How to integrate Vectra with Phantom
Extend threat intelligence to the automation and orchestration platform
This webcast shows how Vectra integrates with the Phantom automation and orchestration platform. It includes a playbook that showcases how to implement automated and semi-automated workflows using Vectra Active Enforcement for Phantom.
Register to watch it now
Ticketmaster automates threat hunting
Learn how AI secures transactions for more than 400 million ticket-buyers
Don't miss this 30 minute session with Beau Canada, vice president of information security at Ticketmaster, as he will explain how artificial intelligence in the Vectra cybersecurity platform automates the hunt for hidden cyber attackers inside the organization's network. Learn how AI has helped secure transactions for more than 400 million fans and protects the brand identity of more than 20 countries.
Register to watch it now
Post-Intrusion Report, 1Q 2017
The 2017 Post-Intrusion Report reveals cyber attack detections and trends from nearly 200 Vectra enterprise customers across 13 different industries. By examining attacker behaviors, Vectra shows where potential exposure and risk exist inside networks and uncovers strong indicators of potentially damaging data breaches.
Ransomware pandemic special
On Friday, May 12, 2017 a ransomware attack spread very rapidly among unpatched Windows systems worldwide.
Advances in AI augmenting security teams, is seeing the industry shift to identifying attacker behavior in real time. Attend this webinar to learn more about the attack and how Vectra®Networks automates the hunt for hidden cyber attacks.
Why data center attackers are aiming low
While most data center security has focused on protecting the virtualized layers, real-world attackers are increasingly subverting the data center's physical infrastructure. This webcast analyzes the reality of data center cybersecurity.
The expanding role of data analytics in threat detection
The SANS Institute
Recent SANS studies on malware, intrusion prevention and cyber threat intelligence agree that almost every organization, no matter how well prepared, is infected with malware to some degree and that many show signs of malicious activity.
This webinar provides insight and guidance about:
- The characteristics of the technologies being used in this modern age of intelligence-driven threat detection
- How this new type of threat detection differs from more traditional methods
- How data analytics affects existing security frameworks and complement critical security controls"
Building resilient security with network-based threat detection
Prevention alone is not enough. IDS, SIEM tools and other traditional threat detection methods aren’t solving the problem, either. Join host Mike Rothman, president of Securosis, who will share perspectives from his research report, Network-Based Threat Detection. Vectra CSO Gunter Ollmann will also share real-world examples and observations from the field.
The new rules of engagement for breach detection
Forrester Principal Analyst John Kinderwag will explain the new rules of engagement for automating the response to network breaches. Also, Wade Williamson, director of threat analytics at Vectra, will expose real-world cyber-attack techniques and reveal new detection methodologies that can identify active threats before data is stolen.
Hostage crisis survival: The ransomware pandemic
Tune-in to hear Jacob Sendowski, Ph.D., senior product manager at Vectra Networks and Wade Williamson, direct of threat analytics at Vectra Networks discuss ransomware, the implications for enterprises, and steps that can be taken to help IT organizations address the risks.
Making cybersecurity manageable with high-fidelity security
Join David Monahan, research director at leading IT analyst firm Enterprise Management Associates (EMA), and Wade Williamson, director of threat analytics at Vectra Networks, to learn how to implement high-fidelity security to manage today’s most challenging threats, efficiently and effectively.
The hidden role of IoT in cyber attacks
Networked IoT devices – printers, cameras and even advanced devices like MRI scanners – can pose an alarming cybersecurity risk. While they don’t fit the bill of a traditional network host, they represent fruitful targets and vectors for cyber attackers.
In this live webinar, we will dive into examples of how attackers target and use IoT device vulnerabilities to their advantage, and how IT security organizations can stop this emerging threat.
Protecting healthcare organizations from cyber attacks
Connie Barrera, CISO of the internationally recognized Jackson Health System in Miami, will talk about the rising tide of cyber attacks and medical device vulnerabilities that are threatening healthcare organizations and how automated threat management has played a key role in mitigating this ominous problem – without requiring additional headcount.