Webinars

Cloud Risk-Based Authentication To Prevent Password Based Attacks

Gaining unauthorized access to internal systems is one of the top mechanisms employed by hackers. Access control systems, however, are not yet equipped with the advanced analytics needed to detect the sophisticated techniques used by hackers. By integrating your SIEM...
Read More

Kerberoasting Attack Detection For SOC Analysts

"Kerberoasting" is one of the advanced techniques currently in use by hackers to compromise weak service accounts in an Active Directory environment. This webinar by the Securonix Threat Research team will take a deep dive into this attack. We will...
Read More

Under The Hood: Effective Threat Hunting For The SOC Analyst

The modern SOC cannot afford to rely just on cyberthreat detection to stay ahead of sophisticated hackers and advanced attacks. Threat hunting - the proactive approach to root out attacks coming from within is an extremely valuable complement to even...
Read More

Security Threat Research: New Real-World Attacks Update

Join this webinar to learn about the latest threats and attack techniques that the Securonix Threat Research team is seeing in the wild. You will also learn how you can leverage user and big data security analytics to increase the...
Read More

Cloud Security Monitoring and Analytics for the New Age

Organizations are adopting cloud first strategies motivated by strong business drivers that include cost efficiency, faster time to market, and increased agility to respond to market requirements. As this trend continues, the security of infrastructure and data in the cloud...
Read More

Defining UEBA in 2018!

As advanced threats and data breaches continue to grow, many Security vendors are claiming to have about user and entity behavior (UEBA) capabilities to combat such threats. SOC analyst, IR teams, and security solution buyers are looking to cut through...
Read More

Insider Threats: Best Practices For Detecting And Preventing An Attack

Insider Threats are the biggest cybersecurity threat vector in today's open environment. With organizational perimeters gone and sensitive digital data accessible across devices, personnel and geographies, ensuring a data breach does not occur is a formidable challenge. Join our panel...
Read More

Seamlessly Replace Your Legacy SIEM

There is a fundamental shift well underway in the SIEM/Security Management market. Legacy SIEM products designed, built and introduced 15-20 years ago are quickly falling out of favor - a fact painfully obvious in the most recent Gartner SIEM Magic...
Read More

Spark On Hadoop Is The Next Gen SIEM

Today, 79% of security teams are overwhelmed with the volume of threat alerts they are receiving. Many of these SOC teams are forced into using decades old SIEM architectures to monitor their environments. The large alert volumes combined with the...
Read More

5 Steps to GDPR Compliance

Experts in data security, security analytics and GDPR compliance outline the steps your organisation should take to become GDPR compliant, avoid costly penalties and how an analytics-based approach can help. We will provide ample time for questions and answers in...
Read More