Interactive Demo
Resource Center

Upcoming Webcasts

Upcoming Live Product Demos: Get Security Visibility in Under 1 Hour with AlienVault

Thu, September 4, 2014 at 8:00 am PST

Join AlienVault SIEM deployment expert for a live product demo! You'll learn how to get complete network security visibility in under an hour.

Register Now

How Attackers Move Stealthily Around Networks - And How To Detect Them

Thu, September 4, 2014 at 8:00 AM PDT
Host: Tom D'Aquino, SVP Worldwide, Sales Engineering

Have you ever wondered how the bad guys actually get control of a system? Or, what they do next to move about the network undetected? Then you won't want to miss this live demo, where AlienVault security guru Tom D'Aquino will show you how attackers take over a system, then use that compromised device to "land and expand", gathering user credentials and valuable data as they move further into your network. Using a real-world example of malware planted via a watering hole attack, Tom will show you how AlienVault USM detects these nefarious activities every step of the way.

Register Now

Upcoming Live Product Demos: Get Security Visibility in Under 1 Hour with AlienVault

Thu, September 11, 2014 at 8:00 am PST

Join AlienVault SIEM deployment expert for a live product demo! You'll learn how to get complete network security visibility in under an hour.

Register Now

Vulnerability Management: What you Need to Know to Prioritize Risk

Tue, September 16, 2014 at 8:00 AM PDT
Host: Patrick Bedwell, VP of Product Marketing, AlienVault
Featured Guest: Tom D'Aquino, VP of WW Sales Engineering

While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security.

Register Now

Upcoming Live Product Demos: Get Security Visibility in Under 1 Hour with AlienVault

Thu, September 18, 2014 at 8:00 am PST

Join AlienVault SIEM deployment expert for a live product demo! You'll learn how to get complete network security visibility in under an hour.

Register Now

Upcoming Live Product Demos: Get Security Visibility in Under 1 Hour with AlienVault

Thu, September 25, 2014 at 8:00 am PST

Join AlienVault SIEM deployment expert for a live product demo! You'll learn how to get complete network security visibility in under an hour.

Register Now

Upcoming Live Product Demos: Get Security Visibility in Under 1 Hour with AlienVault

Thu, October 2, 2014 at 8:00 am PST

Join AlienVault SIEM deployment expert for a live product demo! You'll learn how to get complete network security visibility in under an hour.

Register Now

On-Demand Webcasts

Get Complete Security Visibility with AlienVault USM

Host: Justin Endres, VP of Sales, AlienVault & Tom D'Aquino, Solutions Architect, AlienVault

AlienVault Unified Security Management™ (USM) integrates SIEM/event correlation with built-in tools for intrusion detection, asset discovery, vulnerability assessment and behavioral monitoring to give you a unified, real-time view of threats in your environment. Watch our recorded demo to see how USM makes it easy to get the insights you need, starting on Day 1.

View Recording

Detect Ransomware Before it’s Too Late with AlienVault USM

Host: Tom D'Aquino, SVP Worldwide, Sales Engineering

By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once CryptoWall executes and connects to an external command and control server, it starts to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage. Don’t fall victim to ransomware!

View Recording

Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done

Host: Victor Obando, Sales Engineer

Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.

View Recording

SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Operations

Host: Joe Schreiber, Solutions Architect, AlienVault
Featured Guest: Dave Shackleford, Analyst, SANS

As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations.

View Recording

How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks

Host: Tom D'Aquino, Director, Sales Engineering
Featured Guest: Russel Spitler, VP, Product Strategy

Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those within a particular industry. The AlienVault Open Threat Exchange is different. It is one of the first (and most diverse) threat sharing networks, open to any and all who wish to join. And, free services like new ThreatFinder help make the threat data in OTX available and actionable by all. Join AlienVault VP of Product Strategy, Russ Spitler, and Systems Engineer, Tom D'Aquino for a practical session covering how to use OTX to improve network security.

View Recording

How to Detect a Cryptolocker Infection with AlienVault USM

Host: Tom D'Aquino, Director, Sales Engineering

As an IT security pro, unless you've been hiding under a rock, you've heard about ransomware threats like Cryptolocker. These threats are typically delivered via an e-mail with a malicious attachment, or by directing a user to a malicious website. Once the Cryptolocker file executes and connects to the command and control server, it begins to encrypt files and demands payment to unlock them. As a result, detecting infection quickly is key to limiting the damage.

View Recording

How to Simplify Audit Compliance with Unified Security Management

Host: Patrick Bedwell, VP of Product Marketing, AlienVault

Maintaining, verifying, and demonstrating compliance with regulatory requirements, whether PCI DSS, HIPAA, GLBA or others, is far from a trivial exercise. Proving compliance with these requirements often translates into a lot of manual and labor-intensive tasks – chasing down discrepancies in asset inventory spreadsheets, remediating critical vulnerabilities, and weeding through log data trying to make sense of it all. In fact, you may need to consult at least a dozen different tools to assemble the security controls and reports you need. Compliance doesn't have to be so hard.

View Recording

PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting

Host: Patrick Bedwell, VP of Product Marketing, AlienVault
Featured Guest: Brian Saenz, Terra Verde Services & Hoyt Kensterson, Terra Verde Services

If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting.

View Recording

Higher Education: Open and Secure? A SANS Survey

Host: Patrick Bedwell, VP of Product Marketing, AlienVault

Higher education has always balanced the need for open accessibility with the need to secure employee and student private data and internal data and networks. These institutions have been forerunners in enabling use of personally owned devices, given the open nature of campuses and the many such devices used by students, faculty and others.

View Recording

Practical Threat Management & Incident Response for the SME

Host: Patrick Bedwell, VP of Product Marketing, AlienVault
Featured Guest: Jake Williams, Chief Scientist, CSRgroup computer security consultants and certified Sans Instructor.

Due to small budgets, few or no dedicated security staff and overly complex security solutions, SMEs continue to face challenges in their efforts to proactively protect their networks, data and systems. This SANS webcast investigates the barriers these organizations face in protecting their digital assets and what attackers hope to gain through a compromise. It also uses a case study of a breach initiated by the compromise of a forgotten asset to examine what SMEs can do to protect themselves using a comprehensive solution in a cost-effective, uncomplicated manner.

View Recording

Security Operations Center (SOC) Essentials for the SME

Host: Patrick Bedwell, VP of Product Marketing, AlienVault
Featured Guest: Javvad Malik, Senior Analyst, Enterprise Security, 451 Research

Closing the gaps in security controls, systems, people and processes is not an easy feat, particularly for IT practitioners in smaller organizations with limited budgets and few (if any) dedicated security staff. So, what are the essential security capabilities needed to establish a security operations center and start closing those gaps?

View Recording

SANS Institute: Best Practices for Leveraging Security Threat Intelligence

The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.

View Recording

How to Detect System Compromise & Data Exfiltration

Host: Justin Endres, SVP WW Sales & Tom D'Aquino Director, WW Sales Engineering

Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Then you won't want to miss our next live demo, where AlienVault security guru Tom D'Aquino will walk you through the steps of a system compromise, including how AlienVault USM detects these nefarious activities every step of the way.

View Recording

Reduce the Attacker’s ROI with Collaborative Threat Intelligence

Host: Jaime Blasco, Director of AlienVault Labs
Featured Guest: Wendy Nather of 451 Research

The cost to attack and compromise a system is orders of magnitude less than the cost to defend. A single machine can target thousands of targets searching for one with susceptible defenses while each new attack vector requires defenders to deploy and maintain additional security controls. So, how can we increase the cost for the attacker? One way is through collaborative threat intelligence.

View Recording

The One-Man SOC: Habits of Highly Effective Security Practitioners

Host: Joe Schreiber

Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

View Recording

How to Investigate Threat Alerts in Spiceworks

Host: Tom D'Aquino, Sr. Systems Engineer & Bill Smartt Security Reasearcher

If you've upgraded to the latest version of Spiceworks, you've probably noticed the new Threat Alerts, powered by AlienVault. AlienVault Threat Alerts notify you if devices in your network have been communicating with known malicious hosts. This is usually a sign of malware infection, but not always.

View Recording

How to Detect the Heartbleed Vulnerability using AlienVault USM™

Host: Tom D'Aquino, Sr. Systems Engineer

Heartbleed is not an exploit you want to ignore as an IT professional. It exposes passwords and cryptographic keys, and requires not only that you patch OpenSSL for each of the services using the OpenSSL library, but also that you replace the private keys and certificates so that attackers won’t be able to use any of the data compromised by the vulnerability. The simplicity of the exploit makes it powerful. It appears that over a half million websites are vulnerable.

View Recording

Cover your Assets: How to Limit the Risk of Attack on your XP Assets

Host: Tom D'Aquino, Systems Engineer

As most IT Pros are aware, Microsoft is no longer releasing security patches for Windows XP. How will you limit the security risks posed by these now vulnerable assets? Join us for this webinar outlining practical strategies to help you cover your assets.

View Recording

OSSIM User Training: Get Improved Security Visibility with OSSIM v4.6

Host: Jim Hansen, Senior Director of Product Management

Join us for for a free training session to review what's new in OSSIM v4.6 along with a demo of key use cases to help you get the most out of your OSSIM environment. We'll also give an overview of how you can improve threat detection and simplify incident response with the AlienVault Labs Threat Intelligence feed included in AlienVault Unified Security Management™ USM.

View Recording

How to Simplify PCI DSS Compliance with Unified Security Management

Host: Jim Hansen, Senior Director of Product Management

Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks – chasing down discrepancies in asset inventory spreadsheets, removing false positives from vulnerability assessment reports, and weeding through log data trying to make sense of it all. In fact, you may need to consult at least a dozen different tools for those dozen requirements. Join us for this webinar to learn how to simplify PCI DSS compliance.

View Recording

OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5

Host: Jim Hansen, Russ Spitler & Justin Endres

OSSIM v4.5 is here! With a focus on ease of use, better error control, and suggestions to make your security visibility more complete, OSSIM v4.5 works hard to save you time. Join us for this FREE user training session to learn more about what's new in OSSIM v4.5.

View Recording

Battling savvy cyber thieves

Host: Roger Thornton

The methods cyber attackers use to infiltrate networks are endless. There is no doubt that the more sophisticated bad guys looking to steal specific data have enlisted surreptitious ways to achieve their ends. From targeting specific employees with convincing phishing emails that encourage them to download malware-riddled attachments to taking advantage of vulnerable web apps, these miscreants find myriad ways to gain entry to networks so that they can siphon off sensitive data – most often unnoticed for days, weeks or even months.

View Recording

How to leverage log data for effective threat detection

Host: Tom D'Aquino, Systems Engineer

Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.

View Recording

SIEM-plifying security monitoring: A different approach to security visibility

Host: Joe Schreiber

Despite investments in preventative security technology and teams, devastating data breaches continue to occur, and the threats we face only grow more advanced all the time. If even the largest companies are struggling to avoid breaches, how can teams with more limited security staff and budgets hope to avoid that same fate? Organizations need to invest more in detection and proactive threat intelligence. SIEM products have been widely deployed for this purpose, however much of the technology remains unwieldy and difficult to use.

View Recording

How to stop malware in its tracks with AlienVault Threat Alerts (now part of Spiceworks!)

Host: Tom D'Aquino, Systems Engineer

If you've upgraded to the latest version of Spiceworks, you've probably noticed the new Threat Alerts, powered by AlienVault. AlienVault Threat Alerts notify you in real-time if devices in your network have been communicating with known malicious hosts, usually a sign of malware infection. So far, over 95% of Spiceworks 7.1 installations have triggered an alert - wow! The new AlienVault Threat Alerts also give you detailed guidance for neutralizing the threat so you can take action quickly. Join us for this webinar to learn more about how to use AlienVault Threat Alerts to detect, research and mitigate potential threats. We'll also show you how you can detect other common attacks like brute force attacks, SQL Injection attacks, XSS attacks and more using AlienVault Unified Security Management (USM).

View Recording

How to Detect SQL Injection & XSS Attacks using SIEM Event Correlation

Host: Tom D'Aquino, Systems Engineer

Two of the oldest and most common attacks used against web applications, SQL injection attacks and cross-site scripting attacks (XSS), continue to impact thousands of websites and millions of users each year. Finding these exposures quickly is essential in order to prevent system compromise and avoid information leakage. SIEM solutions can be invaluable in this effort by collecting and correlating the data you need to identify patterns that signal an attack.

View Recording

Detect Brute Force Attacks & APTs in Less That 1 Hour with AlienVault

Host: Anthony Mack, Systems Engineer & Payman Faed, Account Executive

In this session, our SIEM deployment expert will show you how to quickly and easily: Detect brute force attacks with correlation of both Windows & Linux logs, Detect APTs and zero-day attacks, Expose network scans or worm behavior with firewall log correlation, Identify and prioritize vulnerabilities on affected assets, Customize alerts and reports for PCI, HIPAA and ISO.

View Recording

Threat Detection and Incident Response: What’s New for 2014

Host: Jaime Blasco, Director of AlienVault Labs & Mike Rothman, Security Analyst and President of Securosis

As any security practitioner can tell you, things change quickly in the world of IT security, particularly with respect to new and evolving threats. As a result, organizations need to continuously adapt their security strategies to defend against new threats and take advantage of the latest capabilities for responding quickly when there is a breach. In this session, Mike Rothman, President of Security Analyst firm Securosis, and Jaime Blasco, Director of AlienVault Labs, will give an overview of key changes in the information security world in 2013 and considerations for adapting your 2014 strategy to stay ahead of threats.

View Recording

Threat Intelligence: The Key to a Complete Vulnerability Management Strategy

Host: Sandy Hawke, VP of Product Marketing & Tom D'Aquino, Security Engineer

While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join AlienVault for this session to learn: strategies for addressing common vulnerability management challenges, the pros and cons of different vulnerability scanning techniques and how to integrate threat intelligence into your vulnerability management strategy.

View Recording

Safety in Numbers: The Value of Crowd-Sourced Threat Intelligence

Host: Dave Shackleford, Analyst, SANS and Jaime Blasco, Director of AlienVault Labs

In recent years, the threat intelligence landscape has been evolving rapidly. As the number of third-party threat intelligence services has grown, security practitioners are trying to understand what types of threat intelligence tools and services are providing the most actionable data, and at what cost? In addition, a new breed of threat intelligence service has emerged that leverages "crowd-sourcing", where we all learn from each other and mutually benefit.

View Recording

PCI DSS v3.0: How to Adapt Your Compliance Strategy

Host: Sandy Hawke, VP of Product Marketing, AlienVault
Featured Guest: Carlos Villalba, Director of Security Services, Terra Verde Services, & Patrick Bass, Director of Security Solutions, Terra Verde Services

With version 3.0 of PCI DSS now available, it’s time to review your compliance strategy and make a plan for adapting to the revised requirements. While the 12 main requirements remain the same, there are significant changes related to malware defenses, vulnerability assessments and penetration testing. During this 1-hour session, you’ll learn: What’s new in PCI DSS version 3.0, key considerations for adapting your compliance strategy, technology recommendations for addressing new compliance requirements, and how other companies have simplified PCI DSS compliance.

View Recording

Using Crowd-Sourced Threat Intelligence to Stay Ahead of Exploits

Host: Jaime Blasco, Director of Research, AlienVault Labs

As part of developing a vulnerability management strategy, it’s important to think through the “what if” scenarios that you need to defend against. However, if you’re only considering your own knowledge of potential threats, your plan will likely be incomplete. Join Jaime Blasco, Director of AlienVault labs for a discussion on how to use collaborative threat intelligence to strengthen your vulnerability management strategy.

View Recording

Whose Logs, What Logs, Why Logs - Your Quickest Path to Security Visibility

Host: Tom D'Aquino, Sr. SIEM Engineer

Securing your environment requires an understanding of the current and evolving threat landscape as well as knowledge of network technology and system design. This session will include a technical presentation, demo and interactive Q/A that will highlight how to build out a security plan to defend against today’s threats.

View Recording

Advanced OSSEC Training: Integration Strategies for Open Source Security

Host: Santiago Gonzalez, Director of Professional Services

During this technical one-hour session, Santiago Gonzalez, an OSSEC core team member (System integration, rules & SIEM) and AlienVault Director of Professional Services, will demonstrate how to integrate OSSEC with other 3rd party applications for greater security visibility and response.

View Recording

PCI DSS Simplified: What You Need to Know

Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks – chasing down discrepancies in asset inventory spreadsheets, removing false positives from network vulnerability assessment reports, and weeding through log data trying to make sense of it all. In fact, you may need to consult at least a dozen different tools for those dozen requirements.

View Recording

SANS Institute Ask The Expert Webcast: Preparing for Effective Threat Detection and Response

Host: Dave Shackleford, Analyst, SANS and Russell Spitler, VP Product Management

There are many things that can happen in the daily life of an intrusion analyst. Monitoring events and looking for indicators of compromise can be a taxing job, but there are also many opportunities to detect and possibly prevent data breach scenarios from happening. What are the phases of intrusion detection and incident response processes in today's organizations?

View Recording

The Lazy Attacker: Defending Against Broad-based Cyber Attacks with Unified & Collaborative Defenses

Advanced Persistent Attacks (APTs) get most of the attention from the cyber security community because, as defenders, we want to be vigilant against the most insidious techniques. However, this unilateral mindset ignores a much less interesting reality.

View Recording

Preparing for a Security Breach

How to keep your head (and your job) when the worse case scenario happens. Due to the increasing frequency of security breaches, defining an action plan is critical for every security practitioner. Getting breached doesn’t determine whether or not you’ve got a good security program in place – but how you respond to one does.

View Recording

Expect More From Your SIEM

Unlike security cameras, going from installation to insight with a traditional SIEM is far from straightforward. During this session, we’ll cover a few common problems with SIEM technologies, and how you can avoid those pitfalls with AlienVault Unified Security Management. You’ll walk away with a new perspective on an old problem – reducing the cost of security visibility.

View Recording

Six Steps to SIEM Success

Host: Jim Hansen

Learn the 6 practical steps every IT admin should take to ensure SIEM success in your environment. The promise of SIEM is clearly an essential one–better security visibility. Aggregate, correlate, and analyze all of the security-relevant information in your environment so that you can:

View Recording

Using IP Reputation Data to Stay Ahead of the Threat

Cyber attacks are constantly increasing in both frequency and sophistication. In this atmosphere, accurate and timely threat intelligence is essential. In this webinar, we will share details on a recent real-world test IANS conducted comparing threat intelligence approaches.

View Recording

Securing the ‘Wild Wild West’: Unified Security Management for Colleges and Universities

Securing the IT environment in today’s college or university is no task for the faint of heart. With a user population of digital natives, a school’s IT services are often a high-risk zone where state-of-the art learning and research meets the global threat laboratory. Reducing risk and maintaining compliance requires centralized security visibility and the tools to identify and remove threats quickly and efficiently.

View Recording

Practitioners Guide to a SOC

A nuts-and-bolts discussion of SOC essentials with a review the evolution of SOCs and explain exactly what you’ll need for 20/20 visibility into: What assets are in your environment, and which need priority protection. Which assets have known vulnerabilities. Which assets are under attack, by what type of exploit. Whether a breach has already occurred. How to prioritize your response activities.

View Recording