Hi [[ session.user.profile.firstName ]]

Why do you need 24X7 SOC at your service

Watch this 4-min video to better understand what is MDR (Managed Detection and Response), and how AWN CyberSOC delivers vigilant cybersecurity through 24X7 monitoring, cloud-based SIEM and customer-dedicated security engineers.
Recorded Jul 19 2016 4 mins
Your place is confirmed,
we'll send you email reminders
Presented by
New Corporate Video
Presentation preview: Why do you need 24X7 SOC at your service

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • SOC-as-a-Service, MDR, MSSP or SIEM. Oh my! What’s right for SMEs? Mar 6 2018 6:00 pm UTC 60 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    With small to mid-size enterprises (SMEs) being increasingly targeted by cyber security attacks, the demand for a solution that provides comprehensive visibility into cyber security threats is now more important than ever before. Amid these concerns, SMEs are also dealing with a shortage of cyber security skills in IT-staffs and the lack of budgets to detect and respond to advanced threats. So, what solutions are currently on the market? What are their pros and cons when it comes to managed detection and response?

    In this webinar, gain key insights into the differences between cybersecurity solutions SOC-as-a-Service, MDR, MSSP, and SIEM, and discover which solution is the best fit for your organization.

    After watching, you will discover why:
    • Cloud-based security-as-a-service is gaining momentum with SMEs
    • SIEM is a great technology for those who can manage it on their own
    • MSSP is great for outsourced security management, but not an answer for better cybersecurity
    • SOC-as-a-Service are the turnkey service that SMEs are looking for

    To determine what’s the best fit for your organization’s security, register now.
  • CEO Insights: 2018's Top Cyber Security Predictions Feb 27 2018 6:00 pm UTC 60 mins
    Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks
    As you explore new opportunities to drive business growth in 2018, so are cyber criminals retooling their war chest to exploit your business. As we have seen in 2017, no one is safe.

    In this webinar, Brian NeSmith, CEO and co-founder of Arctic Wolf Networks, will share his insights on the top 7 predictions to look out for in 2018.

    Here is a preview of the top 3 predictions that is bound to surprise you.
    - AI will not improve security. You will need Hybrid-AI.
    - The US voting system will undergo major changes
    - A major corporation will get caught with its sticky hands in the cookie jar

    With these challenges, investing in prevention tools alone is not enough to counteract new cyber-attacks. Focusing on threat detection and response becomes necessary to address these sophisticated attacks that will continue to bypass their perimeter defenses.

    To learn more about these 2018 predictions and to see how you can protect your on-premise IT infrastructure and cloud-based resources, with an industry leading SOC-as-a-service, register now.

    About our speaker:
    Brian NeSmith brings more than 30 years of experience, most recently as former CEO of Blue Coat Systems, where he increased company revenues from $5M/year to over $500M/year as the industry’s leading web proxy platform. Prior to Blue Coat Brian was the CEO of Ipsilon Networks (acquired by Nokia) which became the leading appliance platform for Check Point firewalls. His early career includes product management, marketing, and general management at Newbridge Networks. He was also a consultant for Network Strategies, Inc. Brian graduated from Massachusetts Institute of Technology with a bachelors of science in electrical engineering.
  • Discover the SIEMple Life with a Managed SOC Recorded: Feb 15 2018 59 mins
    Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager at Arctic Wolf Networks
    Most security information and event management (SIEM) customers are struggling to achieve meaningful success a year or more after initial deployment. This is especially true with mid-market companies, where shrinking IT security budgets and shortage of skilled cyber security resources have forced them to reconsider investing in a SIEM, and seriously look at managed security services options.

    Before CIOs/CISOs take a leap of faith into any kind of managed security service, they want to be able to measure ROI with an outsourced managed solution, as opposed to managing their own SIEM. In this webinar, hear from security experts on:
    - What does it take to build and manage your own SIEM in-house?
    - What security SIEM blind spots can you avoid with a managed security service?
    - How do you determine ROI of a managed service as compared to a SIEM?
  • How One City Boosted Its Cyber Protection 10X with Hybrid AI Recorded: Feb 13 2018 37 mins
    Steve Davidek, IT Manager, City of Sparks; Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    Governments, credit reporting agencies, and hospitals are increasingly victimized by ransomware attacks and data breaches. It seems businesses of every size and stripe risk becoming targets of cyberattacks. So, how do you defend yourself? What do you do when your IT staff lacks the expertise to investigate growing security threats and respond to them in a timely manner? How do you get help from security experts to prevent suffering a future breach?

    Join Arctic Wolf Network’s customer, the City of Sparks (NV), and discover the security challenges faced by most governments and business organizations. Learn how our industry-leading security operations center (SOC)-as-a-service–the AWN CyberSOC–helped the City of Sparks vastly improve its threat detection and response.

    In this webinar, we will explore:
    - Key security challenges that plagued the City of Sparks
    - Reasons why Sparks’ IT team chose our SOC-as-a-service solution instead of building one in-house
    - How AWN CyberSOC™ with Hybrid AI improved Sparks’ threat detection and response by 10X

    Don’t let your organization become a prime target. Register today!

    About our key speaker:
    Steve Davidek has worked in the IT division at the City of Sparks starting as a Computer Operator in 1984 and working in IT Operations for the next 30 years.  He was appointed IT Manager in March of 2014. 

    Steve’s division is responsible for all Technology projects and budgeting. His team of 8 manages everything from Desktop support, Server Management, Networking, Security, and Systems. Development and Management for all departments at the city including Police, Fire, Public Works, Finance, Planning, City Management, Municipal Court and Recreation. 
  • Hybrid Defense: How to Defeat 2018's Biggest Threats Recorded: Feb 8 2018 32 mins
    Louis Evans, Product Marketing Manager - Arctic Wolf Networks
    There’s one certainty in cybersecurity: next year’s attacks are going to be even worse than the ones we faced this year. So, how are cybersecurity experts and vendors gearing up to meet these new threats? In this webinar, we’ll touch on major industry trends like User Behavior Analytics and automated incident response, and take a deep dive into how three key innovations—hybrid AI, hybrid cloud security, and hybrid IT teams—are enabling even cash-strapped organizations to deploy world-class defenses.

    We’ll discuss how:

    - Human-AI hybrid solutions deliver security that’s more than the sum of its parts
    - SIEM solutions are rising to the challenge of new hybrid-cloud architectures for business
    - Expert-as-a-service solutions are transcending the challenges posed by both in-house and traditional consulting staffing strategies

    To see how you can beat the big threats of 2018, register now!
  • How to Defeat 2018's Biggest Threats with the Hybrid Defense? Recorded: Jan 31 2018 2 mins
    Louis Evans, Product Marketing Manager - Arctic Wolf Networks
    To see how you can beat the big threats of 2018 with Hybrid AI, check out our brief video clip on the importance of a security operations center with Hybrid AI.
  • Why Native Security Features in AWS and Office365 aren't Enough Recorded: Jan 30 2018 48 mins
    Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager
    Most businesses are rapidly moving to the cloud to be fast and nimble, reduce their cost structure, and reach more customers anywhere, anytime. These new architectures have powerful new capabilities—but also expose businesses to a new universe of risk.

    When dealing with outsourced infrastructure like AWS, or a SaaS solution like Office365, it is easy for IT managers to assume that security is out of their hands, for better or worse. But, this assumption may not always be true. Businesses must develop an active cloud security strategy as they pursue their migrations, and become a proactive security partner with their cloud providers—or they will find themselves vulnerable to attack.

    In this upcoming webinar, hear from security experts at Arctic Wolf Network (AWN), on:

    - The top cybersecurity risks and best practices for securing cloud deployments
    - How AWN security monitoring compliments the native security features in AWS and Office365
    - The role of AWN cloud security in integrating observations from cloud and on-premise systems

    To see how AWN CyberSOC™ can secure your cloud, register now.

    About our speakers:

    Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.

    Louis Evans is a new member of the Arctic Wolf team. He’s passionate about cybersecurity, defeating the next generation of threats, and Alan Turing.
  • Breaking Down Cloud Security: Discover What it Means to You Recorded: Jan 23 2018 37 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine
    Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.

    Join us as we discuss:

    - How cloud security differs from a public cloud, a private cloud or a hybrid cloud
    - How cloud technologies impact a company's security options
    - How do you defend against attacks of third-party providers of IT services
    - How to develop policies and procedures to test and evaluate servers over which you have no physical control

    To better understand what cloud security means to you, register now.
  • Hybrid-AI: Boost Cybersecurity with Human Augmented Machine Learning Recorded: Jan 17 2018 48 mins
    Matthew Thurston, Chief Architect - Arctic Wolf Networks
    Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?

    In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.

    We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.

    After attending, you will be able to:

    - Recognize how AI and Machine Learning are typically used in Cyber Security, and what are the gaps
    - Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
    - Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks

    About our guest speaker:

    Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
  • Human vs Machine: Is Hybrid AI SOC in Your Security's Future? Recorded: Jan 11 2018 31 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine
    Watch this webcast for an in-depth conversation about Hybrid AI and get clarification on the following:

    - Artificial Intelligence versus Hybrid AI
    - Hybrid AI when applied to a SOC
    - Incident response (human versus machine-driven)

    There will also be discussions around the following questions:

    - Can machines make decisions?
    - Can Hybrid AI systems operate autonomously?
    - What is missing in a SOC? How can Hybrid AI be added to a SOC?
    - Can Hybrid AI help alleviate staffing shortage?
  • Insights from City of Sparks' IT Decision Maker—Steve Davidek Recorded: Jan 10 2018 3 mins
    Steve Davidek, IT Manager, City of Sparks; Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    In this brief, video clip hear insights from the City of Sparks (NV) IT Manager, Steve Davidek, on the security challenges faced by most governments and business organizations. Learn how Arctic Wolf's industry-leading security operations center (SOC)-as-a-service–the AWN CyberSOC–helped the City of Sparks vastly improve its threat detection and response.
  • Cybersecurity choices: SIEM, MSSP, or SOC-as-a-Service? Recorded: Dec 12 2017 58 mins
    Sridhar Karnam, Director of Product Strategy at Arctic Wolf; Terry R., Exec Editor at SC Media
    Gain insight into three cybersecurity solutions: SIEM, MSSP, and SOC-as-a-Service. Discover which solution is the best fit for your organization based on some of the following criteria:

    - company size offerings
    - detection and response capabilities
    - deployment times
    - support and expertise

    Think you're too small for a SIEM or SOC-as-a-Service? This webinar will explain why you're not. Think you're too big for an MSSP? Find out if that's truly the case.
  • To SIEM or not to SIEM Recorded: Dec 7 2017 36 mins
    Sridhar Karnam, Director of Product Strategy; Stephen, host from SC Media
    Security information and event management (SIEM) has been a cornerstone of cybersecurity for years, but its future as a stand-alone product might well be in question. As advanced threat intelligence platforms, search engines, and other advanced tools come to market, we could be seeing a consolidation in how tools are packaged and marketed. This webcast will examine the following:

    - The motivations behind a security overhaul
    - SIEM as a core part of a SOC (security operations center)
    - Security without SIEM
    - Alerts versus actionable intel
    - The role of a SOC analyst
    - What makes up “a better SIEM?”
  • Technology is Not Enough: Discover Why a SOC is Not a SIEM Recorded: Nov 22 2017 2 mins
    Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager at Arctic Wolf Networks
    To see why you shouldn't rely on just a SIEM, watch this short video clip now.
  • CISO Insights: How to Eliminate Challenges in Fintech Compliance Recorded: Nov 16 2017 27 mins
    Angelo Purugganan, Chief Information Security Officer at Arctic Wolf Networks
    In today's business environment, most fintech transactions happen at a fast pace, served through web applications using a combination of mobile devices and legacy systems, with some level of protection. While beneficial to small and medium fintech companies, consumers and regulatory agencies are apprehensive about protecting customers personal data and detecting cyber attacks over the internet which impact the integrity of financial transactions.

    In this webinar, we are going to:

    - Explore top cyber threats that fintech companies face
    - Identify what are the Compliance regulations and standards that apply to fintech companies
    - Determine how continuous monitoring and security analytics help meet compliance regulations/standards requirements

    Chief Information Security Officer, Angelo Purugganan, will also be joining us in this discussion. He will be sharing his insights on how security analytics and continuous monitoring can simplify compliance using a SOC-as-a-Service provider.

    To see how you can eliminate challenges in fintech compliance, register now.

    About our CISO speaker:

    Angelo has 15+ years of information security and compliance and 10+ years of software development experience. He has led information security programs for cloud providers and various enterprise clients using frameworks, such as Trust Services Principles, PCI-DSS, HIPAA, FISMA, Euro Directives, ISO-27000, and SOX. He has conducted information security audits in sectors such as SaaS CRM providers, logistics and distribution, manufacturing supply chain, finance ERP, foreign exchange and hedging operations, airline and travel.
  • Top Data Breaches of 2017: Why Prevention Alone Was Not Enough Recorded: Nov 14 2017 46 mins
    Narayan Makaram - Senior Director of Product Marketing at Arctic Wolf Networks
    While 2017 was turning out to be a year of ransomware attacks, the mother of all data breaches was carried out on Equifax where the personal information of 146 million people was stolen. Even though these companies had invested in preventive security technologies, it did not stop cyber criminals from stealing sensitive information or bringing their businesses to a grinding halt.

    In this webinar, we will examine the top 3 cyber-attacks and data breaches of 2017, and discuss the following:

    - How were these cyber-attacks carried out?
    - Why preventive technologies were not enough to stop these attacks?
    - What type of detection and response capabilities and security expertise could have made a big difference?

    About our speakers:

    Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.
  • How to Build a Cost-Effective Security Operations Center (SOC) Recorded: Nov 7 2017 40 mins
    Sridhar Karnam, Director of Product Marketing, Arctic Wolf Networks
    A security operations center (SOC) is one of the most sophisticated operation centers focused on combating cyber crime and cyber attacks. Fortune 500 companies to government agencies use this daily to monitor users, apps, data, and network for threats and vulnerabilities. But, what if you’re not a Fortune 500 company? Can you justify the expense?

    Join us for a webinar on how to build a cost-effective SOC. We will discuss:

    - Is a cyber SOC the right fit for you
    - How to design a cyber SOC that aligns with your business security strategy
    - What are SOC alternatives for those who aren’t a Fortune 500
    - Should you consider SOC-as-a-Service
  • Is Your Compliance Mindset Leaving You at Risk? Recorded: Nov 2 2017 51 mins
    Dave Martin, Head of Product Management
    Digital businesses of all sizes are facing a myriad of new and complex threats. Passing regulatory compliance checks and adhering to security standards is a good first step, but that's not enough to protect your IT infrastructure from being compromised or suffering a data breach.

    CIOs/CISOs should stop focusing on check-box compliance just to meet regulatory requirements that apply to their industry (e.g. SOX, PCI, HIPAA/HITECH), and shift to a risk-based mindset. What does this mean to those in the small and medium business market segment?

    In this webinar, we will address the following 3 key principles for implementing a risk-based security mindset.

    - Determine how information flows, rather than controlling flow of information
    - Stop trying to perfectly protect your organization, and invest in detection and response
    - Accept the limitations of technology and become people-centric

    About our speaker:

    Dave Martin brings to Arctic Wolf more than 20 years of experience with IT security and networking technologies in a variety of engineering, product marketing, product management and business development roles. He currently serves as the Head of Product Management responsible for market positioning, product strategy and feature definition for our market leading CyberSOC services. Prior to joining Arctic Wolf, Mr. Martin has held executive and technical positions at companies including NSFOCUS, Edgewater Networks, Nokia, Ipsilon Networks and Newbridge Networks. Mr. Martin is a US Patent holder, a recognized security and networking expert and regular speaker at trade shows, partner conferences, insight panels, webinars and other industry events.
  • Tales from the Trenches: Cybersecurity War Stories Recorded: Oct 31 2017 35 mins
    Sam McLane, Head of Security Engineering, Arctic Wolf Networks; Narayan Makaram, Sr. Director of Product Marketing
    In today’s business environment, it’s imperative for organizations of all sizes to have a dynamic online presence. However, with always being connected, there comes real risk to your business. Ransomware attacks, like Petya and WannaCry, have demonstrated how businesses can be brought to a halt by locking access to business-critical data. So, how do you protect yourself? What should you be looking for?

    In this fire-side chat with Sam McLane, Head of Security Operations at Arctic Wolf Networks (AWN), hear some of the most interesting attacks that AWN security engineers have successfully hunted down in 2017. You will also get an inside look at:

    - The detection and response process 
    - The communication and teamwork that takes place between a robust Security Operations Center (SOC)-as-a-service and a customer
    - The impact of human augmented machine learning

    When it comes to security, you must take a proactive approach in assessing the risks and vulnerabilities. Register now to learn how!

    About our speaker:

    Sam McLane leads Security Engineering at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.
  • Day in the life of a CSE: Proactive Hunting for Security Threats Recorded: Oct 10 2017 46 mins
    Ross Phillips, Security Engineer at Arctic Wolf Networks and Sridhar Karnam, Director of Product Marketing
    Threat hunting, one of the hottest topics in cybersecurity, can be an important weapon for any IT security team. It focuses on identifying perpetrators who are already within an organization's systems and networks.

    In this webinar, Ross Phillips, a lead Security Engineer, will discuss:

    ▪ What is the difference between proactive hunting vs reactive hunting
    ▪ Even with the right forensic investigation tools, why hunting is still critical
    ▪ Key hunting methods, tools, and techniques

    Security threats can remain hidden for months or even years before triggering an alert. If you wait, the consequences can be severe. Register now to learn more about the impact of proactive hunting when it comes to cyberthreats.

    About the speaker:

    Ross Phillips graduated from RIT in March 2012 with a degree in Information Security & Network Forensics. Since then Ross has worked doing security analysis, application testing and incident handling / response for companies such as Liberty Mutual, Paychex, and Google.
Managed Detection and Response Service - 24X7 SOC at your service
Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. AWN CyberSOC is anchored by Concierge Security Engineers and includes 24×7 monitoring, custom alerting and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf CyberSOC visit www.arcticwolf.com and follow @AWNetworks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Why do you need 24X7 SOC at your service
  • Live at: Jul 19 2016 5:40 pm
  • Presented by: New Corporate Video
  • From:
Your email has been sent.
or close