Webcasts & Archived Webinars
Industry Trends in Log Management
Dr. Anton Chuvakin leads an all-star panel to provide some useful information on SIEM for enterprises and small organizations. He is joined by A. N. Ananth (Prism Microsystems), Nick Briers (IBM TIVOLI) and Brian Singer (NOVELL). Continue reading
Driving Business ROI with EventTracker
This webinar discusses the security and compliance requirements for Electric Coops, how to improve your data security, and how EventTracker can help you maintain confident compliance. Continue reading
This webinar discusses the PCI-DSS compliance requirements, how to improve your data security, and how EventTracker can help you maintain confident compliance. Continue reading
This webinar will describe how you can substantially tighten your security profile and detect security threats in real time by using simple Behavior-based Correlation. This webcast will introduce the technique and show it in action detecting specific security threats. Continue reading
Traditional firewalls and Intrusion Detection Systems leave your organization unprotected from most zero-day and internal attacks. You need a combination of both event and change management practices to protect your organization. This webinar will discuss how to use a combination of proactive and reactive security strategies to shield your organization from these dangerous threats. Continue reading
Monitoring the Microsoft Windows Event Log is critical because the Operating System and key applications continuously record critical security, system and user events in the Log. However, monitoring the Windows Event Log alone is not enough because many important conditions in Windows are not recorded in the Event Log. Continue reading
In this webinar, we will demonstrate a new way how, by using EventTracker’s USB monitoring capability, you can limit USB access to certain devices on specific machines at the same time actively monitoring USB activity on all systems. Continue reading
In today’s technological environment, threat profiles are evolving constantly and growing in sophistication and the impact of successful attacks is far more severe in terms of lost revenue and negative publicity. Relying on reactive anti-virus and rule-based firewall systems alone are often insufficient to prevent damage. It is critical to quickly and effectively respond while an attack is in progress. Continue reading
These “Best Practices” have been developed from experience gained through hundreds of customer interactions. This webinar will: * discuss the top ten insider activities you have to monitor* demonstrate how to quickly and cost-effectively implement these valuable recommendations. Continue reading
Attend this webinar to learn how implementing change control in your environment can help you pro-actively handle critical security challenges including: * Maintain a trail of unauthorized/authorized changes * BOTnet and Zero Day attack analysis & monitoring * Detection of cracked binaries Continue reading
With attacks happening on a daily bases it’s important to ensure that you are collecting data from all systems and applications within your organization. Each of these logs contain valuable data, that when reviewed can help you resolve issues within your environment and help to stop attackers. In this webinar we will show you how finding 1 item in your logs can help you to track down every system where an attacker attempted to gain access to. Continue reading
Watch and Learn Training Series
In this training series, different reports will be discussed and demonstrated to improve your user experience. This training webinar will help you better understand: basics of EventTracker reports, difference between OnDemand / Queued / Scheduled / Define reports, difference between Summary / Extended Summary / Detailed / Trend reports, how to use log volume report effectively and understand difference between Standard and Flex reports.
In this training series, Group Management, User Management and Log search will be discussed and demonstrated to improve your user experience. This training webinar will help you better understand: Why proper Group Management is essential in EventTracker, How to Create, Edit and Delete groups, How to Add and remove Systems from groups, How to use log search, How to add users to EventTracker and assign proper Privileges & Permissions.
In this training series, Incidents & Dashboards will be discussed and demonstrated to improve your user experience. This training webinar will help you better understand: Incidents and Risk Prioritization, Creating and Enabling alerts, Asset Value and Threat Value, How to Flag, Acknowledge and Add notes to incidents, and How to Create, Edit and Delete Dashboards for both Security and Operations.