Virtual, live or at your leisure
The need for visibility to detect attacks occurring in your hybrid Cloud.
WATCH ON-DEMANDWATCH ON-DEMANDby type of event
Type of event
by topic
Topic
by region
Region
by language
Language
Learn various methods of data collection that provide visibility into attacker behaviors between cloud workloads and the different levels of insight they can deliver.
Learn how security enriched network metadata provides high-fidelity evidence for retrospective threat hunting and enterprise-wide visibility into hidden threats and compliance issues.
Explore how NDR can be leveraged during the M&A process to conduct a security assessment and also to assess risk and compliance of the target organization.
Watch this webcast, where SANS instructor Matt Bromiley will discuss how to leverage the MITRE attack framework for threat hunting.
Learn why an access-based approach to zero trust is fundamentally flawed, and how you can monitor the privileged interactions on the network that are more reliable.
Learn how to add powerful visualizations in Recall to understand what goes on in your network, and how to easily create and edit custom models to catch specific re-occurrences automatically.
Explore how enterprises are evolving their security capabilities to become more agile, efficient, and dramatically reduce attacker dwell time through the application of AI.
Vectra research shows that privileged access from unknown hosts occurs inside every industry, leading to unintended exposure of critical systems.
Learn how NHS Bolton Foundation Trust, a UK regional healthcare provider overcame stretched resources using an innovative approach of automation and AI.
Join this webcast to learn why preventative solutions aren't sufficient to stop attacks.
Dann melden Sie sich zu unserem Webinar am15. April 2020 an. Wir freuen uns auf Sie!
Au cours de cette conférence Web, nous vous présenterons pourquoi une attaque dans le cloud peut avoir plus d'impact que sur une infrastructure conventionnelle.
Learn how you can benefit by applying the SOC visibility triad model.
Join this webcast to learn how Vectra Cognito can help stop attacks before they become breaches, regardless of where they happen.
Learn how you can benefit by applying the SOC Visibility Triad model.
In diesem Webcast lernen Sie, wie Vectra AI Ihnen hilft, schnell zu erkennen unbekannte Malware, die sich von einem privaten Endgerät über VPN einschleicht.
Notre webconference reviendra sur 4 secteurs exploités par les attaquants et la manière dont Vectra vous permet de reprendre le contrôle.
Watch now to examine five areas that attackers will target and your best practices to re-gain visibility and control across your remote worker attack surface.
In this discussion, we present a new way of thinking about network threat hunting and AI.
Rejoignez Cybereason, Splunk et Vectra lors de ce webinaire pour mieux comprendre les avantages que vous pouvez tirer de ce modèle « SOC Visibility Triad ».
In this webcast we will cover how modern security teams use machine learning to enrich both network traffic and logs with attributes specifically for cloud environments.
Les paradigmes Cloud entraînent l’apparition de nouvelles attaques ainsi que de nouvelles sources de données pour la chasse aux menaces et les investigations
Geänderte Denkweisen in der Cloud ermöglichen Hackern neue Formen von Angriffen und erzeugen gleichzeitig zusätzliche Datenquellen für die Bedrohungssuche und Forensik.
Hoe om te gaan met security en de open cultuur binnen de educatieve sector
Learn best practices on how to set expectations and motivate employees, how to assess and adapt to individual needs, and how best to create and sustain a high-performing team.
Learn the steps NHS Trusts have made to improve patient care through the strengthening of cyber resilience.
Fallen Sie und Ihr Unternehmen/Behörde unter spezielle Regulatorien wie KRITIS oder MELANI?
Learn about the impact of artificial intelligence and machine learning on cybersecurity, and how DZ BANK has built AI into their cybersecurity strategy.
Unisciti a Cybereason, Splunk e Vectra in questo webinar per capire di più su come trarre vantaggio dall'applicazione del modello SOC Visibility Triad.
Rapid cloud adoption can lead to increased risk. Learn about the latest trends and how NDR can bring back control and visibility, featuring Jon Oltsik of ESG.
Watch this panel discussion and get insights on the essential capabilities required for the changing work landscape and how we can all work 'better together.'
Learn how organizations are moving their workloads into cloud services, how attacks in the cloud have evolved, and the role of NDR in securing your deployments.
Learn the way to gain full visibility into threats. Join Splunk, CrowdStrike and Vectra, for this webinar to understand how you can benefit from utilising the SOC Visibility Triad.
Nehmen Sie an diesem Webcast teil, um zu sehen, wie Vectra’s NDR mit Microsoft Defender ATP und Microsoft Azure Sentinel zusammenarbeitet.
Leer hoe u EDR-, NDR- en SIEM samen te voegen tot een goed geïntegreerd geheel kunnen en geavanceerde dreigingen detecteren op endpoints, IoT devices, datacenters en cloud.
Regardez ce webinaire à la demande pour découvrir comment la solution Vectra opère en synergie avec Microsoft Defender ATP et Microsoft Azure Sentinel.
Learn how the Vectra and Swimlane integration provides automated and actionable intelligence to reduces SOC workloads.
Join Microsoft and Vectra to learn how to enhance visibility and early detection, prioritize alerts and make your SOC more effective and efficient.
Ontdek hur AI kan användas för operativ säkerhetsövervakning i universitetsmiljö.
Learn how to apply zero trust concepts to the enterprise network to monitor privileged interactions, anticipate what assets will be targeted by attackers and take action.
Leer hoe u EDR-, NDR- en SIEM samen te voegen tot een goed geïntegreerd geheel kunnen en geavanceerde dreigingen detecteren op endpoints, IoT devices, datacenters en cloud.
Join this CISO panel of cybersecurity leaders to learn why network detection and response is foundational to protecting against cyberattacks.
Discover how AWS and Vectra provide SOC professionals the ability to identify attacker behaviors between cloud workloads and stop threats before damage occurs.
Learn why cyber threat intelligence is the best defense against sophisticated attackers and how you can understand and know your cyber risk.
Erfahren Sie von Microsoft und Vectra, wie Sie Defender for Endpoint (Defender ATP) in Verbindung mit der Cognito platform verwenden können.
Join Microsoft and Vectra to learn how using Defender for Endpoint (Defender ATP) in the Cognito platform can help you.
Learn the way to gain full visibility into threats. Join Splunk, CrowdStrike and Vectra, for this webinar to understand how you can benefit from utilising the SOC Visibility Triad.
Join Cybereason, Splunk, and Vectra at this webinar to understand more about how you can benefit by applying the SOC Visibility Triad model.
Learn from SANS Expert how to determine the best strategy and models for modernizing and adapting to the new network in your SOC for 2020 and beyond.
Experience the value of Vectra from anywhere. In this webinar, we will explain how you can run attack simulations in a live interactive environment.
Discover a better approach to cybersecurity with NDR and how this will help you protect your high-value academic research from theft.
Learn how Sanofi, a global pharmaceutical company, dealt with a cyberattack and how Vectra helped identify and stop the attack, thus preventing a data breach.
Learn how NDR can help CNI operators meet regulatory standards for cybersecurity and be ready and able to defend, detect and respond to cyberattacks.
Learn how SolarFlare progressed and evaded detection and what you can do.
This webcast with SANS and Vectra AI will outline how to hunt for compromised assets within network telemetry.
Join us for this fireside chat to hear how a global retail giant passed their first red team test with Vectra.
This webcast with SANS and Vectra AI will cover post identification activities to effectively determine the scope of an intrusion.
Get exclusive insights about the top 10 threat detections in Microsoft Azure AD and Office 365 and how they can affect your cloud security.
Im neuesten Webinar erhalten Sie einen detaillierten Überblick der wichtigsten Erkennungen, mit denen unsere Kunden Angriffe in Azure AD und Office 365 ratifizieren.
Lors de ce webinar vous pourrez apprendre à reconnaître les comportements inhabituels ou non sécurisés dans Azure AD et Office 365 et ce qu'ils peuvent signifier pour votre environnement.
With the mass adoption of cloud security technologies, get clarity on public cloud security IaaS and PaaS environments from Forrester.
In this webinar with SANS and Vectra AI, uncover the survey results on how cloud security has changed the enterprise infrastructure. You will also learn how to see and stop threats across your enterprise network and multi-cloud environment.
The cloud changes everything, including the way we address security challenges. Tune in to see how you can improve your cloud security posture with Splunk and Vectra.
Die schnelle Umstellung auf die Cloud hat Benutzer und Apps anfällig gemacht. Hören Sie von Vectra AI einen neuen Ansatz zur Detection & Response für IaaS und PaaS.
Vectra Senior Consulting Analyst, Matt Pieklik, will cover a real-world case study that shows how a SOC was able to stop an advanced actor after they had already bypassed perimeter defenses.
In this webinar, see how Tallink, the largest shipping company operating in the Baltic Sea, prevents cyberattacks with Vectra.
In this session, Tom D’Aquino, Sr. Security Engineer at Vectra, will detail a platform and methodology that helps practitioners automate testing and validation of a network security stack.
Im Webinar spricht Urs Borter von MPS Micro Precision Systems aus der Schweiz wie er mit KI basierter Network Detection und Response eine Ransomware Attacke stoppen konnte.
In this webinar with SANS instructor, Matt Bromiley, learn how ransomware has changed, how to see it before it starts and where we think ransomware is headed.
Der weltweit größte unabhängige Entwicklungsdienstleister der Mobilitätsindustrie EDAG setzt nach Ransomware-Attacke auf Vectra AI’s NDR Lösung.
Time is all that matters. Time to value, time to detect a threat, and response time are critical - join us to learn more.
MITRE and the NSA are advising organizations to implement the D3FEND framework in their security plans.
The need for visibility to detect attacks occurring in your hybrid Cloud.
MITRE und die NSA raten Organisationen, das D3FEND-Framework in ihre Sicherheitspläne aufzunehmen.
Gagnez 3 crédits CPE lors de cet atelier, un laboratoire pratique pour affiner l'analyse, la chasse et les compétences défendues dans un environnement simulé.
The network metadata the Vectra platform produces can be valuable for threat investigations. Have you wondered how you could make use of same metadata to proactively hunt for threats?
Earn 3 CPE credits at this workshop, a hands-on lab to sharpen analysis, hunting and defended skills in a simulated environment.
Guadagna 3 crediti CPE in questo workshop, un laboratorio pratico per affinare le abilità di analisi, caccia e difesa in un ambiente simulato.
Earn 3 CPE credits at this workshop, a hands-on lab to sharpen analysis, hunting and defended skills in a simulated environment.
Erweitern Sie Ihre Kompetenzen für Analysen, Threat Hunting und Abwehr, indem Sie sich in einer simulierten Unternehmensumgebung selbst davon überzeugen, wie Sie raffinierte Angriffe erkennen und abwehren können.
Earn 3 CPE credits at this workshop, a hands-on lab to sharpen analysis, hunting and defended skills in a simulated environment.
Gagnez 3 crédits CPE lors de cet atelier, un laboratoire pratique pour affiner l'analyse, la chasse et les compétences défendues dans un environnement simulé.
Earn 3 CPE credits at this workshop, a hands-on lab to sharpen analysis, hunting and defended skills in a simulated environment.
Earn 3 CPE credits at this workshop, a hands-on lab to sharpen analysis, hunting and defended skills in a simulated environment.
Gagnez 3 crédits CPE lors de cet atelier, un laboratoire pratique pour affiner l'analyse, la chasse et les compétences défendues dans un environnement simulé.
Loading more...