InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Built-in, Not Bolted On: Efficiency Gain With Securonix SOAR

Presented by

Augusto Barros, VP Cybersecurity Evangelist & Rahul Bakshi, Senior VP of Product, Securonix

About this talk

Rapid response is essential to mitigate cybersecurity threats. However, using standalone SIEM and SOAR solutions from different vendors adds unnecessary complexity. In a SOC, where every second counts, a simple, unified UI allows security analysts to speed up detection and response and mitigate threats. Join Augusto Barros, VP Cybersecurity Evangelist, and Rahul Bakshi, Senior VP of Product Management, for a live discussion on how Securonix's SOAR solution brings security operations into a single pane of glass for end-to-end incident life cycle management. In this session, you will learn: - Trends in the SIEM and SOAR markets from the experts - How to apply automation effectively to drive SOC efficiency - How to simplify security operations and drive down MTTR - How to avoid common traps on SOAR implementation Augusto Barros was most recently the Research VP in the Gartner for Technical Professionals (GTP) Security and Risk Management group. He has over 20 years of experience in the IT security industry as an analyst and a security architect and officer for large enterprises. Rahul Bakshi is responsible for driving and managing product strategy. Before Securonix, he has twenty years of experience leading high-performing teams across Product, Marketing, and Sales in the SaaS and Security industries.
Information Security

Information Security

259756 subscribers736 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics