InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Detect and stop software supply chain attacks on the inside

Presented by

Curtis Franklin, Sr. Analyst, SecOps, Enterprise Security Mngmt. - Omdia & Chase Snyder Sr. Product Mktg. Manager - ExtraHop

About this talk

Current events and headline-grabbing attacks have thrust supply chain concerns front and center with business and government leadership. How will you keep your company from falling victim to an attack from your software supply chain? Software supply chain attackers abuse trusted relationships between software users and suppliers to sneak in past perimeter defenses. The only way to catch them after that is to monitor the inside of your own enterprise. This webinar will help you understand the threats, the impact, and how to keep your organization safer in a challenging environment. If you manage, purchase, or protect software, you owe it to yourself and your organization to make time to learn how to manage and mitigate this growing third-party risk.
ExtraHop

ExtraHop

13066 subscribers106 talks
Unlocking the power of the network to see the truth & stop the threat
ExtraHop is reinventing network detection and response (NDR) to help enterprises stay ahead of emerging threats with unparalleled network visibility, context, and control. As new attack vectors rapidly emerge, SOCs face an escalating challenge: Expand visibility to effectively detect and respond to threats, enhance productivity to manage the increased volume, and do it all while reducing operational complexity. By combining the power of NDR with network performance management (NPM), intrusion detection (IDS), and packet forensics in a single, integrated platform, enterprises benefit from complete visibility and contextual insights across their entire hybrid infrastructure - from data center campuses to cloud and SASE infrastructures and beyond. ExtraHop can decrypt and unlock packet-level data at wire speeds, analyzing and correlating it with its cloud-scale machine learning models to detect, investigate, and remediate cyber risks in real-time, without the added complexity of multiple tools. Unlock the full power of network detection and response with ExtraHop today. Learn more at www.extrahop.com
Related topics