How Equinix is Supercharging NGAV with Behavioral DLP & User Intelligence

Logo
Presented by

Jamie Lindsay, Director of Customer Success, DTEX Systems & Stephen Seljan, Manager of Security Operations @Equinix

About this talk

Next-Gen Anti-Virus technology has greatly improved every organizations ability to detect, identify and stop malware from infecting their endpoints, servers and networks. The efficacy over legacy solutions is undebatable. So why are we continuing to hear about continued data breaches? It’s simple really… humans. Users remain the elusive ‘missing link’ who’s behavior has the most impact on an organizations risk posture. Join DTEX Chief Customer Success Officer Rajan Koo and DTEX customer, Stephen Seljan, Security Operations Manager at Equinix, to learn how they are super-charging their NGAV tool with behavioral DLP and human activity forensics. The two will discuss and detail: - Why and how Equinix utilizes EDR and NGAV; - What gaps are filled by DTEX InTERCEPT including behavioral DLP and human cyber forensics; - How Equinix is moving ‘Left of Boom’ with an integrated NGAV/DLP/Insider Threat approach that is delivering a 200% reduction in time to remediation.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (10)
Subscribers (1514)
DTEX Systems helps hundreds of organizations worldwide better understand their workforce, protect their data and make human-centric operational investments. Its Workforce Cyber Intelligence platform brings together UEBA, endpoint DLP, digital forensics, user activity monitoring and insider threat management in one scalable, cloud-native platform. Through its patented and privacy-compliant meta-data collection and analytics engine, the DTEX platform surfaces abnormal behavioral “indicators of intent” to mitigate risk of data and IP loss and make smarter business decisions quickly. The content of this channel is geared towards security teams and their leaders who are looking for the latest research and case studies that will help them tackle today's greatest security challenges.