Event Date: February 22, 2018 at 2:00 PM ET
Hosted By: Splunk , GuidePoint Security & Carahsoft
Federal agencies are not immune to the macro trends facing cybersecurity leaders such as increasing attack sophistication and resource shortages. Agencies must leverage trusted partners to accomplish their mission, however many FSIs and Managed Security Services Providers (MSSPs) fall short of delivering the right technologies and qualified personnel. Agencies must ask more from their service providers to ensure they deliver on the potential of managed detection and response (MDR).
Attendees of this webinar will get an introduction to GuidePoint's Virtual Security Operations Center (vSOC), led by GuidePoint's Director of vSOC Product Development, Robert Vaile. They will also discover how GuidePoint'svSOC delivers on the potential of MDR and partners with its customers by:
Extending your team by assigning vSOC analysts
Reducing false positives by validating alerts prior to notification
Leveraging Splunk for machine learning to deliver "always-on" active hunting
Maintaining agency ownership of the security infrastructure and data
Establishing transparency by providing your team access to the data you own
Mapping service offerings to the NISTCybersecurity Framework
With the December 31st deadline for DOD research grants rapidly approaching, campuses across the country are diving into discussions around NIST 800-171 compliance. We at Splunk are committed in our mission to help higher education customers leverage the power of machine data to address challenges r...
Founded in 1838, Duke University (Duke) is a private research institution situated on an 8,500-acre campus in Durham, N.C. Duke is divided into 10 schools and colleges, serving nearly 15,000 undergraduate and graduate students. With faculty and staff added to the mix, Duke supports more than 68,000 ...
The University of Nevada, Las Vegas (UNLV) is a premier research university serving 29,000 students. UNLV has relied on machine data analytics to troubleshoot and manage the operational efficiency of its IT networks for several years, and now has repurposed its data to identify at-risk students and ...
Energy efficiency is one of the most critical factors in any building project. It’s
estimated that commercial buildings consume nearly 20% of all energy in the U.S.,
the majority of which is used for lighting and indoor climate control. From site
selection and layout to building materials and m...
The Nevada Department of Transportation (NDOT), a division of Nevada’s state government, aims to enhance public safety and commerce by planning, constructing, operating and maintaining the state’s highways. NDOT oversees Nevada’s 511 system, which enables citizens to determine road conditions ...
Splunk Enterprise collects all your machine data from wherever it’s generated, including physical, virtual, and cloud environments. The solution enables you to search, monitor, and analyze your data from one place in real time. It enables you to troubleshoot problems, monitor your end-to-end infra...
Today’s datacenter has evolved and IT environments are now more complex than ever – so don’t let your IT management and monitoring tools leave you behind. With Splunk for IT Operations, you get end-to-end visibility across IT infrastructure to fix problems faster.
Any government agency, whether it is a civilian, defense or
intelligence agency, depends on information technology to
help support data integrity, reduce mission risk and ensure the
confidentiality and availability of information.
In response to these needs, NIST published its Risk Management
The rapid pace of virtualization adoption in the datacenter creates
challenges for virtualization administrators. IT professionals
have limited operational visibility into their virtual infrastructure,
inadequate control over performance and security of virtual
machines, insufficient insights in...
Targeted attacks — including advanced persistent threats (APTs) — and the new generation of malware they employ are among the greatest security challenges facing today’s enterprises. Traditional security technologies are unable to reliably identify such threats in the first place, leading to h...