Hi [[ session.user.profile.firstName ]]

SS8 BreachDetect Demo: Total Network Visibility

Dive deeper into SS8 BreachDetect to learn how to strengthen your breach detection portfolio with total network visibility.
Recorded Aug 1 2016 2 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sanjana Chand
Presentation preview: SS8 BreachDetect Demo: Total Network Visibility

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile


  • 2017 Breach of the Year Recorded: Jan 18 2018 34 mins
    Tony Thompson, General Manager, Threat Detection, SS8 Networks
    Throughout the year, every Friday the SS8 Twitter feed featured a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers and Threat Researcher Team take a look at each of these ‘finalists’ and select one outstanding breach as our #BreachOfTheMonth pick. The start of 2018 is upon us. While there was no shortage of breaches in 2017, some of them are more noteworthy than others. Join Tony Thompson and Akshay Nayak as they discuss these chosen few, and crown the 2017 Breach of the Year.
  • 5G Revolution, Not Evolution Recorded: Sep 28 2017 39 mins
    Kevin McTiernan, Vice President of Solutions, SS8 Networks
    The fifth generation of mobile network technologies, or 5G, is being rolled out for commercial launch in 2018, with trials already underway around the world. 5G brings on new challenges for regulatory compliance. In this webinar, we will discuss what 5G brings in terms of new capabilities and challenges. We do this through a case study of an SS8 customer who has added 5G to their existing 2G, 3G and 4G services.
  • Five Indicators Your Network May Have Been Breached Recorded: Aug 10 2017 29 mins
    Tony Thompson, General Manager, Threat Detection, SS8 Networks
    Unless you’ve been under a rock, you know that breaches continue to occur at an alarming rate. Despite massive investments in security technology, today’s organizations remain challenged to protect their infrastructure against the most advanced threats.

    The pendulum continues to swing in a cyber war between hackers and those defending critical systems. What’s the common denominator? The Network. While it’s exploited by attackers to perform reconnaissance, compromise systems and exfiltrate data, it also provides a source of truth about malicious activity. This webinar will explore five key indicators that your network may have been breached and what you should expect to see from a network risk assessment.
  • The Future of Incident Response: What You Need to Know Recorded: Oct 27 2016 40 mins
    Mike Rothman, Securosis Analyst/President; Faizel Lakhani, SS8 COO/President
    What happens when you combine increasingly effective adversaries, data dispersing to the clouds, and a significant lack of skilled security practitioners? You get the future of incident response.

    Despite having a bigger budget and better tools than ever before, the underlying way incident response happens within enterprises must evolve with the times.

    Join Mike Rothman, an analyst at Securosis & Faizel Lakhani, COO at SS8 as they discuss trends in cyber attacks and incident response. Learn what you can do today to ensure your organization is ready for the changes already in motion, and how network visibility plays a crucial role in accelerating breach and incident response.
  • Introduction to the SS8 BreachDetect UI Recorded: Oct 4 2016 6 mins
    Sanjana Chand
    A brief introduction to the SS8 BreachDetect solution. Featuring a simple, visual UI, SS8 BreachDetect allows analysts to quickly view automated threat alerts, drill deeper into what triggered those alerts, and create custom queries and dashboards to investigate suspicious network activity and devices of interest.
  • Breaches are Coming! What To Do When They Go Beyond the Wall Recorded: Aug 10 2016 39 mins
    Tony Thompson, Vice President; Rajdeep Wadhwa, Product Management
    Cyber threats are more sophisticated than ever, slipping past perimeter defenses and hiding in the normal flow of network communications. For all you GOT fans, it’s a lot like Wildlings slipping past The Wall.

    Data breaches are going undetected for more than 200 days, and in most cases, the breached company learns about the breach from outside their organization. What’s the common denominator? The Network. Much like the North, the network remembers.

    A lack of high-definition network visibility has extended the breach detection window and prolonged data breach investigations. New methods of network visibility, learning analytics and automation are now available to accelerate and simplify the breach-hunting journey – past, present and future.

    In this webinar, we will examine:
    • Why IT and cyber security organizations today struggle with breach detection and investigations
    • Why legacy approaches to analyze network traffic (SIEM, packet recorders, network forensics) are extending and complicating cyber investigations, and
    • A new “time machine” model of network security analytics that accelerates the breach detection and incident response workflow

    This event will also look at the architectural considerations and investment required for implementing this new model of network-based breach detection, as well as examples of the types of threats that can be discovered after the threat slips past preventative security measures, such as firewalls, anti-virus and intrusion prevention.
  • SS8 BreachDetect Demo: Total Network Visibility Recorded: Aug 1 2016 2 mins
    Sanjana Chand
    Dive deeper into SS8 BreachDetect to learn how to strengthen your breach detection portfolio with total network visibility.
Time Machine for Breach Detection
For nearly 20 years, SS8 has pushed the boundaries of network intelligence for large national governments, service providers and enterprises. SS8 has led the way in analyzing and extracting key information from network communications and using that information to help customers comply with government regulations, identify anomalous and covert threats, and gain insight into devices and subjects of interest – helping prevent crimes, terrorism or any malicious behavior.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: SS8 BreachDetect Demo: Total Network Visibility
  • Live at: Aug 1 2016 8:20 pm
  • Presented by: Sanjana Chand
  • From:
Your email has been sent.
or close