Back to Virtual Event
Latest Sponsored Events
Related Videos
Video
Nov 08, 2023
Ein ganzheitlicher Ansatz: Identity Security und XDR

Matthias Canisius von SentinelOne und Martin Kuppinger erkunden die Verschmelzung von XDR (Extended Detection and Response) und Identity Security. Erfahren Sie, warum diese Verbindung die Zukunft der Cybersecurity gestaltet und wie sie Angriffe in ihren frühesten Stadien vereiteln kann.

Webinar Recording
Jan 25, 2023
Debunking Common Myths about XDR

Join security experts from KuppingerCole Analysts and SentinelOne to help you get an understanding of what eXtended Detection & Response (XDR) really is, and why you should consider this emerging technology in your enterprise security stack.

John Tolbert, Director Cybersecurity Research at KuppingerCole and Marko Kirschner, Director of Sales Engineering Central Europe at SentinelOne will define XDR, including which technical components are necessary for distinguishing XDR from Endpoint Detection & Response (EDR), and how XDR differs from Security Orchestration Automation & Response (SOAR).

They will also discuss why XDR is an important useful amalgamation and evolution of security tool sets, the use cases it solves, and where it should fit on organizational security technology roadmaps.

Webinar Recording
Sep 29, 2021
Disaster Planning Made Simple

In the digital era, as businesses become increasingly reliant on IT, a potentially devastating cyber-attack or other type of disruptive cyber incident is inevitable. Being prepared is the single most effective action that those responsible for information security can take.

Event Recording
Mar 26, 2021
Thom Langford: CISOs, Complexity, Containment (and other C-words)

The traditional paradigm of investing in protection of known threats alone has been declining over recent years, as attackers become more adaptable and capable. Combine this with increased threats and attacker ingenuity it is small wonder that a CISO’s role has become more complex. This leads to the inevitability of a security incident where the complex environments and inventive attacks collide.

This presentation looks at three fundamentals: 

  • Why traditional protective approaches are no longer effective enough.

  • How complexity has made the CISO’s ability to respond more difficult.

  • The importance of automation in the response process to address this paradigm shift CISOs now face

Webinar Recording
Jan 15, 2021
Effective Endpoint Security With Automatic Detection and Response Solutions

The realization that cyber-attacks are inevitable has led the cybersecurity industry to shift some of its focus to detection and response rather than prevention in recent years. Therefore, the market for solutions designed to detect attacks on endpoints and respond accordingly has grown significantly. These Endpoint Detection & Response (EDR) solutions look for evidence and effects of malware that may have slipped past Endpoint Protection (EPP) products. EDR tools also perform evaluation of threat intelligence, event correlation, and often allow interactive querying, live memory analysis, and activity recording and playback.

Event Recording
Nov 13, 2020
Jan Tietze: Minimising Risk from Cyber Threats: Focus on Reducing Time to Containment
Webinar Recording
May 27, 2020
Protect, Detect, Respond, Mitigate: A Modern Security Paradigm for Modern Enterprises

The traditional approach forces enterprises to deploy multiple additional security solutions – EPP, EDR or NDR among them – to try and close remaining gaps, leading to even higher strain on security analysts. Facing response times of hours if not days, companies turn to managed services that rely on the scale of the cloud to reduce the load but introduce additional operational and compliance challenges.

What if there were a modern alternative to hoarding security tools, relying instead on a single unified platform with a single endpoint agent to perform all those functions, not just reducing the overall complexity but closing the remaining gaps for malware to slip through? What if such a platform were able to work without the need to reach out to the cloud, decreasing the time to detect and mitigate a threat to seconds instead of hours?