Hi [[ session.user.profile.firstName ]]

Finding Incidents Using Web Filtering Data

The Respond Analyst monitors and investigates web filtering data from the leading vendors including Palo Alto Networks, Symantec, McAfee, Cisco, Forcepoint, Carbon Black and ZScaler.
Recorded Oct 29 2019 15 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tim Wenzlau, Product Manager, Mike Reynolds, Product Marketing Manager
Presentation preview: Finding Incidents Using Web Filtering Data

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Finding Incidents Using Web Filtering Data Recorded: Oct 29 2019 15 mins
    Tim Wenzlau, Product Manager, Mike Reynolds, Product Marketing Manager
    The Respond Analyst monitors and investigates web filtering data from the leading vendors including Palo Alto Networks, Symantec, McAfee, Cisco, Forcepoint, Carbon Black and ZScaler.
  • Fintech CISO Shares 5 Tips: How Kyriba Automated SecOps Recorded: Oct 22 2019 37 mins
    Eric Adams, CISO and Kevin Bailey, Dir. of Global Security @ Kyriba
    Build a world-class security operation with a lean, nimble team.

    When security leaders are asked to ‘do more with less’, their choices are 1) reduce their team size 2) think out of the box 3) find a new job. The team at Kyriba chose option #2.

    Join Eric Adams, CISO at Kyriba and Kevin Bailey, Director of Global Security at Kyriba, as they discuss their journey in re-thinking and re-building their security operations program to both extend their capability and make a big improvement to the bottom line. We'll share how Kyriba’s team optimized resources with a SaaS-based security program built with decision automation and key integrations while adhering to the strictest compliance standards in the world.
  • Automated Security Analysis for Palo Alto Networks customers Recorded: Sep 19 2019 63 mins
    Mike Epplin and Mike Reynolds
    Turn your Palo Alto Networks data into actionable security escalations. Monitor, analyze and triage security Palo Alto Networks NGFW, Traps and Cortex data with software, not people.
  • The Repond Analyst - Use Cases and Decision-making skills Recorded: Sep 5 2019 15 mins
    Chris Calvert VP Products
    Deep dive into how the Respond Analyst makes decisions and escalates security incidents across MITRE ATT&CK™ framework.
  • Security Operations is broken. What can we do about it. Recorded: Aug 28 2019 12 mins
    Chris Calvert
    There’s a lot of talk about how things keep getting worse for security operations. The attacks keep coming—and they’re more dangerous, more frequent, and more successful than ever before. The reality is that we’ve been saying this every year since security operations became a part of enterprise IT. The balance of power has never favored the defenders. Only now, with the advent of decision automation and security analysis software, has it become possible to envision a real shift in power.
  • Taking the Soreness out of SOAR Recorded: Aug 22 2019 11 mins
    Tim Wenzlau, Product Manager, Mike Reynolds, Product Marketing Manager
    Respond Software is announcing the integration of the Respond Analyst with SOAR solutions from Demisto (Palo Alto Networks), Phantom (Splunk) and Security Operations (ServiceNow). The Respond Analyst from Respond Software enables organizations to unlock the true value of their SOAR deployments by managing the up-front analysis of events before they are passed to the SOAR system. Learn how the integration of the Respond Analyst and your SOAR can help you reduce attack dwell time, speed up remediation, and reduce cost.
  • Respond Analyst - Dynamic Scoping and Prioritization Recorded: Aug 15 2019 3 mins
    Chris Calvert
    Considering and correlating new security alerts, as they become available, helps the Respond Analyst made better decisions, faster so security teams dramatically reduce their time to response.
  • The power of Inferred Context - helping the Respond Analyst make better decision Recorded: Aug 15 2019 2 mins
    Chris Calvert
    Chris Calvert explains the Respond Analyst's inferred context skills and how they improve the quality and reliability of the security escalations customers receive.
  • Probability Theory in Security Recorded: Aug 15 2019 2 mins
    Chris Calvert
    Chris Calvert explains the math behind improved security analysis and investigation with the Respond Analyst.
  • Finding Hidden Meaning in your Palo Alto Networks IPS/IDS Deployments Recorded: Sep 19 2018 27 mins
    Steven Wimmer, Sr. Technical Account Manager and Gulia Narliyeva, Technical Account Management
    Feeling like you can’t keep up with the volume of your Palo Alto IPS events? You’re not alone. Nearly every team feels the pain of a mountain of data and an ever decreasing amount of time to accurately review alerts. Luckily, there are solutions to analyze alerts so you find those that are truly malicious and actionable - with only an out-of-the-box expert system.

    Join our 30 min webinar to learn how adding Respond Analyst to your team automates the analysis and triage of every Palo Alto Network IPS/IDS event and sends only vetted, security incidents to your team.

    Key Takeaways:
    1. Understand why every IPS event is important for security analysis, even those events reported as low or medium severity.
    2. See how expert systems, like Respond Analyst, reliably take over the task of monitoring and triage so you can move on to other tasks and projects.
    3. Discover a path forward that enables your team to receive significantly more value out of existing technology investments without building time-consuming correlation rules and queries nor reviewing alerts.
  • A Lifeline for Small Security Teams: Autonomous Security Analysis Recorded: Sep 7 2018 25 mins
    Mitch Webb, Dir. Technical Account Management and Tim Wenzlau, Product Manager
    Can virtual analysts save security teams from drowning in a sea of event data? Join our webinar to see how the Respond Analyst uses its superpowers to analyze network and endpoint data and piece together clues that indicate an actual security situation is occurring. Using real customer examples, you will see how the Respond Analyst is a lifeline for under-resourced security teams delivering vetted, documented security situations for response, rather than monitoring individual events and chasing false-positives.

    “Respond Analyst adds 20 security analysts to our team!”
    -IT Director, Financial Services Provider

    Key takeaways from the webinar:
    -What it takes to deploy a virtual security analyst in your environment
    -How Respond Analyst monitors, analyzes and makes decisions
    -How to compare Respond Analyst to an MSSP
  • The 3 C’s of Modern Security Operations - Coverage, Context, and Cost Recorded: Sep 5 2018 30 mins
    Chris Calvert, VP Product Strategy & Co-Founder and Steven Wimmer, Technical Account Manager
    Join Chris Calvert and Steven Wimmer as they discuss the importance of context in security operations decision-making and how clues may be hiding in your security data. Using data from recent customer deployments, you will see how two organizations improved their analysis coverage and reduced cost by replacing their current MSSP relationship.

    Key Takeaways/Learning of the webinar:
    1. How and why context can make or break your team’s efficiency
    2. Learn how to realize the full value of the security data you are already collecting
    3. Walk-through two case studies where Respond Analyst reduced bottom-line costs while improving security performance.
  • 3 Ways to Get More Value from ArcSight with the Respond Analyst Recorded: Mar 28 2018 42 mins
    Steve Forsyth, ArcSight Product Manager; Steve Dyer,CTO, Respond Software
    Security teams are challenged with the time-consuming task of console monitoring and creating content to keep up with new types of threats and alerts. Get more value from your ArcSight deployment by automating repetitive tasks and freeing up security analysts to hunt and investigate actual threats.

    The Respond Analyst is an AI-based expert system that works with ArcSight to automatically evaluate, scope, and prioritize events. Using a patent-pending Probabilistic Graphical Optimization (PGO™) technology that goes beyond rules-based algorithms, the Respond Analyst delivers more accurate, consistent, and scalable results to help you get more value from your ArcSight deployment.

    • No content writing – the Respond Analyst comes with pre-built reasoning that’s continuously updated with current threat intelligence and personalized by learning from your environment
    • Evaluate the full stream of IDS events – the Respond Analyst evaluates all of the events for potential threats in a consistent, unbiased manner
    • Deliver fully-vetted cases for incident response – identified incidents are prioritized and sent back to the ArcSight console with reasoning and supporting data

    Join us and learn how security teams in large and small SOCs today are realizing the full value of their ArcSight deployment with the Respond Analyst.
  • Voice of the Analyst Study: An Inside Perspective on Security Operations Recorded: Feb 28 2018 40 mins
    Wade Baker, Cyentia Institute Founder and Chris Calvert, VP Product Strategy and Co-Founder, Respond Software
    In the security world, the bad guys and their malicious activities are frequently the center of attention. We think it’s time to shed some light on the good guys--the Security Analysts—and what a day in the life is like for them. The 2017 Cyentia “Voice of the Analyst Study” is the first report to give the security analyst a collective voice that reveals new insights about their jobs and how this might affect a security operations center. Security analysts are our most critical resource, and often one of the organization’s largest operational costs. While these analysts are on the front line of cyber defense, it may be unclear how they spend their time and how they view their role. Join Wade Baker, Cyentia Institute Founder and Chris Calvert, VP Product Strategy and Co-Founder, Respond Software as they share the surprising results of the survey, including security analysts' opinions about catching the bad guys and what needs to change in their work environment so they can be more effective in their role.
Respond Software
Respond Software redefines Security Operations with the first security expert system, The Respond Analyst. Driven by its patent-pending Probabilistic Graphics Optimization (PGO) technology, Respond Analyst emulates the decision-making of an expert security analyst, effectively becoming a SOC team member that specializes in high-volume, low signal use cases while it applies, adapts and maintains an organization’s tribal knowledge 7x24x365. Respond Software was founded by security operations veterans and world class product technologists to serve its customers across multiple industries.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Finding Incidents Using Web Filtering Data
  • Live at: Oct 29 2019 6:45 pm
  • Presented by: Tim Wenzlau, Product Manager, Mike Reynolds, Product Marketing Manager
  • From:
Your email has been sent.
or close