Webcasts

Webcasts

Get the latest tips for solving your security challenges from industry experts

Finding Bad Things on Your Network Using Free Tools

Want to get started on a hunt team and discover the bad things on your network? This episode is for the threat hunter on a budget. Rob McGovern, LogRhythm security expert, and John Strand, of Security Weekly and SANS, showcase…

Read More

Prevent Major Data Breaches with Threat Lifecycle Management

Reduce Time to Detect and Respond to Cyber Threats—Without Adding Resources Download Slide Deck Today’s reality is that organizations will continue to be confronted by increasingly frequent and complex cyber threats A traditional prevention-centric strategy naively assumes all threats can…

Read More

4 Easy Ways to Turn Endpoint Data into Actionable Insight

LogRhythm and Carbon Black for Endpoint Protection Download Slide Deck Data-driven security is the future, but alarm fatigue and data overload continue to hold security operations teams back. Fortunately, there are some easy ways to organize and correlate data so…

Read More

Packets Don’t Lie: What’s Really Happening on Your Network?

SANS Reviews LogRhythm NetMon Freemium Download Slide Deck When it comes to detection and response, you need full visibility into what’s traversing your network. In this on-demand webcast, Dave Shackleford, senior SANS analyst, provides a functional review of LogRhythm’s NetMon…

Read More

SANS Security Analytics Survey Results

What’s Working? What’s Not? Improvements in detection and response are coming slowly as organizations work to adopt, automate and utilize security analytics and intelligence, according to the 2015 Analytics and Intelligence Survey. In last year’s survey, respondents said they’d seen…

Read More

Speed and Scalability Matter

SANS Review of LogRhythm 7 SIEM and Analytics Platform Enterprise-level security is no easy task. To detect, respond, and remediate advanced threats (and the vulnerabilities that cause them) security teams must get the most out of each security tool they…

Read More