing constant is change. There continues to be change in the threat landscape, change in regulations, change among security vendors, and change in the form of new technologies. All of this change can lead to both confusion and complexity. Security professionals agree that in order to reduce risk for their organizations they should simplify operations. The challenge is understanding where to start.

    Join John Pirc, Director, Product Management at Alert Logic, as he shares his knowledge in the second of a four-part webinar series aimed to demystify and educate on the fundamentals of cybersecurity today.

    In the second session, Demystifying Regulatory Compliance, you will learn about the following frameworks:

    •PCI-DSS
    •GDPR
    •HIPAA

    John Pirc is a seasoned security expert with multinational security and business experience spanning over 20 years. John is a published author and frequently takes the stage to speak at Security industry events and has been interviewed on multiple live TV engagements. John’s greatest professional achievements include working for the Central Intelligence Agency, authoring three books, and being published in Time Magazine.

    Alert Logic is the industry’s first SaaS-enabled managed detection and response (MDR) provider, delivering unrivaled security value. Our purpose-built technology and team of MDR security experts protect your organization and empower you to resolve whatever threats may come. Founded in 2002, we are headquartered in Houston, Texas.
  • Security Redefined: Current Frameworks and Best Practices Recorded: Mar 19 2020 29 mins
    John Pirc, Director, Product Manager at Alert Logic
    As we head into 2020, the one thing constant is change. There continues to be change in the threat landscape, change in regulations, change among security vendors, and change in the form of new technologies. All of this change can lead to both confusion and complexity. Security professionals agree that in order to reduce risk for their organizations they should simplify operations. The challenge is understanding where to start.

    Join John Pirc, Director, Product Management at Alert Logic, as he shares his knowledge in the first of a four-part webinar series aimed to demystify and educate on the fundamentals of cybersecurity today. Attendees will gain insights to help evolve their security strategies to confidently reduce risk and complexity within their own organizations.

    In the first session, Current Frameworks and Best Practices, you will learn about:

    •NIST and Mitre Att&ck frameworks
    •Aligning security controls to frameworks
    •Best practices that apply to on-premise, cloud and hybrid cloud

    John Pirc is a seasoned security expert with multinational security and business experience spanning over 20 years. John is a published author and frequently takes the stage to speak at Security industry events and has been interviewed on multiple live TV engagements. John’s greatest professional achievements include working for the Central Intelligence Agency, authoring three books, and being published in Time Magazine.

    Alert Logic is the industry’s first SaaS-enabled managed detection and response (MDR) provider, delivering unrivaled security value. Our purpose-built technology and team of MDR security experts protect your organization and empower you to resolve whatever threats may come. Founded in 2002, we are headquartered in Houston, Texas.
  • Security Redefined: Current Frameworks and Best Practices Recorded: Mar 12 2020 30 mins
    John Pirc, Director, Product Manager at Alert Logic
    As we head into 2020, the one thing constant is change. There continues to be change in the threat landscape, change in regulations, change among security vendors, and change in the form of new technologies. All of this change can lead to both confusion and complexity. Security professionals agree that in order to reduce risk for their organizations they should simplify operations. The challenge is understanding where to start.

    Join John Pirc, Director, Product Management at Alert Logic, as he shares his knowledge in the first of a four-part webinar series aimed to demystify and educate on the fundamentals of cybersecurity today. Attendees will gain insights to help evolve their security strategies to confidently reduce risk and complexity within their own organizations.

    In the first session, Current Frameworks and Best Practices, you will learn about:

    •NIST and Mitre Att&ck frameworks
    •Aligning security controls to frameworks
    •Best practices that apply to on-premise, cloud and hybrid cloud

    John Pirc is a seasoned security expert with multinational security and business experience spanning over 20 years. John is a published author and frequently takes the stage to speak at Security industry events and has been interviewed on multiple live TV engagements. John’s greatest professional achievements include working for the Central Intelligence Agency, authoring three books, and being published in Time Magazine.

    Alert Logic is the industry’s first SaaS-enabled managed detection and response (MDR) provider, delivering unrivaled security value. Our purpose-built technology and team of MDR security experts protect your organization and empower you to resolve whatever threats may come. Founded in 2002, we are headquartered in Houston, Texas.
  • Security Maturity: Bridging the Talent and Skills Gap Recorded: Feb 13 2020 43 mins
    Chris Noell, Senior Vice President, Product, and Joey Peloquin, Director, Product Management
    Companies of every size and across every industry need to have appropriate resources and solutions to defend against cyber attacks. For many organizations, the myriad of security technologies and solutions, and the volume and tenacity of cyber threats, can make the challenge seem overwhelming to manage on their own. Budgets are tight — it can be a struggle to keep security solutions current, let alone maintain an appropriate number of qualified staff or incorporate critical up-to-date threat research and intelligence in day-to-day operations.

    Join this webinar to hear security experts speak plainly about the challenge of maturing security programs in the age of the talent and skills gap, and alternative solutions that don’t involve the implementation of disparate tools or onboarding of expensive outsourcing providers. SIEMless Threat Management from Alert Logic provides the right level of coverage for the right resources, designed to fit your security needs, without breaking the bank.
  • Compliance: Staying One Step Ahead Recorded: Feb 4 2020 12 mins
    Tony Bailey, Director of Product Marketing
    On average companies are allocating up to 14.3%1 of their IT budget on compliance solutions. In addition, companies are forced to dedicate a significant amount of employee resources for managing these solutions.

    A recent PCI compliance survey found that only 10% of companies were fully compliant2. As the number of breaches continues to increase, compliance standards will only become more rigorous. How can your company stay ahead of compliance without exhausting your resources and budget?

    In this webinar, we will share how you can stay diligent when it comes to compliance with help from Alert Logic. We will discuss how we can help meet compliance requirements across multiple regulations with application monitoring and log management. We are helping companies stay one step ahead of compliance without exhausting their security resources.

    [1] Ponemon Institute report: The True Cost of Compliance with Data Protection Regulations

    [2] 2018 SecurityScorecard Retail Cybersecurity Report
  • Security Maturity: Bridging the Talent and Skills Gap Recorded: Dec 11 2019 43 mins
    Chris Noell, Senior Vice President, Product, and Joey Peloquin, Director, Product Management
    Companies of every size and across every industry need to have appropriate resources and solutions to defend against cyber attacks. For many organizations, the myriad of security technologies and solutions, and the volume and tenacity of cyber threats, can make the challenge seem overwhelming to manage on their own. Budgets are tight — it can be a struggle to keep security solutions current, let alone maintain an appropriate number of qualified staff or incorporate critical up-to-date threat research and intelligence in day-to-day operations.

    Join this webinar to hear security experts speak plainly about the challenge of maturing security programs in the age of the talent and skills gap, and alternative solutions that don’t involve the implementation of disparate tools or onboarding of expensive outsourcing providers. SIEMless Threat Management from Alert Logic provides the right level of coverage for the right resources, designed to fit your security needs, without breaking the bank.
  • Five Recommendations to Strengthen Your Security Program Recorded: Nov 21 2019 57 mins
    Jack Danahy - SVP, Security
    Cyber attack methods have evolved aggressively to become more targeted, more sophisticated, and more frequent. For this webinar we have distilled 5 of the most common and urgent problems that enterprises face, and will share our analysis of the issues and practical recommendations for addressing them within your own security program.

    Join Jack Danahy, SVP, Security, as he outlines steps to:

    •Track and combat the evolving threat landscape
    •Increase visibility and resistance at the attack surface
    •Battle alert fatigue and the security talent shortage
    •Define a cyber-risk baseline and process for your security program

    Attendees will receive a Security Workbook with steps to take within the next 30 days to assess and improve their enterprise security program.
  • Beyond AV: Adding Protection for Fileless Techniques Recorded: Oct 23 2019 33 mins
    Tony Bailey, Director of Product Marketing, and John Pirc, Director, Product Management
    Over 90% of breaches begin with a compromise initiated by an end user. And, IT teams spend significant time chasing false positives and negatives with over 55% of alerts resulting in false-positives.

    One recent survey uncovered that 62% of attacks in 2019 would be file-based while 38% would be fileless attacks. Alert logic understands the need for an endpoint solution that isn’t reliant on signatures as they do not scale with the current threat surface today and tomorrow.

    In this webinar we will share how Alert Logic Essentials extended endpoint protection uniquely addresses these challenges and walk through some of the product features.

    Alert Logic’s endpoint protection intelligently blocks attacks through a combination of machine-learning attribute analysis and real-time behavior analysis and provides deep CPU-level visibility without impacting performance.

    2018 Verizon Data Breach Investigations Report (DBIR)

    2018 Ponemon Institute State of Endpoint Security Risk
  • SOC Analysts in Action Recorded: Sep 19 2019 58 mins
    Dan Pitman, Principal Security Architect - Ben Nguyen, Security Analyst - Roy Bray, Security Analyst
    SOC analysts watch your back 24x7 – and they’ve seen it all. Hear what goes on on the front lines of cybersecurity.

    A Security Operations Center (SOC) provides proactive threat monitoring, threat detection, and advice to stop threats quickly. But you may be surprised at what goes on behind the scenes to keep you safe. Our SOC analysts monitor for malicious activity 24/7 to separate the needles you need to care about from the rest of the stack of needles. With cybersecurity experts watching over your business, you have the freedom to focus on what’s important —developing innovative solutions and growing your business.

    Hear first-hand how our SOC team works tirelessly to thwart attackers – from the analysts who understand security, technology and the business, and who’ve seen it all.

    You’ll hear:

    • Real-world experiences and techniques used to defend against attempted attacks and breaches
    • Strategies to help you proactively identify and address high risk areas
    • The critical role a SOC plays in a 24/7 defensive cybersecurity strategy

    Having fully managed, around-the-clock, expert threat monitoring and detection is critical for any business. But it doesn’t have to be complex or costly – join us to learn how.
  • Addressing Vulnerabilities and Threats from Dark Web Attacks Recorded: Sep 18 2019 34 mins
    Jack Danahy, SVP, Security of Alert Logic and Jeffrey Pearl, CEO of OTG Consulting
    Ever wonder how cheap it is to purchase malware or ransomware on the dark web? A recent study by a security firm, published the following dark web pricing:
    - Hacking a site and gaining full control over a web application costs only $150
    - Average cost of ransomware is $270 (In 2017, ransomware including WannaCry, NotPeyta, BadRabbit, Locky, and Cerber epidemics racked up attacks in excess of $1.5 billion)

    As the costs go down and the cyber threats go up using dark web technologies to infiltrate, you need an innovative security partner that stays ahead of the evolving threat landscape.

    Join us for 30 minutes on Wednesday, September 18 at 10:00 a.m. CT and learn how Alert Logic protects you against cyber-attacks. During this session, we will discuss:
    - Importance of threat monitoring and intrusion detection
    - Realities of SQL injection, DoS attacks, URL tampering, cross-site scripting attacks can have on your business
    - Advantages of detection capabilities including dark web scanning to spot and block malicious activity

    This is a session you don’t want to miss! Register today.
  • Why You Need Intelligence Driven Threat Detection to Stay Secure Recorded: Aug 8 2019 44 mins
    Jonny Milliken, Threat Research Manager and Kenny Lemmen, Security Analyst Team Lead
    The Importance of Integrating Threat Intelligence into Your Security Strategy to Counter Threats

    Any host exposed to the public internet is under constant bombardment from malicious actors, with a suite of attack tools which are growing in breadth and volume. This can make threat detection seem daunting, but it doesn’t have to be that way. By tethering your threat detection to an intelligence capability, you are able to identify and react to the most important threats as soon as attackers add them to their arsenal. In this webinar we will outline how Alert Logic approaches this problem and outline some of the recent successes which show its benefit.

    Topics Covered:

    • How the cyber threat landscape is evolving and driving new approaches to counter threats
    • A look under the hood of recent breaches
    • Why threat intelligence should be a key element of your security operations
  • AWS Security Reinforced Recorded: Jul 18 2019 53 mins
    Jeremy Breland, Principal Solution Architect and Dan Pitman, Principal Security Architect
    Key AWS RE:INFORCE Highlights and Security Guidance for Your AWS Workloads

    Join Alert Logic’s Jeremy Breland (Principal Solution Architect) and Dan Pitman (Principal Security Architect) as they discuss the news and goings on at the inaugural AWS RE:INFORCE conference focused on security, identity, and compliance. Learn about the conference, news you may have missed and Alert Logic’s take on the event as well as receive up to date guidance on how to approach security on your AWS Workloads.

    Key takeaways include:

    • Up-to-date security strategy and challenges in AWS
    • AWS Security Responsibilities
    • re:Inforce announcements and news
  • Critical New Insights About the SMB Threatscape Recorded: Jul 11 2019 43 mins
    Alert Logic
    Cybercriminals increasingly target small and midsized businesses with fewer security resources. With smaller budgets and real staff constraints, many organizations are seeking ways to be ‘security smart’ as they address risks and respond to attacks. And they need better help from security vendors — not just best practices and platitudes. As a result, SMBs are causing innovation in the security market by demanding new solutions like Managed Detection and Response (MDR) as they shift away from a DIY threat management model. The Critical Watch Report 2019: SMB Threatscape provides important insights based on security threat research, attack trends and findings from the Alert Logic Security Operations and Threat Intelligence teams.

    Attend this webinar to learn about the real threats and vulnerabilities facing your organization today and strategies to help you stay secure.

    Key takeaways include:

    - Overview of attacks, vulnerabilities & common attack pattern types seen in SMBs
    - Threat intelligence: Does your company need a partner?
    - What’s available on the Dark Web and what companies should do now
    - DIY Threat Intelligence: Analyzing the true costs
    - Avoiding “tool overload”: Tips to help SMBs address risk with clarity vs. confusion
  • Five Recommendations to Strengthen Your Security Program Recorded: Jul 1 2019 59 mins
    Jack Danahy - SVP, Security
    Cyber attack methods have evolved aggressively to become more targeted, more sophisticated, and more frequent. For this webinar we have distilled 5 of the most common and urgent problems that enterprises face, and will share our analysis of the issues and practical recommendations for addressing them within your own security program.

    Join Jack Danahy, SVP, Security, as he outlines steps to:

    •Track and combat the evolving threat landscape
    •Increase visibility and resistance at the attack surface
    •Battle alert fatigue and the security talent shortage
    •Define a cyber-risk baseline and process for your security program

    Attendees will receive a Security Workbook with steps to take within the next 30 days to assess and improve their enterprise security program.
  • Defending Against Cyber Threats: Hack Attack Recorded: Jun 27 2019 17 mins
    Graeme McMillan, Solutions Architect, Alert Logic
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, cyber attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to automated exploits that were previously only available to highly skilled nation-state actors.

    Unfortunately protecting an organisation against a cyber threat becomes impossible if you don’t know that the threat exists. So how do you protect your organisations against known and unknown threats? Security is constantly changing. To stay ahead of cyber threats, you need to leverage software plus services to augment your security team and capabilities.

    Join this webinar to hear about emerging threats and the current state of web application vulnerabilities. Learn about the most impactful web app attacks as well as remediation strategies. And take away best practices on how to ensure secure continuity in the cloud.

    Highlights Include:
    • Cyber Hack Demo
    • Insights from Alert Logic's 2018 Critical Watch Report
    • Understand how today’s vulnerabilities are being exploited
    • Realities for scaling threat detection & response across on-prem to cloud environments

    An exciting and very important demonstration for anyone who develops applications, manages websites or is interested in security.
Delivering unrivaled security value.
Alert Logic is the industry’s first SaaS-enabled managed detection and response (MDR) provider, delivering unrivaled security value. Since no level of investment prevents or blocks 100% of attacks, you need to continuously identify and address breaches or gaps before they cause real damage. With limited budget and expertise, this level of security can seem out of reach.


Our purpose-built technology and team of MDR security experts protect your organization and empower you to resolve whatever threats may come. Founded in 2002, Alert Logic is headquartered in Houston, Texas, with offices in Austin, Cardiff, London, and Cali, Colombia, and online at alertlogic.com. Alert Logic – our knowledge is your advantage.


Visit https://www.alertlogic.com and follow us on Twitter @alertlogic

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for Protecting Your Applications on Azure
  • Live at: Feb 15 2017 6:00 pm
  • Presented by: Vince Bryant, Cloud Platform Partner Executive
  • From:
Your email has been sent.
or close