Hi [[ session.user.profile.firstName ]]

ESG's 7 Core Criteria for Comparing and Evaluating ITOA Platforms

As IT environments grow more sophisticated by the day, complexity rises and many CIOs and IT directors lose visibility of their assets and clarity into each asset's performance. The unfortunate result creates IT 'black boxes,' which bring detrimental hazards to enterprise customers when changes are required or things go wrong within interdependent environments. This problem extends beyond the walls of the data center and spans all offices and mobile workers.

According to ESG analysts' Dan Conde and Nik Rouda - "Modern monitoring must be real-time, at scale, and capable of providing visibility wherever IT assets reside. IT Operations Analytics is at the forefront of this monitoring evolution, but understanding how these often diverse technologies fit together and what benefits they deliver to IT can be complex."

Join us for a discussion on Conde & Rouda's seven core criteria for enterprise buyers currently evaluating ITOA and monitoring platforms.
Recorded Oct 21 2016 25 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Shaun Henderson & Owen Cole, ExtraHop Networks
Presentation preview: ESG's 7 Core Criteria for Comparing and Evaluating ITOA Platforms

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Four Ways Network Traffic Analytics Can Supercharge Your SOC Jun 27 2018 5:00 pm UTC 60 mins
    Eric Ogren, Senior Analyst at 451 Research; Barbara Kay Sr. Director of Security Product Marketing at ExtraHop
    The network doesn’t lie. That’s one reason companies are increasingly turning to their network to simplify and speed up common SOC workflows. Network Traffic Analytics (NTA) complements log data and endpoint instrumentation with an objective view of threat behavior on the network, and dramatically reduces the time to detect and respond to threats.

    In this webinar, you will learn how your peers are using NTA technology based on a new market research from 451 Research, as well as ExtraHop’s approach to NTA that goes beyond just detecting threats to also include automated investigation and robust forensics capabilities.
  • Live @ InfoSec with ExtraHop Co-Founder Raja Mukerji Recorded: Jun 15 2018 11 mins
    Raja Mukerji, President and co-founder of ExtraHop Networks
    Raja Mukerji is the President and co-founder of ExtraHop Networks, where he is responsible for Customer Services, Systems Engineering, and Solutions Architecture. Raja ensures customer success, leveraging his background in the financial-services industry.

    Raja co-founded ExtraHop after a seven-year tenure at F5 Networks where he was a Senior Software Architect and co-inventor of the TMOS platform. He was one of the lead developers behind the BIG-IP v9 product and the major-accounts liaison for critical issues within Product Development. Prior to F5, Raja worked as a Technology Architect at Strong Capital Management.

    Raja is a renowned expert in application delivery and network protocols. He was involved in the FreeBSD project and contributed several enhancements to its TCP stack. Raja holds a bachelor’s degree in Computer Engineering from the Milwaukee School of Engineering.
  • Protecting Against Ransomware Recorded: Jun 6 2018 45 mins
    Nick Frost (Principal Consultant, ISF) | Raja Mukerji (ExtraHop) | Patrick Grillo (Fortinet) | Rob McGovern (LogRhythm)
    What are the lessons learned from the biggest ransomware attacks to date (Wannacry, NotPetya)? How are organizations preparing against the next big attack?

    Join top security experts for this interactive Q&A discussion on:
    - Trends in ransomware attacks
    - Backups, patches and other ways to protect your data
    - How to bolster your organization's security culture
    - Other threats on the horizon

    Speakers:
    - Nick Frost, Principal Consultant, Information Security Forum (ISF)
    - Raja Mukerji, Co-Founder and President, ExtraHop
    - Patrick Grillo, Senior Director Solutions Marketing, Fortinet
    - Rob McGovern, Technical Product Manager, LogRhythm

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • A Bias for Action: Security Analytics for the Advanced SOC Recorded: May 17 2018 64 mins
    Jon Oltsik, Sr. Principal Analyst, ESG, and Barbara Kay, Sr. Dir. Security, ExtraHop
    Orchestration and automation theory has graduated to a concrete architecture for implementation. An action-driven architecture supports more proactive analysis and investigation for more effective detection, triage, investigation, and response.

    The foundation of a successful security architecture in this model requires:
    - Rich, trustworthy data covering all aspects of the environment
    - Consolidated data sources and analytics processes
    - Automated investigation and response capabilities
    - Integration between tools and services for total coverage of every critical asset and data set.

    In this webinar, we'll discuss how to build an action-oriented security architecture, key use cases, and critical success factors.
  • [CPE Credit Panel] AI & Machine Learning in Cybersecurity Recorded: Apr 17 2018 53 mins
    Diana Kelley (Microsoft) | Mary Writz (Micro Focus) | Chris Morales (Vectra Networks) | Barbara Kay (ExtraHop)
    Artificial intelligence and machine learning can power cyber attacks and disrupt the operations of organizations on a global level. ML can also help organizations detect and analyze threats faster, as well as respond to attacks and security incidents. What are the latest advancements in AL & ML? How can we incorporate ML to improve our security posture and better protect our data?

    Join security experts, researchers and practitioners for an interactive Q&A roundtable discussion. Viewers will learn more about:
    - The latest AI/ML trends and applications in cyber security
    - ML tasks for better security
    - Threats, detection & response
    - Hype vs. reality
    - Recommendations for CISOs

    Speakers:
    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - Mary Writz, Director of Product Management, ArcSight, Micro Focus
    - Chris Morales, Head of Security Analytics, Vectra Networks
    - Barbara Kay, Sr. Director of Security, ExtraHop

    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². This panel will be streamed LIVE from San Francisco during RSAC week.
  • How to Maintain Visibility in Hybrid Multi-Cloud Environments Recorded: Dec 14 2017 50 mins
    Brad Casemore - Research Director for Datacenter Networks, IDC and Eric Thomas - Director of Cloud Solutions, ExtraHop
    In the early days of aviation, flight instrumentation made it safer to fly in bad weather. Today, cloud computing is taking off and revolutionizing how applications are built and delivered. But while these technologies offer new possibilities, they also can obscure visibility and make it much more difficult for IT Operations teams to detect security threats and diagnose the root cause of performance issues.

    There is hope: the network remains the common denominator for all applications and provides a source of real-time insight across hybrid, multi-cloud environments.

    In this webinar, IDC Research Director Brad Casemore and ExtraHop’s Director of Solutions Architecture, Eric Thomas, discuss how organizations can tap into network communications and maintain visibility for security and performance.
  • Cybersecurity & Healthcare: How prepared are you? Recorded: Dec 12 2017 53 mins
    Ernie Hood, Senior Research Director with the Advisory Board and former Vice President and CIO at Group Health
    Securing your healthcare organization goes beyond investing in technology to secure your devices, data, and applications. In today's complex digital healthcare environment, your healthcare workflows broaden your risk exposure by interacting with multiple apps, devices, and users spread across multiple geographies. Securing these interactions and all of the components within these workflows requires investing in a comprehensive cybersecurity ecosystem that is more focused on business objectives and less focused on securing individual applications and devices.

    This webinar will discuss the pieces of a cybersecurity ecosystem model, and how this type of model requires policies, processes, and technologies that allow your healthcare organization to take a more proactive approach to risk management and security.
  • Extend Network Visibility and Real-Time Analytics to Remote Locations Recorded: Nov 8 2017 30 mins
    Scot Brooks, PCC - Network Engineer, Juan Garza, APCON - RSM, Ryan Davis, ExtraHop - Sr. Product Marketing Manager
    Join us on November 8th, as ExtraHop, APCON, and Portland Community College (PCC) discuss the challenges PCC faced when trying to expand visibility and aggregate network traffic from multiple remote sites. The group will discuss how PCC was troubleshooting and managing their network in the past and how they’re now able to have visibility across multiple remote sites, access to instant dashboards, and the ability to go back in time to look at historical metrics -- all while staying within a tight budget.
  • How to Leverage Strategic Security Data: Better Results, Less Work Recorded: Nov 2 2017 62 mins
    Matt Cauthorn - VP of Security - Extrahop Networks, and Eric Ogren, Senior Analyst - Security - 451 Research
    Even the most advanced cybersecurity efforts are incomplete, as evidenced by the increasing number of major corporate data breaches that make headlines each year. Security professionals are forced to rely on SIEM platforms and other tools that, while valuable, are inherently limited and cannot be expected to deliver the complete results necessary for good security. Current efforts are barely keeping up with attackers. More tools, even better tools, are not the answer.

    This webinar will discuss a new discipline for understanding the role each data source fulfills in the cybersecurity toolset, and how to take a strategic approach to extracting the most relevant, valuable insights from each data source for a more complete security posture that requires less manual effort to achieve.
  • ExtraHop 7.0: Know the Shape of Your Enterprise Recorded: Oct 17 2017 53 mins
    Isaac Roybal, Director of Product Marketing
    Many teams throughout the enterprise—security, network, IT operations—lack the insights needed to make confident, data-driven decisions. People cannot access the data they need quickly, resulting in waste, slow response times, and expensive incidents.

    With the announcement of version 7.0, ExtraHop provides real-time and empirical data all teams can benefit from through complete visibility, faster incident resolution, and stronger security.

    In this webinar, we will cover the new ways we are helping our customers reveal the shape and context of their digital enterprise by demonstrating:
    • Live activity maps that allow for unprecedented visual environment exploration
    • Scheduled reports that share real-time views of the information that matters most to each user
  • “The Five Ls” for Troubleshooting Citrix Performance Issues Recorded: Sep 7 2017 29 mins
    Shaun Henderson, Regional Sales Manager, ExtraHop & Liam Jackson, Field Sales Manager, Phoenix Datacom Ltd
    Many organisations are looking for assistance to troubleshoot and tune their growing desktop and application virtualisation deployments.

    Join this webinar to discover how you can track five key metrics that characterize the performance of your Citrix environment. We call these metrics “The Five Ls”: Launches, Logon Time, Load Times, Latency, ChanneLs.

    ExtraHop and Phoenix Datacom will talk through real life examples of how the ExtraHop platform provides visualisations for these metrics as well as the details needed to dig deeper into the root cause making Citrix performance issues a thing of the past.
  • [Panel] Software-Defined in the Digital Transformation Era Recorded: Aug 17 2017 60 mins
    Arturo Suarez, Canonical; Idjiwa Adjido, Extrahop; Johna Till Johnson, Nemeretes; Haidee McMahon, Intel; Bob Crooks
    The ICT sector is moving us inexorably towards a software-enabled digital world, but many still fail to understand the power of this trend, how it is going to impact/benefit the ICT Industries and infrastructures delivering them.

    Among topics discussed will be:
    - Present and future impact of Software Defined technologies on IT (challenges and opportunities)
    - How Software-Defined is enabling the digital transformation
    - Best practices and recommendation on adopting software-defined technologies with the future in mind.

    This Webinar is aimed at IT professionals and CIOs/CDOs/CTOs seeking to understand more about how software-defined impacts the present and future of enterprises.
  • Integrating Network Analytics Into Your Security Architecture Recorded: Aug 2 2017 59 mins
    Jon Oltsik, Senior Principal Analyst at ESG Jeff Costlow, Director of Security at ExtraHop Networks
    Over the next several years, ESG sees organizations adopting a security operations and analytics platform architecture (SOAPA) that ties together best-of-breed cybersecurity tools. Wire data—full L2-L7 analytics—from network security analytics platforms will play a key role in these SOAPA portfolios because of its real-time nature and because every threat must necessarily traverse the network. This webinar will explain the SOAPA approach and how wire data fits, and will include use cases for integration and orchestration of wire data with other security tools such as SIEM platforms.
  • Panel: Real-Time Cyber Threat Remediation Using Network Analysis Recorded: Jun 14 2017 59 mins
    Josh Downs, BrightTALK [moderator]; John Smith, ExtraHop Networks & Tim Sadler, CheckRecipient
    According to the latest Verizon Data Breach Investigations Report, 93% of compromises occur within minutes. Traditional security tools do not have the "shutter speed" to detect and remediate these threats fast enough. By analyzing network behavior on the wire as it happens, correlating it with threat intelligence, and then orchestrating remediation actions, organisations gain the capabilities needed to conduct "hand-to-hand" combat against cyber adversaries.
  • Cut the Work From Your Workflow: An Analytics-First Approach Recorded: May 25 2017 57 mins
    ExtraHop Team
    The digital business is growing at a rate IT can’t match without over-worked staff and costly data storage. Over the next few years, more reliance on cloud hosting and SDN will send your stress levels up and your IT visibility down… unless you take advantage of a smarter workflow designed to scale IT with real-time insight on-prem and in the cloud. Backed by machine learning for “always-on” anomaly detection, the ExtraHop platform redefines analytics for a more productive—and proactive—you.
  • How to avoid the Citrix blame game Recorded: Apr 6 2017 32 mins
    Phil Swainson, Head of Technical Services, KedronUK and Peter Connolly, Systems Engineer, ExtraHop
    When applications and desktops are delivered over Citrix, the Citrix administration team becomes the front-line for responding to complaints about slow performance. But more than 60% of the time, the root cause of the problem lies outside of the Citrix environment.

    In this webinar, you’ll learn how wire data analytics can enable Citrix administrators to not only see end-user experience for ICA sessions, but also dig into application and infrastructure performance to uncover the real reason for slowdowns.

    Hope to see you there!

    Key words: Virtualization, Citrix, Application, AppDev, Infrastructure, Cloud Computing
  • ExtraHop + ServiceNow = Seamless IT Service Management Recorded: Mar 23 2017 3 mins
    ExtraHop Networks
    See how ExtraHop and ServiceNow combine for deeper insight, greater security, and automated remediation!
  • Panel Discussion: Cyber Security Strategies and Trends in 2017 Recorded: Feb 21 2017 48 mins
    Jeff Costlow, ExtraHop Networks; Francois Raynaud, DevSecCon; Rami Mizrahi, TopSpin Security & Josh Downs, BrightTALK
    These days it's not a matter of if you'll be breached, but when. Security teams in the modern enterprise must accept that as well as efforts to protect their perimeter, they must also focus on understanding their east-west traffic.

    This panel discussion will look at the trends and technologies influencing cyber security strategy in 2017, in particular those that deal with effectively monitoring your network to ensure your organisation handles vulnerabilities and stays breach free.

    Panelists:

    - Josh Downs, Community Manager - Information Security, BrightTALK (moderator)

    - Jeff Costlow, Director of Security, ExtraHop Networks

    - Rami Mizrahi, VP of R&D, TopSpin Security

    - Francois Raynaud, Founder, DevSecCon

    Tune into this panel conversation if you're a network or security professional looking to hear the latest trends and security best-practices to defend against a constantly evolving opponent.
  • Stop Malicious Activity by Analyzing Network Behavior Recorded: Jan 10 2017 33 mins
    Chris Matthieu, Director of IoT Engineering, Citrix, John Smith, Principal Solutions Architect, ExtraHop Networks
    In the ever-evolving world of persistent threats to your environment the only way to keep up with malicious actors is by utilizing behavior based profiling. In this webinar, we will show how you can rethink the network to detect and remediate threats in real time. When wire data visibility from ExtraHop meets automated response from Citrix Octoblu you're able to protect your environment without having to spend all your time wading through alerts.

    This webinar is perfect for any network or security professionals who are keen to maintain optimum visibility accross their entire network, allowing them to neutralise threats and reduce vulnerabilities.

    About the presenters:

    John Smith is Solutions Architect at ExtraHop and author of the wiredata.net blog. He is a Citrix Technology Professional and 16-year IT veteran specializing in application delivery, event correlation, security, web applications, and application virtualization. John’s background gives him an invaluable perspective on the challenges facing IT, and creating new approaches to deal with them. Follow him on Twitter: @jmsazboy

    Chris was the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flows, processes and sensor data, and analyze/react to real-time events and messages as well as big data trends and anomalies.
    Follow him on Twitter: @ChrisMatthieu
  • How to Cut Your Network Troubleshooting Time in Half Recorded: Dec 14 2016 36 mins
    Nick Brackney & Jim Sullivan
    Are you stuck sifting through large volumes of data on your network to find answers? There's a better way.

    See how ExtraHop can help you solve problems faster by making sense of the data in motion through your network and delivering visibility across the application delivery chain.

    This webinar is perfect for any network or security professionals who are keen to maintain optimum visibility across their entire network, allowing them to get a full view of the traffic on their network, neutralise threats, reduce vulnerabilities and improve their network infrastructure.
Automating and streamlining security investigations.
This channel provides educational webinars about security analytics and investigation automation, and product info about ExtraHop Reveal(x), the network security analytics platform powered by AI, providing unprecedented visibility, advanced behavioral analytics, and investigation automation capabilities. Using real-time analytics and ML-driven anomaly detection, ExtraHop Reveal(x) enables security teams to accelerate investigations, reduce false positives, and optimize the capabilities of expert security analysts. To learn more visit www.extrahop.com/revealx

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: ESG's 7 Core Criteria for Comparing and Evaluating ITOA Platforms
  • Live at: Oct 21 2016 1:00 pm
  • Presented by: Shaun Henderson & Owen Cole, ExtraHop Networks
  • From:
Your email has been sent.
or close