Remove Architecture Remove Threat Detection Remove Webinar
article thumbnail

20 Years of SIEM Webinar Q&A

Anton on Security

I recently did this fun SANS webinar titled “Anton Chuvakin Discusses “20 Years of SIEM?—?What’s What’s Next?”” (the seemingly self-centered title was suggested by CardinalOps who organized the webinar). As it is common for SANS webinars , we got a lot of great questions that I feel like re-answering here for posterity.

article thumbnail

Not the Final Answer on NDR in the Cloud …

Anton on Security

As we discussed during this recent webinar , this is not about competing with endpoint or endlessly arguing about what security telemetry is “better.” detect threats with no agents, offer broad coverage from a few points, and be out of band (go and see my old Gartner paper for details). Your main on-premise tool?—?EDR?—?may

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Snort 3: Rearchitected for Simplicity and Performance

Cisco Security

Snort was able to keep up with the packet flow rate because of its lightweight, packet-based architecture. Snort 3 provides a new, flow-based and modular platform to address some of the challenges inherent to the previous packet-based architecture. At that time, gigabit networks were in their infancy.

Firewall 121
article thumbnail

Not the Final Answer on NDR in the Cloud …

Security Boulevard

As we discussed during this recent webinar , this is not about competing with endpoint or endlessly arguing about what security telemetry is “better.” detect threats with no agents, offer broad coverage from a few points, and be out of band (go and see my old Gartner paper for details). Your main on-premise tool?—?EDR?—?may

article thumbnail

Extending Zero Trust Security to Industrial Networks

Cisco Security

I recently presented a webinar explaining the specific Zero Trust requirements for IoT/OT networks: Endpoint visibility. Threat detection and response. Communications are continuously monitored to detect malicious traffic and abnormal behaviors. Learn more by watching the replay of the webinar I recently presented.

IoT 89
article thumbnail

Understanding Identity Acronyms: What Are ISPM & ITDR?

Duo's Security Blog

Given the complexity of policy, even the most advanced teams struggle to deploy, maintain and assess a strong access management policy posture standard that helps mitigate threats while also supporting a productive business. What is ITDR, or Identity Threat Detection & Response? Why is ITDR & ISPM important?

article thumbnail

Strengthening Cyber Resilience: A Milestone Partnership

Security Boulevard

Don’t miss our upcoming threat intelligence webinar! This interoperability allows organizations to leverage existing investments in security infrastructure while enhancing their overall cyber defense posture and ensuring a future-proof architecture, capable of adapting and changing with the organization.