The Marriage Between SIEM and SOAR: Roles and Responsibilities in the Relationship With the growing number of tools and technologies being used within security operations to combat the ever-increasing number of security alerts being received, there is still much confusion about what their specific uses and purposes are in order to achieve operational efficiency and effective incident response. Many security professionals today still question the difference between (Security Information and Information Management (SIEM) and Security Orchestration, Automation and Response (SOAR) and often ask, “If we have a SIEM tool, do we need SOAR?” Although it’s still possible for some SOCs to still function without having a SIEM or SOAR solution in place, many security teams will agree that the success formula is to have both. The amount of security events being generated on a daily basis will likely be a key determining factor for implementing a SIEM tool, and the ability to respond to all of these alerts effectively will likely be a deciding factor when choosing whether to implement a SOAR solution. Presented by one of the pioneering leaders within the SOAR market, this webinar will illustrate the functions of SIEM and SOAR, their requirements within SecOps, and how utilizing a SOAR solution can leverage your existing SIEM tool to provide significant value to your security program. Key Takeaways - The Differences Between SIEM and SOAR - The Problems They Can Solve Together - The Role of SOAR as an Independent Platform


16:00 - 17:00 hs GMT+1


DFLabs - Cyber Incidents Under Control
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2020 826 webinars
Lun 01 de Junio de 2020
Mar 02 de Junio de 2020
Mié 03 de Junio de 2020
Jue 04 de Junio de 2020
Vie 05 de Junio de 2020
Sáb 06 de Junio de 2020
Dom 07 de Junio de 2020
Lun 08 de Junio de 2020
Mar 09 de Junio de 2020
Mié 10 de Junio de 2020
Jue 11 de Junio de 2020
Vie 12 de Junio de 2020
Sáb 13 de Junio de 2020
Dom 14 de Junio de 2020
Lun 15 de Junio de 2020
  • 5 Steps to Security Validation

    20:00 - 21:00 hs GMT+1

    Lun 15-Jun-2020, 20:00 - 21:00 hs GMT+1
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we (...)
Mar 16 de Junio de 2020
Mié 17 de Junio de 2020