Hi [[ session.user.profile.firstName ]]

Comparing EDR, MDR, and MSSPs for Security Monitoring, Detection, & Response

With thousands of cybersecurity products and services available, most technology leaders still struggle to answer one question: "What do I really need to keep my team and our customers safe?"

Organizations need to monitor their environment to detect and respond to threats that inevitably crop up. There are three major approaches to solving this security conundrum: endpoint detection and response (EDR), managed detection and response (MDR), or managed security service provider (MSSPs). This webinar compares and contrasts the three approaches so you have the right questions in hand when considering your options.

What you will learn:
Why monitoring, detection and response is an essential element of a robust security strategy
What elements comprise the EDR, MDR, and MSSP solution approaches?
How do these approaches take advantage of the cloud as well as monitor cloud assets?
What is the security “sweet spot” for EDR, MDR and MSSP approaches?
Recorded Jan 15 2020 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Todd Thiemann
Presentation preview: Comparing EDR, MDR, and MSSPs for Security Monitoring, Detection, & Response

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Reducing Threat Impact with the Top 20 CIS Security Controls Recorded: Jun 24 2020 25 mins
    Lane Roush, VP of Presales Systems Engineering at Arctic Wolf
    For CISOs and IT managers, keeping up with the rapidly evolving threat landscape can feel like an impossible task.

    Whether you’re just starting to research new ways to strengthen your cybersecurity perimeter or seeking to build onto your existing security program, the CIS (Center for Internet Security) controls help institute basic security practices that are the foundation of leveraging best-in-class threat intelligence to produce security outcomes.

    Many experienced cybersecurity leaders are familiar with the CIS Critical Security Controls as a means of extending their cyber risk management practices beyond simple vulnerability management. CIS controls supplement almost every other security framework—including NIST, ISO 27001, PCI, and HIPAA—and are a useful baseline to develop or assess your security program.

    In this session, Lane Roush, VP of Presales Systems Engineering at Arctic Wolf, will walk through the top 20 CIS Critical Security Controls and best practices to implement them into your organization’s security strategy to reduce threat impact.
  • Account Takeover 101 Recorded: Jun 17 2020 59 mins
    Matt Duench, Arctic Wolf | Chip Witt, Spycloud
    The reuse of corporate credentials has been the #1 attack tactic for the last 3-4 years, and with everything else to worry about, protecting your organization from breaches and account takeovers (ATO) has never been a bigger challenge. New tools make it possible for even unsophisticated actors to perform advanced, widespread attacks that put your organization at risk.

    Regardless of the thoughtful measures and policies you have in place, from threat detection to password managers, nothing can protect you from human behavior, and that is the weakest link when it comes to ATO. Your employees may be reusing compromised passwords to access corporate systems or signing up for 3rd party services like LinkedIn or Fantasy Football using their work credentials. When these services are breached, your organization is at risk.

    Watch this webinar with Arctic Wolf and SpyCloud as they shine a light on how ATO happens—the attack timeline and the surprisingly unsophisticated criminal tactics bad actors are using today—and how to defend your enterprise despite employee and consumer bad password hygiene.

    Learning Objectives:

    The anatomy of an account takeover attack
    Real-world examples of how employee password reuse can threaten your enterprise
    Potential holes in your account takeover plan
    Considerations for reducing digital risk exposure
    What you can do to strengthen your security posture
  • Cybersecurity for Your Suddenly Remote Workforce Recorded: May 29 2020 52 mins
    Lane Roush, VP of Presales Systems Engineering at Arctic Wolf
    As COVID-19 continues to change daily work life around the globe, organizations are facing a challenging new cybersecurity reality. We put together actionable information for IT and security teams everywhere in our webinar: Cybersecurity for Your Suddenly Remote Workforce.

    During this webinar, we’ll cover the major topics from today's rapidly changing cybersecurity landscape.

    Hosted by Lane Roush, Arctic Wolf’s Vice President of Presales Systems Engineering, you’ll get an in-depth look at the evolving COVID-19 threat landscape as well as insights and recommendations based on what we’re seeing across our customer base.

    Arctic Wolf’s security engineers have seen first-hand the rise in COVID-19 related attacks, and we want to share tips to help you maintain and improve your security posture during these changing times.

    Watch this webinar to develop a better understanding of the challenges and solutions to protecting your organization in the reality of a remote workforce.
  • The Top 7 Cyberattacks Threatening Your Organization Recorded: May 29 2020 65 mins
    Louis Evans, Product Marketing Manager, Arctic Wolf
    As IT staffs struggle to protect ever-increasing risk surfaces from ever-multiplying cyberattacks, cybersecurity has never felt more complicated. But while the number of specific bugs, viruses, bots, and exploits is seemingly beyond measure, attacks often fall within the same handful of types. Understanding these attacks types will enable you can to create a security detection and response practice that keeps you protected regardless of the specific attack.

    In this webinar, attendees will learn:

    Why cyberattacks continue to plague organizations, even after they’ve implemented security point products
    Which common cyberattacks are most likely to impact business operations, and how
    Strategies to protect your organization as cyberthreats continue to evolve
  • Expecting the Unexpected: How Businesses Can Avoid Becoming a Target for Cybercr Recorded: Apr 21 2020 63 mins
    Louis Evans, Product Marketing Manager, Arctic Wolf
    As companies around the world grapple with how to transition normal business operations with newly distributed workforces, bad actors have wasted no time in capitalizing on overtaxed IT teams. From “Zoom-bombing” to increasingly aggressive phishing attempts, bad actors have changed their tactics to try to profit from suddenly remote work environments.

    In this webinar, we’ll break down new techniques cybercriminals have implemented to take advantage of mass disruption and uncertainty that remote work and learning environments have caused.
  • Comparing EDR, MDR, and MSSPs for Security Monitoring, Detection, & Response Recorded: Jan 15 2020 46 mins
    Todd Thiemann
    With thousands of cybersecurity products and services available, most technology leaders still struggle to answer one question: "What do I really need to keep my team and our customers safe?"

    Organizations need to monitor their environment to detect and respond to threats that inevitably crop up. There are three major approaches to solving this security conundrum: endpoint detection and response (EDR), managed detection and response (MDR), or managed security service provider (MSSPs). This webinar compares and contrasts the three approaches so you have the right questions in hand when considering your options.

    What you will learn:
    Why monitoring, detection and response is an essential element of a robust security strategy
    What elements comprise the EDR, MDR, and MSSP solution approaches?
    How do these approaches take advantage of the cloud as well as monitor cloud assets?
    What is the security “sweet spot” for EDR, MDR and MSSP approaches?
  • [PANEL] New in AI & ML Recorded: Dec 10 2019 55 mins
    Michelle Ruyle, Optimized Channel | Jennifer Galvin, Okta | Roselle Safran, Rosint Labs | Ian Hassard, Arctic Wolf
    Join this panel of security experts as they discuss the newest security solutions and strategies utilizing Artificial Intelligence and Machine Learning:

    -Best practices for improving security
    -Why your organization needs to be using AI and ML
    -How to take security to the next level

    Moderator:
    Michelle Ruyle, CEO & Founder, Optimized Channel
    Panelists:
    Jennifer Galvin, Field Alliances Enablement, Okta
    Roselle Safran, President, Rosint Labs
    Ian Hassard, Director of Product Management, Arctic Wolf Networks
  • Ransomware Reality: Dispelling the Myths Recorded: Dec 4 2019 60 mins
    Louis Evans
    Recent ransomware attacks have halted business operations, disrupted emergency services, and forced closures of schools, hospitals, and government entities.

    In October 2019, the FBI released a dire warning: prepare for increasingly sophisticated cyberattacks, or risk losing business-critical data permanently.

    In the face of mounting threats, organizations need to comes to terms with the grim reality that ransomware is not likely to disappear in the foreseeable future. In light of advanced, persistent attacks, IT teams need to have strategies in place to combat the growing threats.

    In this webinar, attendees will learn:
    - Why ransomware continues to be a growing problem
    - How to reduce your risk of ransomware
    - How to prepare your organization to respond to a ransomware incident
  • People Risk: Understanding Your Most Important & Most Vulnerable Assets Recorded: Oct 30 2019 35 mins
    Matt Duench
    99% of all cyberattacks require some level of human interaction or intervention. Bad actors follow the path of least resistance, so it’s no surprise that human behavior can be your organization’s biggest cybersecurity risk.

    Although no single approach is effective on its own in preventing negligence and insider threats; adding layers of people risk diligence to cybersecurity policies can greatly reduce your insider threat exposure.

    During this webinar, we’ll look at some recent examples of insider threats, cover methods for reducing your insider threat exposure, and focus on how you can minimize people risk from effective cyber security training to methods for managing your cyber risk profile.
  • 2019 Data Breaches: What We’ve Learned From The Worst Year in Cybersecurity Recorded: Oct 9 2019 56 mins
    Louis Evans, Product Marketing Manager, Arctic Wolf
    From global enterprises to small cities and counties, no industry was spared from cyberattacks in 2019. Millions of records were stolen, internal operations slowed to a halt, and communications teams worked overtime to explain exactly what happened to disgruntled stakeholders, despite a lack of immediate answers.

    For security leaders, 2019 breaches underscored that cyberattacks were no longer a question of “if?” but “when?”

    In this webinar, cybersecurity industry veteran Louis Evans will recap some of the most damaging breaches of 2019, including those experienced by Capital One, LabCorp and Quest, Texas local government entities, and U.S. Customs and Border Protection to understand what went wrong and how to protect your organization from similar threats.

    Attendees will learn:

    - Techniques employed by internal and external actors to access and steal sensitive information
    - Where breached organizations had weaknesses that could be exploited by cybercriminals
    - What lessons can be gleaned from 2019 cyberattacks, and how your organization can avoid becoming a target
  • Think Native Cloud Security Is Enough? Think Again Recorded: Sep 18 2019 64 mins
    Louis Evans, Product Marketing Manager at Arctic Wolf
    Nearly all organizations have some cloud footprint, from traditional businesses using SaaS office applications such as Salesforce or Office365, to cloud-first firms running exclusively in AWS or Azure. These cloud solutions offer powerful new ways to drive business efficiencies—but they also expose companies to a new universe of risk.

    IT managers may mistakenly assume that cloud security is out of their hands, for better or worse. But this assumption isn’t true. That’s why it’s incumbent upon businesses to develop a sound security strategy as they migrate to the cloud, while also becoming a proactive security partner with their cloud providers. If not, they’ll find themselves vulnerable to attack.

    This webinar offers strategic insight on how to bolster your cloud security, as Arctic Wolf experts discuss:
    - The top cybersecurity risks–and best practices for securing cloud deployments
    - How Arctic Wolf™ Managed Detection and Managed Risk complement cloud-native security features across major cloud platforms
    - Arctic Wolf’s role in integrating observations from cloud and on-premise systems

    See how Arctic Wolf can secure your cloud. REGISTER NOW!
  • The Importance of Risk Management Solutions in the “Age of the Breach” Recorded: Aug 20 2019 33 mins
    Matt Duench, Product Marketing Manager, Arctic Wolf
    As you read this, a business somewhere is falling victim to a new cyberattack and potentially losing millions of dollars. That’s because on average it takes hackers only a week to exploit new vulnerabilities, while businesses take four months to patch them. Don’t let your company be next.

    Attend this important webinar on vulnerability assessment and risk management where security expert Matt Duench from Arctic Wolf examines the challenge of breaches, how they happen, and what you can do to stop them. Find out:
    - Why the cybersecurity skills shortage leaves companies especially vulnerable
    - How to extend your perimeter security with risk management
    - How a SOC-as-a-service provides comprehensive security for companies of every size
  • Benefits of Building vs Buying Your Security Recorded: Jun 5 2019 53 mins
    Michael Suby, VP, Research - Frost & Sullivan & Louis Evans, Product Marketing Manager - Arctic Wolf Networks
    Frost & Sullivan TCO Analysis: Building Your Own SOC vs. Buying SOC-as-a-Service

    For modern businesses, a Security Operations Center (SOC) is no longer an option. It is a necessity. But building and maintaining a fully functional SOC is a daunting proposition. Cost is a top consideration, driven overwhelmingly by a SOC’s need for a high number of in-demand security experts. Hiring, training, and retaining the necessary talent to staff a SOC is flatly impractical for many businesses.

    Fortunately there is a viable alternative to a DIY SOC: SOC-as-a-Service.

    In this webinar, Michael Suby, VP of Research at Frost & Sullivan, will highlight the compelling value proposition of SOC-as-a-Service compared to building and maintaining an in-house SOC. Included in this webinar are:

    - Real-world use cases of businesses subscribing to SOC-as-a-Service
    - Head-to-Head quantitative cost comparisons between SOC-as-a-Service and DIY SOC
    - Attributes to demand in a SOC-as-a-Service offering

    About our key speaker:

    A 17-year veteran at Frost & Sullivan, Michael Suby, VP of Research, has concentrated on the evolving threat landscape, practices, and technologies in cybersecurity. Quick to engage on risk and response, Mr. Suby habitually examines emerging cybersecurity technologies before they reach mainstream. Recent examples include server-less security, deception, dynamic defenses, content disarm & reconstruct, remote browser isolation, and cloud access & security brokers (CASB). In partnership with a team of highly experienced cybersecurity analysts at Frost & Sullivan, Mr. Suby is also intimately involved in researching how traditional cybersecurity solutions and platforms are addressing the diverse challenges and pressures encountered by IT and security practitioners.
  • To Outsource, or Not To Outsource: Best Practices for IT Security Recorded: May 22 2019 62 mins
    Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf
    With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

    By attending, you’ll:

    - Understand best practices for working most effectively with third party providers
    - Discover what security functions can be handled by third parties and what should be kept in-house
    - Recognize how to avoid common pitfalls of working with third parties
    - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

    Save your seat now to learn more!
  • Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For Recorded: May 8 2019 39 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?

    In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).

    After attending you will:

    - Recognize what are the top 5 attack vectors and the counter-measures you can take
    - Understand the importance of detection and response in the kill-chain for each attack vector
    - Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them

    Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
  • Cybersecurity Mythbusters: 6 Dangerous Cybersecurity Myths Debunked Recorded: Apr 25 2019 48 mins
    Louis Evans, Product Marketing Manager & Todd Thiemann, Director of Product Marketing - Arctic Wolf Networks
    At Arctic Wolf, we continually encounter IT security myths that persist among businesses of every size. Isn’t antivirus all you need for cybersecurity? Aren’t large enterprises the only ones affected by data breaches? 24x7 security monitoring is overkill, right? These myths can significantly impact strategic IT decisions and put your business operations at risk.

    These are the kinds of questions, myths, and cybersecurity urban legends we’ll explore in this webinar. Discover what’s true—and what’s simply a myth.

    The webinar covers:

    •6 common myths about cybersecurity and cyber risk
    •The threats these myths pose to your business
    •Cybersecurity facts you can use to protect yourself

    Let the Arctic Wolf Cybersecurity Mythbusters team educate and entertain you. Save your seat now!

    And click here: http://bit.ly/2B3lyFv for part one of our six-part “mythbuster” blog series.
  • The SOC-as-a-Service Prescription: Healthcare Cybersecurity & Compliance Recorded: Apr 17 2019 37 mins
    Todd Thiemann, Director Product Marketing - Arctic Wolf Networks
    Monitoring and detecting threats in healthcare faces a number of challenges: sophisticated cyberthreats, HIPAA compliance requirements, budget constraints, and a cybersecurity talent shortage for staff needed to monitor and respond to events. Previous approaches to monitoring have been ineffective and expensive. Managed detection and response (MDR) services provide a way out of this cybersecurity conundrum. This webinar explains how healthcare organizations can improve cybersecurity and compliance with MDR/Security Operations Center (SOC)-as-a-service.

    Join us and discover:
    • The ways a managed detection and response (MDR) service differs from managed security services (MSS).
    • How MDR/SOC-as-a-service provides big savings compared to in-house security info and event management (SIEM) tools.
    • How MDR/SOC-as-a-service helps to fulfill HIPAA compliance requirements.
    • The ways an MDR/SOC-as-a-service improves healthcare security posture and alleviates the cybersecurity talent shortage.

    Save your seat now!
  • Take Control of Vulnerabilities and Threats with Intuitive Risk Analytics Recorded: Apr 16 2019 44 mins
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks
    Vulnerabilities, threats, and risks are commonly mixed up security terms. Several cybersecurity solutions available in the market today give you independent analytics in each of these areas. that does not give you complete understanding of your overall risk posture.

    In this webinar, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will cover the following topics to enable you to address cyber risk.
    • Why vulnerabilities and threats are two sides of the same coin
    • How threat intelligence can be effectively used to add context to risks
    • What types of analytics can address risks that have the largest business impact
  • Let's Talk About Security IT: Discover Why 24x7 Monitoring is Critical Recorded: Apr 11 2019 51 mins
    Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to exploits that were previously only available to highly skilled nation-state actors.

    Without access to the large IT budgets to fend off these bad actors, small and medium businesses continue to struggle with determining the right approach to cyber security. Lacking the resources to build or staff a Security Operations Center (SOC), companies continue to invest in endpoint and perimeter security products. However, even with several security products deployed, breaches keep occurring. So, is there a way you could detect data exfiltration attempts early, even if the attackers were able to evade your endpoint defense mechanisms?

    In this webinar, we talk about:

    - Why investing heavily in endpoint and perimeter security products may not be enough
    - The top reasons why 24x7 security monitoring is critical to defend your business from today’s attackers
    - How you can transform your cyber security strategy today with advanced threat detection and response

    To discover why 24x7 monitoring is critical, register now.
  • Expert Tips on Detecting and Responding to Data Breaches Recorded: Mar 28 2019 22 mins
    Brad Bierman, Manager of Security Operations - Arctic Wolf Networks
    It is not a matter of if but when a data breach will occur, and whether your IT organization is prepared to detect and respond to it. Experienced hackers are constantly inventing ways to get through your defenses and steal company confidential data or personal identifiable information (PII) to make money. Focusing on prevention alone is not sufficient.

    Brad Bierman, Director of Security Operations at Arctic Wolf Networks, and his team of Concierge Security™ Engineers have helped hundreds of customers detect and respond to data breaches. He will walk through a few cyberattack scenarios and provide expert tips on the following.

    1.What tools do you need to have in place to detect a data breach?
    2.Who do you need to engage to respond to a data breach?
    3.How do you respond appropriately to data breach?

    To learn more, join this webinar!

    About our key speaker:

    Brad Bierman has over 17 years of varied experience in the information security field. Some highlights are communications interceptions, SIEM engineering, mobile and computer forensics, security monitoring, and incident response. Prior to becoming a security professional, Brad was a hardware/firmware engineer for embedded networking solutions.
Managed Detection and Response Service - 24X7 SOC at your service
Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity. The AWN CyberSOC™ service is anchored by Concierge Security™ teams who provide custom threat hunting, alerting, and reporting. Arctic Wolf’s purpose-built, cloud-based service offers 24x7 monitoring, vulnerability assessment, threat detection, and response. For more information about Arctic Wolf, visit https://arcticwolf.com.

Don't forget to follow us on Twitter @AWNetworks!

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Comparing EDR, MDR, and MSSPs for Security Monitoring, Detection, & Response
  • Live at: Jan 15 2020 6:00 pm
  • Presented by: Todd Thiemann
  • From:
Your email has been sent.
or close