Webcasts

Webcasts

Get the latest tips for solving your security challenges from industry experts.

Preparing for a Future with UEBA and SIEM

How do you feel about User and Entity Behavior Analytics (UEBA)? Is it up to par? What about your security information and event management (SIEM) solution? Is it adequately protecting your organization? Watch this on-demand webinar to discover what questions…

Read More

Identifying Abnormal Authentication

Associating Users with Workstations and Detecting Inappropriate Logons How do you determine when a nosy or potentially malicious insider tries to log on to another user’s workstation with their own account? What’s the best way to find a malicious user…

Read More

An Inside Look: User Behavior Analysis

User and entity behavior analytics (UEBA) and security information and event management (SIEM) are separate security solutions that can work together to detect shifts in behavior that indicate a compromise is occurring. UEBA is enhanced by leveraging the data collected…

Read More

Getting Started with Threat Hunting Basics

Efficient threat hunting can help you better allocate your security resources so your team can focus on the threats that matter. In this on-demand webcast, Andrew Costis, LogRhythm threat research engineer, joins the Security Weekly team to explain how security…

Read More

SANS Reviews LogRhythm CloudAI for UEBA

When threats occur, understaffed security operations centers (SOCs) lack sufficient access to contextual information. This lack of visibility is a key problem that LogRhythm CloudAI for User and Entity Behavior Analytics (UEBA) are designed to solve. In this on-demand webcast,…

Read More

Smarter, Faster Security Through LogRhythm and Cisco Integration

LogRhythm integrates with over three dozen Cisco products, providing centralized visibility and advanced security analytics across the Cisco-enabled environment, and making security events actionable in your network. In this webinar, LogRhythm and Cisco security experts team up to examine how…

Read More

Expanding Threat Lifecycle Management with LogRhythm & Palo Alto

Today’s organizations must face increasingly frequent and complex cyberthreats. Protecting your organization now requires effective threat lifecycle management to address threats across your IT environment. The LogRhythm TLM framework enables you to guard, monitor, and search for threats across your…

Read More