Hi [[ session.user.profile.firstName ]]

OpenDNS Umbrella

OpenDNS Umbrella is a cloud-delivered network security service
that protects any device, no matter where it’s located.
Recorded Oct 20 2015 2 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Presentation preview: OpenDNS Umbrella

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Holy Grail of Incident Response: A Single, Correlated Source of Intelligence Recorded: Oct 18 2016 27 mins
    Atheana Fulgencio & Jeremy Linden
    Time is of the essence when you’re investigating security incidents. While it’s critical to find out as much as you can about the incident from internal sources (logs, network activity, endpoint data, etc.), you also need context about what type of threat you’re facing.

    When you come across an domain, IP, or file hash during investigations, you need to answer dozens of questions ASAP.

    -Is this malicious? What’s known about it?
    -What other domains, IPs, or file hashes are related?
    -Is this a widespread threat or more targeted?

    And to answer these questions today, you probably need to go to multiple sources and manually piece the puzzle together. What if you had a single, correlated source of intelligence instead?

    OpenDNS Investigate now includes malware file data from Cisco AMP Threat Grid. Join our webcast to learn how Investigate provides the most complete view of the infrastructure used in attacks. With Investigate, you can:

    -Instantly validate malicious domains, IPs, and file hashes
    -Identify the Internet infrastructure and malware files related to attacks
    -Uncover infrastructure being staged for future attacks
    -Speed up investigations and stay ahead of threats
  • The modern way of hunting - How three CTOs tackle incident response Recorded: Aug 22 2016 53 mins
    OpenDNS CTO, Dan Hubbard, Lancope CTO, TK Keanini, and Threat Grid CTO, Dean De Beer
    Your corporate network is open terrain. And it's hunting season. Malware, ransomware, and phishing scams are lurking. It's time to identify these threats to the enterprise earlier in the kill-chain and protect your employees, your data, and your network. The next evolution of Incident Response is here.

    Isn't it time you adapted your security stack to gain visibility into threats across you endpoints, network, and cloud? We can arm you with the tools you need most to see what’s happening not just on your network and your endpoints, but also out on the Internet in the wild.

    Join the product CTO’s from both OpenDNS and our Advanced Threats Groups, Dan Hubbard, Dean De Beer, and TK Keanini as they review how to modernize your response with critical solutions that provide visibility into the network, endpoint, and cloud and additionally talk about how to use these tools to investigate threats in the present, retrospectively, and into the future.

    Join not one, but three CTOs from OpenDNS, AMP Threat Grid and Lancope for a complete review of what it takes to accelerate investigations, decrease incident response times, and uncover potential attacks before they are launched.

    Hear from OpenDNS CTO, Dan Hubbard, Lancope CTO, TK Keanini, and Threat Grid CTO, Dean De Beer on August 22nd at 10am PT. You’ll learn:

    -Strategies for addressing customer incident response challenges across Network, Endpoint and Cloud
    -Three unique approaches for digging deeper into what happened before, during, and after an attack
    -How together OpenDNS, AMP Threat Grid and Lancope combine to give you the best incident response portfolio

    Register now and let the hunting begin.
  • Are ransomware attacks holding the healthcare industry hostage? Recorded: Jun 29 2016 57 mins
    Barry Fisher, Sr. Product Manager at OpenDNS
    Healthcare has become criminals most lucrative target. Why? Because medical records are worth 10 times that of credit cards. The recent digitization of the healthcare industry has rapidly expanded the attack surface to include electronic healthcare records, patient portals, IoT-enabled medical devices and more.

    Imagine losing access to all of your patient data—only to find out you are being extorted by criminals who require payment to get it back. This type of attack can disrupt life & death technologies that medical practitioners rely on to perform their jobs. Ransomware adds up to a significant threat to the healthcare industry.

    But, there are steps you can take to actively reduce the number of ransomware infections across your organization. OpenDNS and Cisco are on the forefront of helping our healthcare customers against various versions of ransomware.

    Hear from Barry Fisher, Sr. Product Manager at OpenDNS, to learn the simplest way for healthcare security practitioners to stay ahead of Ransomware attacks. You’ll learn how to:

    -Reduce ransomware infections across your organization
    -Identify the infrastructure used by attackers to connect, control and transfer the encryption keys
    -Protect medical IoT endpoints, patients’ devices and even devices that don’t run agents, like heart monitors and infusion pumps

    Register now to learn how to start covering your healthcare security gaps.
  • The Best Way to Operationalize Threat Intelligence Recorded: Apr 26 2016 54 mins
    Barry Fisher, Sr. Product Marketing Manager at OpenDNS, and Joe Malenfant, Product Marketing Manager at Cisco AMP Threat Grid
    Based on our research, it takes 100-200 days for most organizations just to detect a new threat–before any action can be taken. How many more days go by before new threat intelligence is enforced?

    Where are you gathering this intelligence from? Where and how are you enforcing it? Feed providers, network appliances, endpoint agents, or everywhere?

    In this webinar, you’ll learn how:
    -Both time-to-detection and attack dwell time is reduced by orders of magnitude through security automation.
    -Integrating threat analytics in your security stack creates intelligence specific to your organization.
    -You’ll prioritize investigating malicious domains and files involved with severe threats compromising critical systems.
  • Tracking the most significant cyber threat: Ransomware Recorded: Apr 13 2016 52 mins
    Dan Hubbard, CTO at OpenDNS, and Dean De Beer, Principal Engineer at AMP Threat Grid
    Imagine losing access to all of your critical data — only to find out you are being extorted by criminals who require payment in order to get it back. This is happening at an alarming rate and is commonly referred to as Ransomware.

    While these attacks are most prevalent on employee laptops, ransomware is now targeting departmental file servers and other critical infrastructure.

    But, there are steps you can take to better protect your company and reduce the risk of ransomware infections — and OpenDNS and Cisco have been at the forefront helping our customers against various versions of ransomware.

    Join this webcast with experts from Cisco including Dan Hubbard, CTO at OpenDNS, and Dean De Beer, Principal Engineer at AMP Threat Grid, as they discuss steps you can take to reduce the risk of ransomware infections.

    Learn how:
    - Ransomware has evolved and what we know about it today
    - To predict what ransomware might do next
    - You can identify the Internet infrastructure used by the attackers to connect, control, and transfer the encryption keys
  • Go Beyond the Firewall with DNS Recorded: Mar 23 2016 36 mins
    David Ulevitch, founder of OpenDNS and Vice President of Cisco’s Security Business Group
    Nothing stops threats earlier than DNS-layer network security. Today’s security appliances and agents have to wait until malware reaches the perimeter or endpoint before they can detect or prevent it. That’s not the case with OpenDNS.

    DNS is known for being a fundamental component in how we connect to the Internet, but it’s also a revolutionary way of providing security visibility and enforcement—whether users are on or off the corporate network. With OpenDNS Umbrella, it’s also the fastest and easiest layer of security to deploy everywhere.

    Join this webcast with David Ulevitch, founder of OpenDNS and Vice President of Cisco’s Security Business Group, as he explains:

    -How DNS can be used for security beyond the firewall
    -How OpenDNS Umbrella protects devices on and off the corporate network
    -How easy it is for enterprises to deploy this additional layer of network security worldwide
  • Why companies are shifting security to the cloud to block malware. Recorded: Feb 24 2016 31 mins
    There are two dilemmas in security. First, your threat protections must wait until malware reaches your perimeter or endpoint before they can detect and prevent. Second, your mobile employees must keep their VPN always on for your full security stack to have control and visibility.

    Malware as well as command & control servers and phishing sites reside on the Internet. OpenDNS leverages the Internet’s existing infrastructure—the Domain Name System—to block these threats. Blocking threats on the Internet results in a 2-10X reduction in break-fix busy work and security alert noise.

    Your mobile employees get work done using Office 365, Salesforce, Box, and other cloud-hosted business apps, which means they don’t turn the VPN on. OpenDNS’s cloud-delivered network security service is a new layer of breach protection and Internet-wide visibility on and off the corporate network. You can even extend existing threat protections beyond your perimeter using our API-based integrations.

    Learn from OpenDNS’s product experts why companies are shifting security to the cloud. And why it takes only 30 minutes to protect any device, anywhere.
  • Learn Why Manufacturers are Using the Cloud to Deliver Infosec Recorded: Jan 28 2016 60 mins
    Jack Nichelson and Kevin Merolla, Chart Industries and Barry Fisher, OpenDNS
    We all know that security gaps are widening due to technology shifts and advanced threats. Whether you are in finance, energy, tech, or manufacturing, the infosec challenges are much the same.

    Chart Industries — a global manufacturer with 5,000 employees and 45 locations — was facing a huge volume of malicious activity every day resulting in excessive break-fix work for their small security team. They had thousands of unmanaged mobile and guest devices connecting to their networks. And neither web proxies nor endpoint security could fully protect them. They needed a new layer of malware and breach protection. But it also had to be a painless deployment and it needed to be a transparent experience for their employees and guests.

    Hear directly from Jack Nichelson, Chart’s Director of IT Infrastructure and Security to learn:
    -Why they use a layered approach to security and how OpenDNS complements their security stack
    -How long it took to deploy OpenDNS Umbrella globally
    -How his security analyst, Kevin Merolla, quickly responds to incidents or false positives using OpenDNS Investigate
  • Cover your “What happens off-network, stays off-network” security gap Recorded: Nov 19 2015 55 mins
    Barry Fisher, Sr. Product Marketing Manager, Bobby Guhasarkar, Director or Product Marketing
    We know that “What happens in Vegas, stays in Vegas” is not a winning network security strategy. Yet how would you know what happens on the Internet when your employees are off the corporate network? If you’re thinking VPN? Think again. Why would employees VPN when they’re working in Office 365 or Google Docs?

    We need visibility everywhere. It is the foundation for security. We also need consistent enforcement of our policies and protections. But we’ve lost both these days, now that employees work anywhere, anytime.

    Learn how:
    OpenDNS Umbrella restores visibility and enforcement easier than any other solution.
    Unlike VPN’ing, we do not add latency, hog memory, or burden the end-user.
    Unlike endpoint protections, we block threats before the first victim is hit.
  • OpenDNS Umbrella Recorded: Oct 20 2015 2 mins
    OpenDNS Umbrella is a cloud-delivered network security service
    that protects any device, no matter where it’s located.
  • OpenDNS Umbrella for MSPs Recorded: Oct 20 2015 2 mins
    OpenDNS Umbrella is a critical security layer that helps MSPs reduce time spent reacting to malware so they can focus on growing their business.
  • OpenDNS Investigate Recorded: Oct 20 2015 3 mins
    OpenDNS Investigate provides the most complete lifecycle view of Internet domains, IPs, and ASNs to accelerate investigations, decrease incident response times and uncover potential attacks before they are launched.
    Leveraging a diverse dataset of over 80 billion daily DNS requests and real-time views of 500 BGP peering partners, our statistical & human intelligence can be accessed through a search engine-like interface or an API.
  • Why Next-Gen Firewalls & Sandboxes Are Not Enough Recorded: Oct 13 2015 33 mins
    Barry Fisher, Sr. Product Marketing Manager OpenDNS, now part of Cisco
    Next-generation firewalls and sandboxes stop attacks at various steps, but they only react to malicious communications and code after attacks have launched.

    There’s another way—observing where attacks are ‘staged’.

    We’re going to demonstrate how we can visualize Internet infrastructures for visibility into where attacks will emerge. Then, we’ll know where advanced malware will be downloaded and where compromised systems will callback—before attacks launch.

    In this live session, you’ll learn:

    7 steps of an attack and how you can use this data to get ahead of new security events.
    3 ways to uncover malicious activity by looking at domain names, IP addresses, and autonomous system numbers (ASNs).
    How to apply this intelligence to your current defenses.
  • Internet of Things in the Enterprise: The data behind the risks Recorded: Sep 29 2015 47 mins
    Andrew Hay, Director of Security Research, OpenDNS & Meg Diaz, Product Marketing Manager, OpenDNS
    Many have hypothesized about the security impact of the “Internet of Things” (IoT) for enterprises, but for the first time, we have actual data on the potential security risks introduced by these devices—and the results may surprise you!
    Andrew Hay, Director of Security Research at OpenDNS, conducted a multi-month study on the prevalence of IoT devices in enterprise networks. In this webcast, Andrew will walk through the key findings, including:
    The prevalence of IoT devices—even in the most regulated industries—and which devices are most commonly found
    Where IoT hosting infrastructure is located on the internet
    Vulnerabilities found in IoT hosting infrastructure
    Implications to consider for your security program
    How to gain IoT visibility in your enterprise network
    - See more at: https://www.opendns.com/enterprise-security/resources/webcasts/internet-of-things-in-the-enterprise-the-data-behind-the-risks/#sthash.INikZJu0.dpuf
  • What's missing in your network security stack? DNS Recorded: Aug 19 2015 32 mins
    David Ulevitch, CEO and Founder OpenDNS
    DNS is used by every device on your network. But are you leveraging it in your security stack? DNS can see every connection destined to anywhere on the internet, whether on or off the corporate network. In fact, Verizon’s highly regarded Data Breach Investigation Report stated that “[DNS is] among the single best sources of data within your organization.”

    OpenDNS provides a network security service that can deliver you the quickest “WIN” to improve your security stack. From small businesses without dedicated security professionals to multinational enterprises with complex environments, it takes mere minutes to gain a new layer of breach protection and Internet-wide visibility on and off your network.

    OpenDNS’s CEO, David Ulevitch, will discuss:
    -Where you have compromised systems and data exfiltration blind spots today.
    -Why signature-based antivirus, firewalls, and proxy gateways miss most command & control (C2) callbacks.
    -How we prevent (vs. detect) threats with a painless deployment and transparent experience.
  • Before the kill chain: What attackers are doing and how you can spot them Recorded: Aug 19 2015 54 mins
    Dan Hubbard, Chief Technology Officer at OpenDNS & Rick Holland, Principal Analyst at Forrester Research Inc.
    Attackers can't hide on the Internet—in fact, they leave behind fingerprints in areas you may not realize. Prior to launching an attack, the bad guys need to set up servers, obtain IP addresses, and register domains to use in the campaign. This often happens before they perform reconnaissance on their targets or create the malware payload. All of this activity leaves clues about the attackers.

    What if you could uncover the infrastructure attackers are staging and identify threats BEFORE the kill chain begins?

    Join our webcast on July 30th with Guest Speaker, Forrester Research, Inc. Principal Analyst, Rick Holland and Dan Hubbard, OpenDNS Chief Technology Officer, to hear more about:

    What attackers do before the kill chain
    How you can spot their activity
    How you can leverage this information to stay ahead of attacks
  • Investigate Attacks Like Never Before: Pivoting through Attackers Infrastructure Recorded: Jul 16 2015 31 mins
    Jeremy Linden, Sr Product Manager and Meg Diaz, Sr Product Marketing Manger, OpenDNS
    Attackers break in and pivot through your infrastructure—making their way through critical systems, learning corporate secrets, and ultimately stealing your data. What if you could turn the tables and pivot through their infrastructure?

    Imagine finding one malicious domain or IP and using it to map out the attacker’s infrastructure in minutes. With OpenDNS Investigate, you get visibility into the related domains, IPs, and autonomous systems that may be leveraged for attacks now and in the future.

    Using examples of attacks, we will show how you can pivot through attackers’ infrastructures and stay ahead of attacks. Join this webcast to find out how you can use OpenDNS Investigate to:
    - Investigate attacks like never before
    - Gain global context to better prioritize incident response
    - Predict where future attacks are staged
  • OpenDNS - FireEye Technology Integration Recorded: Jul 15 2015 7 mins
    Matt Barret, OpenDNS and John Tarn, FireEye
    Matt Barrett, SE at OpenDNS, and John Tarn, SE at FireEye discuss the technology integration between FireEye's real-time threat detection and the global enforcement of OpenDNS. They include a whiteboard discussion of how to extend protection to off-network users.
Webcasts and videos for security professionals.
OpenDNS provides a cloud-delivered network security service that blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Our predictive intelligence uses machine learning to automate protection against emergent threats before your organization is attacked. OpenDNS protects all your devices globally without hardware to install or software to maintain.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: OpenDNS Umbrella
  • Live at: Oct 20 2015 1:20 pm
  • Presented by: OpenDNS
  • From:
Your email has been sent.
or close