How to Detect and Investigate Brute Force Attacks with AlienVault USM Anywhere

Logo
Presented by

Sacha Dawes, Principal Product Marketing Manager, AlienVault

About this talk

A brute force attack is one of the more common types of attack that malicious actors use to try and gain access to your IT servers, applications and data. In theory, a brute-force attack can be used to attempt to decrypt any encrypted data (except for data encrypted in an information-theoretically secure manner). These attacks are relatively simple for attackers to implement and they can wreak havoc on your organization when successful. However, many IT security teams may not be aware that they are at risk from these attacks, or what to do about them. Join us for a live demo where we'll demonstrate how the AlienVault Unified Security Management (USM) approach, delivered as a SaaS solution with our USM Anywhere offering, can help you detect and investigate these types of attacks. You'll learn: - How attackers can use brute force attacks to gain access to your network - Steps you can take BEFORE an attack to identify systems or applications that may be at greater risk - How USM Anywhere can alert you immediately of brute force attacks targeting your cloud, hybrid cloud and on-premises environments - How to use USM Anywhere to investigate brute force attacks and identify compromised assets About the Presenter: Sacha Dawes is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (35)
Subscribers (72860)
Welcome to LevelBlue. We simplify cybersecurity through award-winning managed security services, experienced strategic consulting, threat intelligence and renowned research. Our team is a seamless extension of yours, providing transparency and visibility into security posture and continuously working to strengthen it. We harness security data from numerous sources and enrich it with artificial intelligence to deliver real-time threat intelligence. This enables more accurate and precise decision making. With a large, always-on global presence, LevelBlue sets the standard for cybersecurity today and tomorrow. We easily and effectively manage risk, so you can focus on your business. LevelBlue. Cybersecurity. Simplified.