Hi [[ session.user.profile.firstName ]]

How to Cut Your Network Troubleshooting Time in Half

Are you stuck sifting through large volumes of data on your network to find answers? There's a better way.

See how ExtraHop can help you solve problems faster by making sense of the data in motion through your network and delivering visibility across the application delivery chain.

This webinar is perfect for any network or security professionals who are keen to maintain optimum visibility across their entire network, allowing them to get a full view of the traffic on their network, neutralise threats, reduce vulnerabilities and improve their network infrastructure.
Recorded Dec 14 2016 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nick Brackney & Jim Sullivan
Presentation preview: How to Cut Your Network Troubleshooting Time in Half

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Next-Gen Intrusion Detection Finally Delivers Compliance and Security Aug 17 2021 5:00 pm UTC 60 mins
    Chris Krueger, Principal II - Solutions Engineering at Coalfire Systems; Aaron Davidson, Sr. Sales Engineer at ExtraHop
    Intrusion Detection Systems (IDS) rely on brittle signatures and are a time drain, frequently called an alert canon. But, IDS is still a major part of your PCI DSS and other compliance stacks. Unfortunately, today’s attackers prefer to step around IDS by focusing on your users’ weaknesses rather than vulnerability exploits that IDS watches for. You need a new approach that makes your intrusion detection budgets deliver more than just compliance….one that encompasses ML behavioral analysis, spots lateral movement, and identifies encrypted attacks. Finally, an NG-IDS against modern threats.

    Join ExtraHop security experts and Chris Krueger, from Coalfire Systems, Inc., to learn how Next-Gen intrusion detect technology can bridge IDS compliance and security gaps.
  • Accelerate Zero Trust Adoption Through Complete Visibility Jul 29 2021 5:00 pm UTC 60 mins
    Tom Roeh and Pat Park
    It's no surprise that Zero Trust initiatives are increasing in importance across federal, state, and local government institutions. New cybersecurity mandates and a boom in remote work due to COVID-19 are just two of the most common factors driving this demand. While the need for adopting Zero Trust is evident, the path to success is not.

    In this 45-minute webinar, you'll hear from experts on ExtraHop’s Public Sector team discuss important considerations for planning, implementing, operating, and securing a Zero Trust deployment. You'll also learn practical steps Public Sector IT teams can take to achieve your Zero Trust mandate more rapidly and with lower risk. This includes the vital role end-to-end visibility and frictionless collaboration between IT ops teams play across Zero Trust rollout phases.
  • The Cloud Security Trifecta: AWS + CrowdStrike + ExtraHop Recorded: Jul 21 2021 45 mins
    Patrick McDowell, Sr Partner SA, AWS; Dixon Styres, Solution Architect, CrowdStrike; John Smith, Principal Engineer, ExtraHop
    As enterprises expand their footprints in the cloud, their attack surface expands, and they often run into issues and friction that can weaken security and leave them vulnerable to advanced threats. This presentation will cover:
    - How rapidly evolving threat actors use novel, cloud-specific attack tactics to prey on companies that move critical workloads to the cloud
    - How to leverage the three primary data sources or tool types a cloud SOC needs in order to achieve complete security visibility: logs (SIEM), endpoint monitoring (EDR), and the network (NDR).
    - How to regain the advantage over attackers by leveling up your threat detection and response capabilities with tight integration between best-of-breed tools in these three classes.

    You’ll also get a quick demo highlighting how these 3 data sources come together to detect and investigate advanced threats in the cloud and stop breaches faster.
  • How A Healthcare Org Boosted Their Security with Network Detection & Response Recorded: Jul 8 2021 45 mins
    Josh Snow, Senior Sales Engineer, ExtraHop; Richard Stepanek, CIO, Central Oregon Radiology Associates
    This session will cover how Central Oregon Radiology Associates (CORA) Network Detection & Response (NDR) improved security posture and reduced costs while securing remote sites and medical IoT for over 8,000 physicians, hospitals, and clinics. The session will include actionable advice for reducing costs and improving operational efficiency. We'll cover several key areas, including how CORA:

    - Reduced security costs 30% and decreased IT monitoring spend by 75%
    - Supported a full organizational migration to Office365 while ensuring HIPAA compliance
    - Actionable advice for healthcare organizations to improve security outcomes through greater NetOps and SecOps collaboration
  • Making Visibility Definable and Measurable - A SANS Panel Discussion Recorded: Jun 28 2021 61 mins
    Chase Snyder, Sr Product Marketing Manager, ExtraHop; John Pescatore, Director of Emerging Trends, SANS
    Cybersecurity professionals consistently place visibility at the top of their recognized needs list. But the definition of security visibility covers a wide range, often lacking measurable elements that can help predict risk reduction if visibility is improved.

    On this webcast, SANS Research Director Barbra Filkins and SANS Director of Emerging Security Trends John Pescatore will discuss the SANS 2021 Visibility Report with sponsor representatives.
  • Breaking AD Trust Boundaries through Kerberos Vulnerabilities Recorded: Jun 11 2021 60 mins
    Dirk-jan Mollema, Core researcher of Active Directory and Azure AD Fox-IT // Jeff Deininger, Principal Cloud SE, ExtraHop
    In larger enterprise environments multiple Active Directory forests are often in use to separate different environments or parts of the business. To enable integration between the different environments, forests trusts are set up. The goal of this trust is to allow users from the other forest to authenticate while maintaining the security boundary that an Active Directory forest offers.
    In 2018, this boundary was broken through default delegation settings and Windows features with unintended consequences. In 2019 the security boundary was once again established through a set of changes in Active Directory. This research introduces a vulnerability in Kerberos and forest trusts that allows attackers to break the trust once again.
    The talk will provide technical details on how Kerberos works over forest trusts and how the security boundary is normally enforced. Then the talk will discuss a flaw in how AD forest trusts operate and how this can be combined with a vulnerability in the Windows implementation of Kerberos to take over systems in a different forest (from a compromised trusted forest).
    The talk will be accompanied by a proof-of-concept and a demonstration of abusing the vulnerability.
  • It Is Always DNS, SUNBURST Confirms Recorded: Jun 7 2021 61 mins
    Deb Radcliff, Cybersecurity Analyst and Author; Tanner Payne, Sr. Sales Engineer at ExtraHop
    Workforce DNS usage grew by 250% during the pandemic, making DNS a choice pathway for attackers to hide. SUNBURST, an advanced and sophisticated supply chain attack that exposed 18,000 unsuspecting companies, used innovative ways to exploit DNS. How can you ensure that your security stack will catch the next attack hiding in DNS?

    In this webcast, author and analyst Deb Radcliff sits down with ExtraHop network security expert Tanner Payne to discuss ExtraHop research insights and her recently published white paper, SolarWinds SUNBURST DNS Abuse Tactics. The talk will include DNS exploit detection demos and cover:
    - Novel ways SUNBURST exploited DNS.
    -How it used malicious DLLs that looked like they belonged to SolarWinds and encoded unique identifiers into the DNS queries to identify high-value targets.
    -Why traditional security missed it and why the network detection and response (NDR) can catch the next one.
  • 3 Ways SecOps and NetOps Collaboration Saves Money & Stops Attackers Faster Recorded: Jun 3 2021 59 mins
    Chase Snyder, ExtraHop, JJ Thompson, Andrew Boyle, BAH; Brandon Dunlap, Moderator
    Call It NetSecOps, IT/Security Operations, SOC/NOC or SNOC. Whatever the name, better collaboration between security operations and network operations teams has enormous benefits for teams that follow through. Join Extrahop and (ISC)2 on June 3, 2021 at 1:00 p.m. Eastern for a discuss on how this union can help with tool consolidation, improve incident response time and effectiveness and adapt to the cloud, remote work, and beyond.
  • Beyond DarkSide: How to Catch & Stop Next-Gen Ransomware Recorded: May 20 2021 52 mins
    Mark Bowling, VP of Security Response; Josh Snow, Sr. Sales Engineer; Mike Campfield, VP of International Sales
    The temporary shutdown of Colonial Pipeline––a critical pipeline providing nearly half of the gasoline supply for the East Coast of the United States––just over a week ago brought sophisticated ransomware bursting back into the spotlight. Panicked drivers hoarded gasoline as prices skyrocketed, and security teams were pummeled with the question: "What are you doing so this doesn't happen to us?"

    Join Mark Bowling, VP of Security Response at ExtraHop and 20-year veteran of the FBI cybercrimes division, Mike Campfield, and Josh Snow as they discuss:
    - Hallmarks of the DarkSide ransomware variant, including both exfiltration and encryption.
    - How to detect early indicators of compromise and respond before it gets out of control.
    - How industrial control systems and operational technology fit into the security landscape and what President Biden's announcement means for future attacks.
    - How to build a security posture that's both resistant and resilient to sophisticated ransomware operations and other advanced threats.

    Mark will also share lessons learned from his experience in the FBI and as a cybersecurity consultant on the best practices that set organizations apart when it comes to thwarting ransomware.
  • 3 Ways to Improve Your Cloud Security Recorded: May 19 2021 51 mins
    Ryan Davis, Sr. Cloud Product Marketing Manager at ExtraHop
    Cybersecurity has never been easy, and as enterprises expand their footprints in the cloud, they often run into issues and friction that can weaken security and leave them vulnerable to advanced threats. Cloud environments are highly dynamic, and many security tools struggle to match the scale and elasticity the cloud provides. Security teams need to regain the advantage over attackers, and network data offers an elegant solution to improving observability, threat detection, and response.

    In this webinar we’ll discuss 5 ways to think about cloud security from a network perspective:
    - Know your datasource
    + Flow logs vs packets
    + NDR vs Logs vs EDR
    - Investigate and hunt threats
    + Take advantage of the power of forensics
    - Detect and immediately respond to advanced threats

    You’ll also get a quick demo highlighting how these 3 key components of stronger security can be put into action in your cloud environment. Learn how the power of Network Detection and Response solutions can help you reclaim the upper hand in your cloud environments.
  • Making XDR Work In Your Enterprise Recorded: May 13 2021 61 mins
    Chase Snyder, ExtraHop // Dave Gruber, ESG
    Cybersecurity teams are working to extend detection and response technologies from the endpoint to many other parts of the enterprise IT environment, including the network, the cloud, and managed services. But how do these “XDR” technologies work in real operating environments? How do they tie together, and what are the challenges in implementing them? In this Dark Reading webinar, experts discuss the real-life implementation issues surrounding emerging detection and response technologies. You’ll learn how these emerging technologies can be integrated with your existing cybersecurity tools, and how XDR technology might affect your cybersecurity operations and processes.
  • Stealing the Silver Lining from your Cloud Recorded: May 7 2021 61 mins
    Anant Shrivastava (Notsosecure Global Services) // Don Shin (ExtraHop)
    The last couple of years have seen a tremendous growth in cloud adoption. Every organization has some cloud usage, using either a mixture of in-house and public cloud or they are fully cloud based. This unprecedented adoption of technologies has opened gaping holes in an organization's security landscape. Whilst moving to the cloud is a sensible move because vendors are taking an increasingly larger responsibility in being more proactive towards security, it also opens organizations up to be more severely punished for their mistakes.

    In this demo filled webinar, we will discuss various scenarios where cloud based technologies have given opportunities to attackers that have resulted in catastrophic repercussions for the company involved.

    We will look at ways to exploit these cloud environments from an attackers point of view, covering various phases of attack from enumeration to exploitation, through the escalation of privileges and ending with a complete ownage of the cloud network.
  • It's Time to Think More Broadly about Cloud Workload Security Recorded: May 5 2021 55 mins
    Fernando Montenegro, Principal Research Analyst, 451 Research; Ryan Davis, Sr. Cloud Security Manager, ExtraHop
    There are at least as many ways to monitor and protect cloud workloads as there are types of cloud workloads that need protection. Since all security technologies have inherent advantages and drawbacks, organizations typically deploy a variety of cloud workload security solutions depending on their regulatory environment, desired security profile, and tolerance for risk. What’s important is ensuring that any security gaps are filled.

    Join 451 Research and ExtraHop on this webcast and learn:
    - How agentless network detection and response can play a crucial role in protecting your cloud workloads against today’s advanced threats
    - How your organization can close gaps left by other cloud workload security technologies
  • Defining an XDR strategy: What does it mean for your organization? Recorded: May 4 2021 61 mins
    Michael Sanders, ExtraHop // Dave Shackleford, SANS
    XDR (extended detection and response) is the hot new buzzword in the security industry but so far there isn't a lot of agreement on what defines XDR. The goal makes sense. Extend your detection capabilities across your hybrid network to catch advanced threats like zero days, supply chain attacks, and insider threats, and respond quickly before damage can be done. Join us as we explore the pros and cons of XDR such as, is it realistic that one vendor can offer you all the tools you need for detection and response or will you need to create a strategy to achieve your own extended detection and response ecosystem.

    Attendees will walk away with a better understanding of:
    - How to define what XDR means for your organization
    - How to create your own XDR strategy
    - Why network data is an essential building block for any XDR ecosystem
  • ExtraHop #1: How To Stop Breaches Faster with Integrated NDR & EDR Recorded: Apr 26 2021 66 mins
    Chase Snyder, Sr. Security Product Marketing Manager, ExtraHop; Dixon Styres, Solutions Architect, Crowdstrike; Sharon Smith
    Defending against advanced threats requires advanced insights from the three foundational data sources for security operations: endpoint data, log data, and the network. In the first part of a three-part series, we'll discuss:

    ·advanced threat behaviors, how they gain access to the network through both commonplace and sophisticated means, how they act once they're inside.

    ·how to leverage the three foundational data sources, integrated into a best-of-breed XDR approach to detect and investigate advanced threats like supply chain attacks, insider threats, and more

    ·how to rapidly respond to minimize the blast radius and reduce business impact when an advanced threat gets inside.
  • SANS 2021 Cloud Security Survey Panel Discussion Recorded: Apr 23 2021 64 mins
    Dave Shackleford, SANS // Ryan Davis, ExtraHop // Patrick Pushor, Orca Security // Arun Raman, Blue Hexagon
    This SANS survey explored the types of services organizations are using, what types of controls and tools provide the most value, and how effective cloud security brokering is for a range of use cases. in this webcast, SANS analyst Dave Shackleford will join sponsor speakers to explore how survey results can inform and improve your cloud security posture.
  • ExtraHop #2: Stopping Advanced Threats Doesn't Require a Big Budget Recorded: Apr 21 2021 61 mins
    Aaron Davidson, Sr. Sales Engineer, ExtraHop; Don Shin, Sr. Security PMM, ExtraHop; Sharon Smith, Moderator
    Security and compliance frameworks from CIS, NIST, and PCI SSC point to long lists of must-have technology to build secure and compliant defenses. But they don’t tell us which ones to do first or how to allocate our limited budgets. Advanced Threats follows a land and pivots toward your valuables workflow. This knowledge gives you a roadmap to prioritize investments while leaving others as “good enough” that fit your budget and time constraints.

    Join ExtraHop experts to get insights into building effective layered defenses that prioritize your budget:

    - How the “Defender’s Dilemma” should guide your investments at the edge

    - How “Intruder’s Dilemma” sets the network trap for intruders and advanced threats

    - Why your IDS needs a next-gen upgrade against advanced threats

    - See how NG-IDS stops advanced threats (demonstration)
  • ExtraHop #3: How NG-IDS Stops Advanced Threats Legacy IDS Misses Recorded: Apr 9 2021 58 mins
    Jon Oltsik, ESG; Don Shin, ExtraHop; Jesse Munos, ExtraHop; Sharon Smith (Moderator)
    Supply Chain attacks, Zero-Days, and Advanced Persistent Threats (APTs) are effective because they target the trust models traditional security products were built on. The result is a post-compromise world where traditional IDS technology is looking in the wrong direction based on outdated assumptions to detect and stop modern attacks. Join John Oltsik from ESG and ExtraHop experts to learn how machine learning NG-IDS gives you back the edge against Advanced Threats :

    · Why Advanced Threats require a post-compromise posture

    · How time has been unkind to that noisy 90s IDS

    · How to fill IDS compliance gaps and increase security efficacy

    · How NG-IDS stops Advanced Threats before they do real damage
  • Hybrid Security: Protecting Your Supply Chain Recorded: Apr 5 2021 60 mins
    Matt Bromiley, Incident Response Instructor at SANS; Guy Raz, Systems Engineer at ExtraHop
    Recent supply chain attacks have proven that third parties are an unexpected, yet trusted, entry vector into an organization. By utilizing legitimate methods to breach an organization, threat actors can hide under the radar with escalated privileges. Furthermore, attackers have shown that they are security-savvy, knowledgeable of enterprise defenses and their workarounds. Enterprise defense should be structured around BOTH system and network data; without, you will never see the full picture.

    With this webcast, we will outline NDR capabilities and how bringing endpoint and network together will prove to be a one-two punch to bring down even advanced attackers. We will specifically outline how to mitigate common third-party attack surfaces, what could have been done differently in the wake of the attack, and have the recent attacks provided enough reason to consider changes in implementation.
  • Secure Your Cloud Against Advanced Attacks with Network Detection and Response Recorded: Mar 29 2021 40 mins
    Michael Sanders, Cloud Security Engineer at ExtraHop Networks; Corey Quinn, Chief Cloud Economist at Duckbill Group
    How do you ensure that Advanced Threats like supply chain attacks, APTs, and zero-day exploits aren’t inside your cloud environment today?

    Most advanced threat actors are the ones likely to already be inside of your environment, but getting in is only the first step. Once they beat perimeter defenses, attackers start moving laterally and covering their tracks so they can accomplish their real objective—executing ransomware or exfiltrating valuable customer data and intellectual property. Advanced attackers should be fought where they are—on the inside—and that requires a strong post-compromise defense posture.

    Network detection and response (NDR) products provide the internal visibility, real-time detection, and intelligent response capabilities you need to stop attackers before they accomplish their goals. Best-of-breed NDR tools are completely covert and tamper-proof, meaning attackers will have no idea you're on to them until it's too late. As they move laterally within your network, NDR shows you not just where intruders are going, but where they've been.

    In this webinar, you’ll learn how NDR enables you to adopt a detect-and-respond posture for securing against advanced attacks in the cloud. An ExtraHop engineer will also show you how ExtraHop Reveal(x) 360 helps you find and stop attackers in product demos that highlight specific advanced threat use cases.
Helping you gain the perspective to secure the hybrid enterprise
The prevention and protection model of cybersecurity isn’t working: between the cloud, IoT, and the sheer pace of change, the enterprise is no longer built to be walled in. This channel provides educational webinars to help SecOps (SOC) and NetOps (NOC) teams, from CIOs and CISOs to analysts and practitioners, change their perspective in order to identify, investigate, and respond to threats across the modern attack surface. We explore how cloud-native network detection and response (NDR) provides the complete visibility, real-time threat detection, and intelligent response you need to secure your hybrid environment. You’ll also find product information about ExtraHop Reveal(x) which enables you to: Eliminate blind spots: Cover 100% of your hybrid environment, Detect what matters: Find threats 95% faster, and Act quickly: Respond to breaches 70% faster.

Learn more at www.extrahop.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Cut Your Network Troubleshooting Time in Half
  • Live at: Dec 14 2016 10:05 am
  • Presented by: Nick Brackney & Jim Sullivan
  • From:
Your email has been sent.
or close