The SOC Visibility Triad: An integrated approach to stopping attackers

00
Days
00
Hrs
00
Min
00
Sec

The SOC Visibility Triad: An integrated approach to stopping attackers

Register

In collaboration with

The SOC triad addresses the CISO’s security challenges

Today’s dynamic threat environment presents CISOs with difficult and unique challenges. They need security solutions that make their SOC more adaptive and responsive, all while reducing complexity and increasing effectiveness. They also need to build stronger security teams within tight budget constraints.

In Gartner’s research report, “Applying Network-Centric Approaches for Threat Detection and Response”  published March 18, 2019 (ID: G00373460), Augusto Barros, Anton Chuvakin, and Anna Belak introduced the concept of the SOC Visibility Triad. The SOC Visibility Triad helps CISOs meet these critical challenges by increasing security visibility and response capabilities across the infrastructure.

Capabilities of the model include the fusion of:

  • Endpoint detection and response (EDR)
  • Network detection and response (NDR)
  • Security information and event management (SIEM)

How does SOC Visibility Triad address these challenges?

By tying together EDR, NDR and SIEM tools into a well-integrated whole, SOCs can detect advanced threats that masquerade as benign processes on endpoints, communicating via encrypted network tunnels. Having immediate visibility into the entirety of the attack, SOC teams gain confidence and respond more quickly and decisively.

Join us at this exclusive event to learn more about how you can benefit by applying the SOC Visibility Triad model.

Yes, yes, we know, filling out forms is painful. But staring at empty boxes is even more painful and doesn’t reserve your place at this event. Keep in mind the form may not load if you are using an ad blocker.

Ja, wir wissen, dass es mühsam ist, Formulareauszufüllen. Aber mit einer leeren Box zu starten, ist noch mühsamer. Alsobitte akzeptieren Sie die Cookies, sodass Sie bereits vorausgefüllte Feldersehen.

Vectra needs the information you provide to us to process your inquiry and to contact you about our products. You may unsubscribe from these communications at anytime. For more information check out our Privacy Policy.

Vectra benötigt die Informationen, die Sie uns zur Verfügung stellen, um Ihre Anfrage zu bearbeiten und Sie bezüglich unserer Produkte zu kontaktieren. Sie können diese Mitteilungen jederzeit abbestellen. Weitere Informationen finden Sie in unseren Datenschutzbestimmungen.

Agenda

Presenter(s)

Moderator(en)

Location

Standort

Address
Addresse

Leña Restaurant

Room - Sala Dos

176 Yonge Street

Toronto, ON M5C 2L7

Date and time
Datum und Uhrzeit

Tuesday, October 15

8 a.m. – 11 a.m.

In collaboration with

Splunk
Splunk
Splunk turns machine data into answers. Organizations of all sizes and across industries are using Splunk to unleash innovation and solve their toughest IT, security and business challenges. With more than 4,700 employees in 27 offices worldwide, we’re helping over thousands of customers manage their network security, IT operations, IoT networks and more.
Visit website
Crowdstrike
Crowdstrike
CrowdStrike is the pioneer of cloud-delivered endpoint protection. CrowdStrikeFalcon has revolutionized endpoint security by being the first and only solution to unify next-generation antivirus, endpoint detection and response (EDR), and a 24/7 threat hunting service — all delivered via a single lightweight agent.
Visit website
Vectra
Vectra
Vectra® is transforming cybersecurity by applying advanced AI to detect and respond to hidden cyberattackers before they do damage. Powered by AI, Vectra and its flagship Cognito® platform enable the world’s most consequential organizations to detect attackers in real time and empower threat hunters to perform conclusive incident investigations.
Visit website
Herjavec Group
Herjavec Group
Dynamic IT entrepreneur Robert Herjavec founded Herjavec Group in 2003 to provide cybersecurity products and services to enterprise organizations. We have been recognized as one of the world’s most innovative cybersecurity operations leaders, and excel in complex, multi-technology environments. We have expertise in comprehensive security services including Managed Security Services (SOC Operations, Threat Detection, Security Technology Engineering) & Professional Services (Advisory Services, Identity Services, Technology Implementation, Threat Management & Incident Response). Herjavec Group has offices and Security Operations Centers across the United States, United Kingdom, and Canada.
Visit website