Hi [[ session.user.profile.firstName ]]

Automated Security Analysis for Palo Alto Networks customers

Turn your Palo Alto Networks data into actionable security escalations. Monitor, analyze and triage security Palo Alto Networks NGFW, Traps and Cortex data with software, not people.
Recorded Sep 19 2019 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Epplin and Mike Reynolds
Presentation preview: Automated Security Analysis for Palo Alto Networks customers

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Designing an Effective SOC - Part II How to Build an Efficient & Effective SOC Feb 20 2020 4:00 pm UTC 45 mins
    Chris Calvert
    Today’s SOC models provide two options: build a labor-intensive in-house SOC or outsource to an MSSP. In Part-1 of this two-part series Larry Ponemon shared how dissatisfied security professionals are with the inefficiencies found in both models. Now in Part II, Chris provides a practical guide for designing a new modern SOC model that combines humans and machines to deliver more efficiency and ROI.

    In this talk we’ll discuss:
    *Blueprint for designing a modern SOC
    *Using software to increase efficiencies and improve morale
    *Covering more event data without breaking the bank
    *Validating ROI to senior executives and the board
  • [PANEL] Proactive Security Strategies and Best Practices Recorded: Feb 11 2020 60 mins
    Roselle Safran, Sean Webb, Michelle Drolet & Chris Calvert
    In today’s business landscape it is important to take a proactive approach to security rather than a reactive approach. Join leading security experts as they discuss the safest ways to protect your organisation in 2019 and beyond.

    Join this Q&A panel to learn more about:

    - Key organisational benefits to practising proactive security
    - Technologies powering security
    - Best practices and recommendations for a more secure organization

    Roselle Safran, President, Rosint Labs (Moderator)
    Sean Webb, Information Security Manager, Patriot One Technologies Inc.
    Michelle Drolet, CEO & Co-Founder, Towerwall
    Michelle McLean, VP Marketing, StackRox
    Chris Calvert, VP of Product Strategy, Respond Software
  • [Series] Designing an Effective SOC - Part I Economics of Security Operations Recorded: Feb 4 2020 39 mins
    Dr. Larry Ponemon and Dan Lamorena
    Ponemon Insights - Despite significant investments in 2019, half of the security managers in the survey report that their SOC is ineffective at detecting attacks. What’s keeping us stuck? In Part One of this two-part series, Larry Ponemon joins Respond Software to discuss the most recent Ponemon Report findings, new insights into the economics and effectiveness of SOCs.
    In this first installment of the webinar series, learn which variables of the SOC contribute to overall ineffectiveness and worsening ROI, and explore new methodologies that address those issues. Key topics:
    -Cost comparison of In-house SOC vs. Outsourced SOC
    -The cost of skill attrition and hiring
    -Alternative solutions
  • Finding Incidents Using Web Filtering Data Recorded: Oct 29 2019 15 mins
    Tim Wenzlau, Product Manager, Mike Reynolds, Product Marketing Manager
    Web filtering data can be a treasure trove of threat activity (PUPs/PUAs). The challenges with finding these threats come from the vast volume of sensor data. PUP malware beaconing signals may or may not occur at regular intervals and a human security analyst can't be expected to keep track of all the web requests generated by a single host for an hour, let alone a day or a week. The solution to this challenge is Robotic Decision Automation, which can consider over 60 factors specific to web filtering data when identifying malware and other malicious activity. 

    Key takeaways from this webinar:
    -Web filter data volume is no longer an issue for monitoring
    -Monitoring HTTPS traffic reduces Mean Time to Respond (MTTR)
    -The Respond Analyst is the first solutions that allows for real-time analysis and triage of web proxy data

    The Respond Analyst integrates with leading web proxy vendors: Palo Alto Networks, Symantec, McAfee, Cisco, Forcepoint, Carbon Black and ZScaler.
  • Fintech CISO Shares 5 Tips: How Kyriba Automated SecOps Recorded: Oct 22 2019 37 mins
    Eric Adams, CISO and Kevin Bailey, Dir. of Global Security @ Kyriba
    Build a world-class security operation with a lean, nimble team.

    When security leaders are asked to ‘do more with less’, their choices are 1) reduce their team size 2) think out of the box 3) find a new job. The team at Kyriba chose option #2.

    Join Eric Adams, CISO at Kyriba and Kevin Bailey, Director of Global Security at Kyriba, as they discuss their journey in re-thinking and re-building their security operations program to both extend their capability and make a big improvement to the bottom line. We'll share how Kyriba’s team optimized resources with a SaaS-based security program built with decision automation and key integrations while adhering to the strictest compliance standards in the world.
  • Automated Security Analysis for Palo Alto Networks customers Recorded: Sep 19 2019 63 mins
    Mike Epplin and Mike Reynolds
    Turn your Palo Alto Networks data into actionable security escalations. Monitor, analyze and triage security Palo Alto Networks NGFW, Traps and Cortex data with software, not people.
  • The Repond Analyst - Use Cases and Decision-making skills Recorded: Sep 5 2019 15 mins
    Chris Calvert VP Products
    Deep dive into how the Respond Analyst makes decisions and escalates security incidents across MITRE ATT&CK™ framework.
  • Security Operations is broken. What can we do about it. Recorded: Aug 28 2019 12 mins
    Chris Calvert
    There’s a lot of talk about how things keep getting worse for security operations. The attacks keep coming—and they’re more dangerous, more frequent, and more successful than ever before. The reality is that we’ve been saying this every year since security operations became a part of enterprise IT. The balance of power has never favored the defenders. Only now, with the advent of decision automation and security analysis software, has it become possible to envision a real shift in power.
  • Taking the Soreness out of SOAR Recorded: Aug 22 2019 11 mins
    Tim Wenzlau, Product Manager, Mike Reynolds, Product Marketing Manager
    Respond Software is announcing the integration of the Respond Analyst with SOAR solutions from Demisto (Palo Alto Networks), Phantom (Splunk) and Security Operations (ServiceNow). The Respond Analyst from Respond Software enables organizations to unlock the true value of their SOAR deployments by managing the up-front analysis of events before they are passed to the SOAR system. Learn how the integration of the Respond Analyst and your SOAR can help you reduce attack dwell time, speed up remediation, and reduce cost.
  • Respond Analyst - Dynamic Scoping and Prioritization Recorded: Aug 15 2019 3 mins
    Chris Calvert
    Considering and correlating new security alerts, as they become available, helps the Respond Analyst made better decisions, faster so security teams dramatically reduce their time to response.
  • The power of Inferred Context - helping the Respond Analyst make better decision Recorded: Aug 15 2019 2 mins
    Chris Calvert
    Chris Calvert explains the Respond Analyst's inferred context skills and how they improve the quality and reliability of the security escalations customers receive.
  • Probability Theory in Security Recorded: Aug 15 2019 2 mins
    Chris Calvert
    Chris Calvert explains the math behind improved security analysis and investigation with the Respond Analyst.
  • Finding Hidden Meaning in your Palo Alto Networks IPS/IDS Deployments Recorded: Sep 19 2018 27 mins
    Steven Wimmer, Sr. Technical Account Manager and Gulia Narliyeva, Technical Account Management
    Feeling like you can’t keep up with the volume of your Palo Alto IPS events? You’re not alone. Nearly every team feels the pain of a mountain of data and an ever decreasing amount of time to accurately review alerts. Luckily, there are solutions to analyze alerts so you find those that are truly malicious and actionable - with only an out-of-the-box expert system.

    Join our 30 min webinar to learn how adding Respond Analyst to your team automates the analysis and triage of every Palo Alto Network IPS/IDS event and sends only vetted, security incidents to your team.

    Key Takeaways:
    1. Understand why every IPS event is important for security analysis, even those events reported as low or medium severity.
    2. See how expert systems, like Respond Analyst, reliably take over the task of monitoring and triage so you can move on to other tasks and projects.
    3. Discover a path forward that enables your team to receive significantly more value out of existing technology investments without building time-consuming correlation rules and queries nor reviewing alerts.
  • A Lifeline for Small Security Teams: Autonomous Security Analysis Recorded: Sep 7 2018 25 mins
    Mitch Webb, Dir. Technical Account Management and Tim Wenzlau, Product Manager
    Can virtual analysts save security teams from drowning in a sea of event data? Join our webinar to see how the Respond Analyst uses its superpowers to analyze network and endpoint data and piece together clues that indicate an actual security situation is occurring. Using real customer examples, you will see how the Respond Analyst is a lifeline for under-resourced security teams delivering vetted, documented security situations for response, rather than monitoring individual events and chasing false-positives.

    “Respond Analyst adds 20 security analysts to our team!”
    -IT Director, Financial Services Provider

    Key takeaways from the webinar:
    -What it takes to deploy a virtual security analyst in your environment
    -How Respond Analyst monitors, analyzes and makes decisions
    -How to compare Respond Analyst to an MSSP
  • The 3 C’s of Modern Security Operations - Coverage, Context, and Cost Recorded: Sep 5 2018 30 mins
    Chris Calvert, VP Product Strategy & Co-Founder and Steven Wimmer, Technical Account Manager
    Join Chris Calvert and Steven Wimmer as they discuss the importance of context in security operations decision-making and how clues may be hiding in your security data. Using data from recent customer deployments, you will see how two organizations improved their analysis coverage and reduced cost by replacing their current MSSP relationship.

    Key Takeaways/Learning of the webinar:
    1. How and why context can make or break your team’s efficiency
    2. Learn how to realize the full value of the security data you are already collecting
    3. Walk-through two case studies where Respond Analyst reduced bottom-line costs while improving security performance.
  • 3 Ways to Get More Value from ArcSight with the Respond Analyst Recorded: Mar 28 2018 42 mins
    Steve Forsyth, ArcSight Product Manager; Steve Dyer,CTO, Respond Software
    Security teams are challenged with the time-consuming task of console monitoring and creating content to keep up with new types of threats and alerts. Get more value from your ArcSight deployment by automating repetitive tasks and freeing up security analysts to hunt and investigate actual threats.

    The Respond Analyst is an AI-based expert system that works with ArcSight to automatically evaluate, scope, and prioritize events. Using a patent-pending Probabilistic Graphical Optimization (PGO™) technology that goes beyond rules-based algorithms, the Respond Analyst delivers more accurate, consistent, and scalable results to help you get more value from your ArcSight deployment.

    • No content writing – the Respond Analyst comes with pre-built reasoning that’s continuously updated with current threat intelligence and personalized by learning from your environment
    • Evaluate the full stream of IDS events – the Respond Analyst evaluates all of the events for potential threats in a consistent, unbiased manner
    • Deliver fully-vetted cases for incident response – identified incidents are prioritized and sent back to the ArcSight console with reasoning and supporting data

    Join us and learn how security teams in large and small SOCs today are realizing the full value of their ArcSight deployment with the Respond Analyst.
  • Voice of the Analyst Study: An Inside Perspective on Security Operations Recorded: Feb 28 2018 40 mins
    Wade Baker, Cyentia Institute Founder and Chris Calvert, VP Product Strategy and Co-Founder, Respond Software
    In the security world, the bad guys and their malicious activities are frequently the center of attention. We think it’s time to shed some light on the good guys--the Security Analysts—and what a day in the life is like for them. The 2017 Cyentia “Voice of the Analyst Study” is the first report to give the security analyst a collective voice that reveals new insights about their jobs and how this might affect a security operations center. Security analysts are our most critical resource, and often one of the organization’s largest operational costs. While these analysts are on the front line of cyber defense, it may be unclear how they spend their time and how they view their role. Join Wade Baker, Cyentia Institute Founder and Chris Calvert, VP Product Strategy and Co-Founder, Respond Software as they share the surprising results of the survey, including security analysts' opinions about catching the bad guys and what needs to change in their work environment so they can be more effective in their role.
Respond Software
Respond Software redefines Security Operations with the first security expert system, The Respond Analyst.

The Respond Analyst acts as a ‘virtual analyst’ for front-line security monitoring. It comes out of the box with the human-like reasoning and decision-making skills required to monitor complex, high volume data sets. Now with automated probability-based reasoning (built into the Respond Analyst) our customers no longer have to filter, tune-down or ignore security alerts. Their security team’s effectiveness is maximized, and they now spend time on more critical projects, like threat hunting and building more automation.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Automated Security Analysis for Palo Alto Networks customers
  • Live at: Sep 19 2019 9:35 pm
  • Presented by: Mike Epplin and Mike Reynolds
  • From:
Your email has been sent.
or close