Webcasts & Archived Webinars

Industry Trends in Log Management

ETM Security Podcast: Insight into SIEM

Dr. Anton Chuvakin leads an all-star panel to provide some useful information on SIEM for enterprises and small organizations. He is joined by A. N. Ananth (Prism Microsystems), Nick Briers (IBM TIVOLI) and Brian Singer (NOVELL). Continue reading →

Driving Business ROI with EventTracker

Security & Compliance for Electric Coops

This webinar discusses the security and compliance requirements for Electric Coops, how to improve your data security, and how EventTracker can help you maintain confident compliance. Continue reading →

Improve data security and meet the PCI-DSS compliance requirement

This webinar discusses the PCI-DSS compliance requirements, how to improve your data security, and how EventTracker can help you maintain confident compliance. Continue reading →

Using Behavior-based Correlation to Detect Threats in Real Time

This webinar will describe how you can substantially tighten your security profile and detect security threats in real time by using simple Behavior-based Correlation. This webcast will introduce the technique and show it in action detecting specific security threats. Continue reading →

Beyond Traditional Security. Blending Proactive and Reactive Security to Protect the Enterprise.

Traditional firewalls and Intrusion Detection Systems leave your organization unprotected from most zero-day and internal attacks. You need a combination of both event and change management practices to protect your organization. This webinar will discuss how to use a combination of proactive and reactive security strategies to shield your organization from these dangerous threats. Continue reading →

Are You Monitoring the Top Ten Critical Security, System, and User Events

Monitoring the Microsoft Windows Event Log is critical because the Operating System and key applications continuously record critical security, system and user events in the Log. However, monitoring the Windows Event Log alone is not enough because many important conditions in Windows are not recorded in the Event Log. Continue reading →

Defending and Monitoring Enterprise wide USB Storage Devices

In this webinar, we will demonstrate a new way how, by using EventTracker’s USB monitoring capability, you can limit USB access to certain devices on specific machines at the same time actively monitoring USB activity on all systems. Continue reading →

Detecting a Hacking Attempt

In today’s technological environment, threat profiles are evolving constantly and growing in sophistication and the impact of successful attacks is far more severe in terms of lost revenue and negative publicity. Relying on reactive anti-virus and rule-based firewall systems alone are often insufficient to prevent damage. It is critical to quickly and effectively respond while an attack is in progress. Continue reading →

Top Ten Best Practices to Stop Insider Threats

These “Best Practices” have been developed from experience gained through hundreds of customer interactions. This webinar will: * discuss the top ten insider activities you have to monitor* demonstrate how to quickly and cost-effectively implement these valuable recommendations. Continue reading →

Monitoring unauthorized changes for your Enterprise

Attend this webinar to learn how implementing change control in your environment can help you pro-actively handle critical security challenges including: * Maintain a trail of unauthorized/authorized changes * BOTnet and Zero Day attack analysis & monitoring * Detection of cracked binaries Continue reading →

Tracking Down a FTP Hack Attempt

With attacks happening on a daily bases it’s important to ensure that you are collecting data from all systems and applications within your organization. Each of these logs contain valuable data, that when reviewed can help you resolve issues within your environment and help to stop attackers. In this webinar we will show you how finding 1 item in your logs can help you to track down every system where an attacker attempted to gain access to. Continue reading →

Watch and Learn Training Series

Log Search Group and User management Training

In this training series, Group Management, User Management and Log search will be discussed and demonstrated to improve your user experience. This training webinar will help you better understand: Why proper Group Management is essential in EventTracker, How to Create, Edit and Delete groups, How to Add and remove Systems from groups, How to use log search, How to add users to EventTracker and assign proper Privileges & Permissions.
Continue reading →

Incidents and Dashboards Training

In this training series, Incidents & Dashboards will be discussed and demonstrated to improve your user experience. This training webinar will help you better understand: Incidents and Risk Prioritization, Creating and Enabling alerts, Asset Value and Threat Value, How to Flag, Acknowledge and Add notes to incidents, and How to Create, Edit and Delete Dashboards for both Security and Operations.

Continue reading →

Compliance Series: Auditor's Most Requested Reports

Government Compliance

Continue reading →

Commercial Compliance

Continue reading →