ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Multimedia

  • How You Can Make Incident Response Faster and More Efficient

    Sponsored by: Corelight

    Watch this webcast to learn about Zeek—an open-source network security monitor that is formally known as Bro—and see how it can transform network traffic into high-fidelity data streams for faster incident detection.

  • Network Visibility and Using "Bro" with Vincent Stoffer

    Sponsored by: Corelight

    Watch this video to hear Director of Customer Solutions at Corelight, Vincent Stoffer, discuss network visibility and threat hunting as well as pairing the company's hardware appliance with the open-source software, Bro, now known as Zeek—enabling security teams to use Bro at an enterprise scale for accurate network traffic analysis.

  • A Technical Introduction to Bro: Network Security's Best Kept Secret

    Sponsored by: Corelight

    Watch this webinar to learn about open-source network security monitor Bro—now known as Zeek—and how it can help you get deep, actionable traffic insight you can use for network analysis.

  • Siemens on their Secure Cloud Transformation with Zscaler

    Sponsored by: Zscaler

    Watch this brief video to hear insights from Siemens' VP of Global IT Infrastructure, Frederik Janssen about the company's re-architecting of its global hub-and-spoke network to a direct-to-cloud architecture.

  • Strengthen Network Security with DNS

    Sponsored by: Farsight Security

    In this webinar, ThreatSTOP Chief Scientist Dr. Paul Mockapetris, the inventor of DNS, and Farsight Security CEO Dr. Paul Vixie, who designed, implemented and deployed several DNS protocol extensions and applications that are used throughout the Internet today, will discuss how you can use DNS to strengthen your network security.

  • An Introduction to Threat Hunting with Bro Zeek

    Sponsored by: Corelight

    Watch this webcast to hear from Richard Chitamitre, Jonathon Hall, and Andrew Pease—3 elite threat hunters with years of military service fighting on the cyberwarfare frontlines—on how to start using Zeek to hunt down attackers.

  • Universities, Network Security, and Bro: A Roundtable Discussion

    Sponsored by: Corelight

    Watch this webinar to learn about open-source network security monitor, Bro—now known as Zeek—and how companies and universities use it to transform raw network traffic into high-fidelity data streams for analysis and threat detection.

  • "Bro" Open-Source Framework with Alan Saldich

    Sponsored by: Corelight

    In this webcast, listen to Chief Marketing Officer at Corelight, Alan Saldich, talk about the open source software Bro, now known as Zeek. Learn how CoreLight's sensors help enable the large-scale usage of Bro by retrieving and organizing the data you need to track network traffic and performance.

  • The 2019 Security Strategy

    Sponsored by: Cloudflare

    How are you planning to secure your employees, your company, and your customers in 2019? Watch this webinar to hear from Cloudfare CSO Joe Sullivan on the core strategies he uses to help protect Cloudfare, and—as a result—its 12M domains that rely on it for security and performance.

  • PlateSpin Forge: "Plug in and Protect" Disaster Recovery

    Sponsored by: Novell, Inc.

    PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.