1. ThreatScape Enterprise

    03:43

    from iSIGHT Partners / Added

    Stephen Ellis and Matt Hartley discuss what ThreatScape Enterprise covers and how customers use iSIGHT's enterprise intelligence to improve their security programs and proactively reduce risk to their…

    + More details
    • ThreatScape Hacktivism

      04:11

      from iSIGHT Partners / Added

      Joseph Gallop and Matt Hartley discuss what ThreatScape Hacktivism covers and how customers use iSIGHT's hacktivism intelligence to improve their security programs and proactively reduce risk to their…

      + More details
      • ThreatScape Vulnerability and Exploitation

        04:15

        from iSIGHT Partners / Added

        Jared Semrau and Matt Hartley discuss what ThreatScape Vulnerability and Exploitation covers and how customers use iSIGHT's vulnerability and exploitation intelligence to improve their security programs…

        + More details
        • ThreatSpace CyberEspionage

          04:20

          from iSIGHT Partners / Added

          John Hultquist and Matt Hartley discuss what ThreatScape Cyber Espionage covers and how customers use iSIGHT's cyber espionage intelligence to improve their security programs and proactively reduce…

          + More details
          • Hardening Retail Security Why and How to Prevent Breaches and Attacks

            01:00:29

            from LogRhythm / Added

            4 Plays / / 0 Comments

            So it's not a matter of if your organization will be attacked or breached, but when. This webcast, led by SANS Institute senior analyst John Pescatore and Erick Ingleby, Product Manager LogRhythm,…

            + More details
            • LogRhythm's Commentary of Gartner Magic Quadrant for SIEM 2014

              02:56

              from LogRhythm / Added

              17 Plays / / 0 Comments

              Gartner's 2014 Magic Quadrant report once again placed LogRhythm as an industry leader in Security Information and Event Management (SIEM). This is the third consecutive year that LogRhythm has earned…

              + More details
              • LogRhythm Security Analytics Suites: Retail Cyber Crime Module

                02:33

                from LogRhythm / Added

                4 Plays / / 0 Comments

                Dave Pack, Director of LogRhythm Labs, discusses the Retail Cyber Crime Module Security Analytics Suite. Over the past few years, several retail organizations have been hit with high-profile data…

                + More details
                • Choosing a SIEM: 3 Things You Need To Know

                  03:05

                  from LogRhythm / Added

                  2 Plays / / 0 Comments

                  When choosing a security intelligence platform, there are three things to consider: a combination of buying the most innovative product, receiving a valuable partnership, and being able to access…

                  + More details
                  • LogRhythm Labs Team

                    02:34

                    from LogRhythm / Added

                    1 Play / / 0 Comments

                    The features in LogRhythm's product are developed and finalized by the LogRhythm Labs team. Teams have specific tasks which combine to form one synthesized and powerful foundation. Learn more about…

                    + More details
                    • LogRhythm's Security Analytics Suites: Honeypot Module

                      01:13

                      from LogRhythm / Added

                      4 Plays / / 0 Comments

                      LogRhythm’s Honeypot Security Analytics Suite generates threat intelligence specific to the targeted environment, allowing organizations to identify their adversaries, recognize their attack patterns,…

                      + More details

                      What are Tags?

                      Tags

                      Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."