XDR Vs SIEM: Organizational Needs

Logo
Presented by

Peter Varhol, Technology Evangelist, Gurucul

About this talk

Extended Detection and Response (XDR) and Security information and event management (SIEM) platforms perform roughly similar security functions, in that they both examine data to determine the likelihood of a breach and/or attack. They look for anomalous behaviors and flag them for further investigation. Some organizations question which approach is right for their security analytics needs. This webinar focuses on the respective strengths and limitations of both approaches, and what they share in common. It explains how each work, what data they look at and how they evaluate risk and the protection they offer. It offers guidelines on what circumstances are most appropriate for each solution in an organization. Attendees will learn: 1. The fundamental differences between XDR and SIEM. 2. The strengths and limitations of each approach, including operating in the cloud. 3. How to utilize both real-time and saved data analytics to determine the security of your computing environment.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (85)
Subscribers (6753)
Gurucul is transforming enterprise security with user behavior based machine learning and predictive analytics. Using identity to monitor for threats, Gurucul provides Actionable Risk Intelligence™ to protect against targeted and under-the-radar attacks. Gurucul is able to proactively detect, prevent, and deter advanced insider threats, fraud and external threats to system accounts and devices using self-learning, behavioral anomaly detection algorithms. Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world renowned-experts in government intelligence and cyber security. The company was founded by seasoned entrepreneurs with a proven track record of introducing industry changing enterprise security solutions. Our mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.