QSC18 - Qualys Data + Splunk Security Analytics = Finding Hidden Threats
Searching through endpoint data for answers to pressing security problems has always been a challenge. Whether it’s finding the one critical server that is exhibiting strange behavior related to a recently uncovered threat, or seeing patterns across a large number of endpoints that indicate the presence of a botnet command and control mechanism, the answers are in the endpoint data. The integration of Qualys with Splunk offers security teams fast and effective analytic views into their data, elevating concerning patterns and security events into clearly understandable security dashboards. This presentation with show Splunk security dashboards based on data from Qualys Vulnerability Management, Policy Compliance, and Web Application Scanning. Learn how the wealth of security analysis and events generated by the combination of Qualys apps feeding Splunk’s Security Information and Event Management (SIEM) platform can find the threats hiding in your environment.
Don Leatham, Global Strategic Alliances - Security Markets, Splunk
Видео QSC18 - Qualys Data + Splunk Security Analytics = Finding Hidden Threats канала Qualys Continuous Security
Don Leatham, Global Strategic Alliances - Security Markets, Splunk
Видео QSC18 - Qualys Data + Splunk Security Analytics = Finding Hidden Threats канала Qualys Continuous Security
Показать
Комментарии отсутствуют
Информация о видео
11 января 2019 г. 2:09:02
00:33:16
Другие видео канала
![Best Practices for Web Application Scanning on Full Production Sites | Starwood Hotels](https://i.ytimg.com/vi/XJyDDxDNCaU/default.jpg)
![Splunk for Security](https://i.ytimg.com/vi/1mvUiIakQn4/default.jpg)
![ServiceNow Vulnerability Response with Qualys Use Case Analysis](https://i.ytimg.com/vi/rC5FDuMTo2M/default.jpg)
![Symantec Advanced Threat Protection – Identify, prioritize & remediate today’s threats](https://i.ytimg.com/vi/5CTIwuVKIfM/default.jpg)
![REST API concepts and examples](https://i.ytimg.com/vi/7YcW25PHnAA/default.jpg)
![Quickly verifying a port scan alert from a SIEM using deep packet inspection (DPI)](https://i.ytimg.com/vi/bJHahl0h19A/default.jpg)
![15 Minutes to Configure a Splunk Dashboard for Fortigate Firewalls](https://i.ytimg.com/vi/ToAuSf_DXL4/default.jpg)
![From SIEM to SOC: Crossing the Cybersecurity Chasm](https://i.ytimg.com/vi/MPVIIHYr-fk/default.jpg)
![Splunk Tutorial: "Creating Dashboards in Splunk Enterprise 6"](https://i.ytimg.com/vi/q1F4J8viBrM/default.jpg)
!["Why Splunk?"](https://i.ytimg.com/vi/f4b-IKgPXxA/default.jpg)
![Building a Data-Driven Business - Snehal Antani, CTO, Splunk Inc. (Full Presentation)](https://i.ytimg.com/vi/KVepNr2Q43o/default.jpg)
![Qualys Company Overview](https://i.ytimg.com/vi/wEbFZ8GgSZk/default.jpg)
![Splunk Education: Creating and Using Event Types](https://i.ytimg.com/vi/KhdMgT9VbHs/default.jpg)
![Splunk Tutorials : SQL Injection Detection](https://i.ytimg.com/vi/PCZDBgEAFgo/default.jpg)
![Webinar: Splunk Enterprise Security (Splunk ES)](https://i.ytimg.com/vi/KoIY-_2ItSc/default.jpg)
![Qualys VM #5 (Scanning)](https://i.ytimg.com/vi/1HwDr28IV9I/default.jpg)
![Splunk: Answering business questions through IT data](https://i.ytimg.com/vi/1LHQVE9tqmI/default.jpg)
![advanced splunk searching for security hunting and alerting](https://i.ytimg.com/vi/gOSFTrQhCAI/default.jpg)
![Create Dashboards in Splunk Enterprise](https://i.ytimg.com/vi/rnm1p5zZPXc/default.jpg)
![Qualys, Twistlock, & Tenable - Enterprise Security Weekly #94](https://i.ytimg.com/vi/zK7LsMkTUXg/default.jpg)