Interactive Demo
Resource Center

Upcoming Webcasts

Upcoming Live Product Demos: Get Security Visibility in Under 1 Hour with AlienVault

Thu, April 24, 2014 at 8:00 am PST

Join AlienVault SIEM deployment expert for a live product demo! You'll learn how to get complete network security visibility in under an hour.

Register Now

Upcoming Live Product Demos: Get Security Visibility in Under 1 Hour with AlienVault

Thu, May 1, 2014 at 8:00 am PST

Join AlienVault SIEM deployment expert for a live product demo! You'll learn how to get complete network security visibility in under an hour.

Register Now

Upcoming Live Product Demos: Get Security Visibility in Under 1 Hour with AlienVault

Thu, May 8, 2014 at 8:00 am PST

Join AlienVault SIEM deployment expert for a live product demo! You'll learn how to get complete network security visibility in under an hour.

Register Now

Upcoming Live Product Demos: Get Security Visibility in Under 1 Hour with AlienVault

Thu, May 15, 2014 at 8:00 am PST

Join AlienVault SIEM deployment expert for a live product demo! You'll learn how to get complete network security visibility in under an hour.

Register Now

Upcoming Live Product Demos: Get Security Visibility in Under 1 Hour with AlienVault

Thu, May 22, 2014 at 8:00 am PST

Join AlienVault SIEM deployment expert for a live product demo! You'll learn how to get complete network security visibility in under an hour.

Register Now

Upcoming Live Product Demos: Get Security Visibility in Under 1 Hour with AlienVault

Thu, May 29, 2014 at 8:00 am PST

Join AlienVault SIEM deployment expert for a live product demo! You'll learn how to get complete network security visibility in under an hour.

Register Now

Upcoming Live Product Demos: Get Security Visibility in Under 1 Hour with AlienVault

Thu, June 5, 2014 at 8:00 am PST

Join AlienVault SIEM deployment expert for a live product demo! You'll learn how to get complete network security visibility in under an hour.

Register Now

Upcoming Live Product Demos: Get Security Visibility in Under 1 Hour with AlienVault

Thu, June 12, 2014 at 8:00 am PST

Join AlienVault SIEM deployment expert for a live product demo! You'll learn how to get complete network security visibility in under an hour.

Register Now

Upcoming Live Product Demos: Get Security Visibility in Under 1 Hour with AlienVault

Thu, June 19, 2014 at 8:00 am PST

Join AlienVault SIEM deployment expert for a live product demo! You'll learn how to get complete network security visibility in under an hour.

Register Now

Upcoming Live Product Demos: Get Security Visibility in Under 1 Hour with AlienVault

Thu, June 26, 2014 at 8:00 am PST

Join AlienVault SIEM deployment expert for a live product demo! You'll learn how to get complete network security visibility in under an hour.

Register Now

On-Demand Webcasts

On-demand Product Demo: Get Complete Security Visibility with AlienVault USM

Host: Justin Endres, VP of Sales, AlienVault & Tom D'Aquino, Solutions Architect, AlienVault

AlienVault Unified Security Management™ (USM) integrates SIEM/event correlation with built-in tools for intrusion detection, asset discovery, vulnerability assessment and behavioral monitoring to give you a unified, real-time view of threats in your environment. Watch our recorded demo to see how USM makes it easy to get the insights you need, starting on Day 1.

View Recording

How to Detect the Heartbleed Vulnerability using AlienVault USM™

Host: Tom D'Aquino, Sr. Systems Engineer

Heartbleed is not an exploit you want to ignore as an IT professional. It exposes passwords and cryptographic keys, and requires not only that you patch OpenSSL for each of the services using the OpenSSL library, but also that you replace the private keys and certificates so that attackers won’t be able to use any of the data compromised by the vulnerability. The simplicity of the exploit makes it powerful. It appears that over a half million websites are vulnerable.

View Recording

Cover your Assets: How to Limit the Risk of Attack on your XP Assets

Host: Tom D'Aquino, Systems Engineer

As most IT Pros are aware, Microsoft is no longer releasing security patches for Windows XP. How will you limit the security risks posed by these now vulnerable assets? Join us for this webinar outlining practical strategies to help you cover your assets.

View Recording

OSSIM User Training: Get Improved Security Visibility with OSSIM v4.6

Host: Jim Hansen, Senior Director of Product Management

Join us for for a free training session to review what's new in OSSIM v4.6 along with a demo of key use cases to help you get the most out of your OSSIM environment. We'll also give an overview of how you can improve threat detection and simplify incident response with the AlienVault Labs Threat Intelligence feed included in AlienVault Unified Security Management™ USM.

View Recording

How to Simplify PCI DSS Compliance with Unified Security Management

Host: Jim Hansen, Senior Director of Product Management

Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks – chasing down discrepancies in asset inventory spreadsheets, removing false positives from vulnerability assessment reports, and weeding through log data trying to make sense of it all. In fact, you may need to consult at least a dozen different tools for those dozen requirements. Join us for this webinar to learn how to simplify PCI DSS compliance.

View Recording

OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5

Host: Jim Hansen, Russ Spitler & Justin Endres

OSSIM v4.5 is here! With a focus on ease of use, better error control, and suggestions to make your security visibility more complete, OSSIM v4.5 works hard to save you time. Join us for this FREE user training session to learn more about what's new in OSSIM v4.5.

View Recording

Battling savvy cyber thieves

Host: Roger Thornton

The methods cyber attackers use to infiltrate networks are endless. There is no doubt that the more sophisticated bad guys looking to steal specific data have enlisted surreptitious ways to achieve their ends. From targeting specific employees with convincing phishing emails that encourage them to download malware-riddled attachments to taking advantage of vulnerable web apps, these miscreants find myriad ways to gain entry to networks so that they can siphon off sensitive data – most often unnoticed for days, weeks or even months.

View Recording

How to leverage log data for effective threat detection

Host: Tom D'Aquino, Systems Engineer

Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements

View Recording

SIEM-plifying security monitoring: A different approach to security visibility

Host: Joe Schreiber

Despite investments in preventative security technology and teams, devastating data breaches continue to occur, and the threats we face only grow more advanced all the time. If even the largest companies are struggling to avoid breaches, how can teams with more limited security staff and budgets hope to avoid that same fate? Organizations need to invest more in detection and proactive threat intelligence. SIEM products have been widely deployed for this purpose, however much of the technology remains unwieldy and difficult to use.

View Recording

How to stop malware in its tracks with AlienVault Threat Alerts (now part of Spiceworks!)

Host: Tom D'Aquino, Systems Engineer

If you've upgraded to the latest version of Spiceworks, you've probably noticed the new Threat Alerts, powered by AlienVault. AlienVault Threat Alerts notify you in real-time if devices in your network have been communicating with known malicious hosts, usually a sign of malware infection. So far, over 95% of Spiceworks 7.1 installations have triggered an alert - wow! The new AlienVault Threat Alerts also give you detailed guidance for neutralizing the threat so you can take action quickly. Join us for this webinar to learn more about how to use AlienVault Threat Alerts to detect, research and mitigate potential threats. We'll also show you how you can detect other common attacks like brute force attacks, SQL Injection attacks, XSS attacks and more using AlienVault Unified Security Management (USM).

View Recording

How to Detect SQL Injection & XSS Attacks using SIEM Event Correlation

Host: Tom D'Aquino, Systems Engineer

Two of the oldest and most common attacks used against web applications, SQL injection attacks and cross-site scripting attacks (XSS), continue to impact thousands of websites and millions of users each year. Finding these exposures quickly is essential in order to prevent system compromise and avoid information leakage. SIEM solutions can be invaluable in this effort by collecting and correlating the data you need to identify patterns that signal an attack.

View Recording

Detect Brute Force Attacks & APTs in Less That 1 Hour with AlienVault

Host: Anthony Mack, Systems Engineer & Payman Faed, Account Executive

In this session, our SIEM deployment expert will show you how to quickly and easily: Detect brute force attacks with correlation of both Windows & Linux logs, Detect APTs and zero-day attacks, Expose network scans or worm behavior with firewall log correlation, Identify and prioritize vulnerabilities on affected assets, Customize alerts and reports for PCI, HIPAA and ISO.

View Recording

Threat Detection and Incident Response: What’s New for 2014

Host: Jaime Blasco, Director of AlienVault Labs & Mike Rothman, Security Analyst and President of Securosis

As any security practitioner can tell you, things change quickly in the world of IT security, particularly with respect to new and evolving threats. As a result, organizations need to continuously adapt their security strategies to defend against new threats and take advantage of the latest capabilities for responding quickly when there is a breach. In this session, Mike Rothman, President of Security Analyst firm Securosis, and Jaime Blasco, Director of AlienVault Labs, will give an overview of key changes in the information security world in 2013 and considerations for adapting your 2014 strategy to stay ahead of threats.

View Recording

Threat Intelligence: The Key to a Complete Vulnerability Management Strategy

Host: Sandy Hawke, VP of Product Marketing & Tom D'Aquino, Security Engineer

While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join AlienVault for this session to learn: strategies for addressing common vulnerability management challenges, the pros and cons of different vulnerability scanning techniques and how to integrate threat intelligence into your vulnerability management strategy.

View Recording

Safety in Numbers: The Value of Crowd-Sourced Threat Intelligence

Host: Dave Shackleford, Analyst, SANS and Jaime Blasco, Director of AlienVault Labs

In recent years, the threat intelligence landscape has been evolving rapidly. As the number of third-party threat intelligence services has grown, security practitioners are trying to understand what types of threat intelligence tools and services are providing the most actionable data, and at what cost? In addition, a new breed of threat intelligence service has emerged that leverages "crowd-sourcing", where we all learn from each other and mutually benefit.

View Recording

PCI DSS v3.0: How to Adapt Your Compliance Strategy

Host: Sandy Hawke, VP of Product Marketing, AlienVault
Featured Guest: Carlos Villalba, Director of Security Services, Terra Verde Services, & Patrick Bass, Director of Security Solutions, Terra Verde Services

With version 3.0 of PCI DSS now available, it’s time to review your compliance strategy and make a plan for adapting to the revised requirements. While the 12 main requirements remain the same, there are significant changes related to malware defenses, vulnerability assessments and penetration testing. During this 1-hour session, you’ll learn: What’s new in PCI DSS version 3.0, key considerations for adapting your compliance strategy, technology recommendations for addressing new compliance requirements, and how other companies have simplified PCI DSS compliance.

View Recording

Using Crowd-Sourced Threat Intelligence to Stay Ahead of Exploits

Host: Jaime Blasco, Director of Research, AlienVault Labs

As part of developing a vulnerability management strategy, it’s important to think through the “what if” scenarios that you need to defend against. However, if you’re only considering your own knowledge of potential threats, your plan will likely be incomplete. Join Jaime Blasco, Director of AlienVault labs for a discussion on how to use collaborative threat intelligence to strengthen your vulnerability management strategy.

View Recording

Whose Logs, What Logs, Why Logs - Your Quickest Path to Security Visibility

Host: Tom D'Aquino, Sr. SIEM Engineer

Securing your environment requires an understanding of the current and evolving threat landscape as well as knowledge of network technology and system design. This session will include a technical presentation, demo and interactive Q/A that will highlight how to build out a security plan to defend against today’s threats.

View Recording

Advanced OSSEC Training: Integration Strategies for Open Source Security

Host: Santiago Gonzalez, Director of Professional Services

During this technical one-hour session, Santiago Gonzalez, an OSSEC core team member (System integration, rules & SIEM) and AlienVault Director of Professional Services, will demonstrate how to integrate OSSEC with other 3rd party applications for greater security visibility and response.

View Recording

PCI DSS Simplified: What You Need to Know

Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks – chasing down discrepancies in asset inventory spreadsheets, removing false positives from network vulnerability assessment reports, and weeding through log data trying to make sense of it all. In fact, you may need to consult at least a dozen different tools for those dozen requirements.

View Recording

SANS Institute Ask The Expert Webcast: Preparing for Effective Threat Detection and Response

Host: Dave Shackleford, Analyst, SANS and Russell Spitler, VP Product Management

There are many things that can happen in the daily life of an intrusion analyst. Monitoring events and looking for indicators of compromise can be a taxing job, but there are also many opportunities to detect and possibly prevent data breach scenarios from happening. What are the phases of intrusion detection and incident response processes in today's organizations?

View Recording

The Lazy Attacker: Defending Against Broad-based Cyber Attacks with Unified & Collaborative Defenses

Advanced Persistent Attacks (APTs) get most of the attention from the cyber security community because, as defenders, we want to be vigilant against the most insidious techniques. However, this unilateral mindset ignores a much less interesting reality.

View Recording

SANS Institute: Best Practices for Leveraging Security Threat Intelligence

The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.

View Recording

Preparing for a Security Breach

How to keep your head (and your job) when the worse case scenario happens. Due to the increasing frequency of security breaches, defining an action plan is critical for every security practitioner. Getting breached doesn’t determine whether or not you’ve got a good security program in place – but how you respond to one does.

View Recording

Expect More From Your SIEM

Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we’ll cover a few common problems with SIEM technologies, and how you can avoid those pitfalls with AlienVault Unified Security Management. You’ll walk away with a new perspective on an old problem – reducing the cost of security visibility.

View Recording

Six Steps to SIEM Success

Host: Jim Hansen

Learn the 6 practical steps every IT admin should take to ensure SIEM success in your environment. The promise of SIEM is clearly an essential one–better security visibility. Aggregate, correlate, and analyze all of the security-relevant information in your environment so that you can:

View Recording

Using IP Reputation Data to Stay Ahead of the Threat

Cyber attacks are constantly increasing in both frequency and sophistication. In this atmosphere, accurate and timely threat intelligence is essential. In this webinar, we will share details on a recent real-world test IANS conducted comparing threat intelligence approaches.

View Recording

Securing the ‘Wild Wild West’: Unified Security Management for Colleges and Universities

Securing the IT environment in today’s college or university is no task for the faint of heart. With a user population of digital natives, a school’s IT services are often a high-risk zone where state-of-the art learning and research meets the global threat laboratory. Reducing risk and maintaining compliance requires centralized security visibility and the tools to identify and remove threats quickly and efficiently.

View Recording

Practitioners Guide to a SOC

A nuts-and-bolts discussion of SOC essentials with a review the evolution of SOCs and explain exactly what you’ll need for 20/20 visibility into: What assets are in your environment, and which need priority protection. Which assets have known vulnerabilities. Which assets are under attack, by what type of exploit. Whether a breach has already occurred. How to prioritize your response activities.

View Recording