A series of online discussions on hot topics in cybersecurity
Trellix Cyber Spring is 5 online discussions dedicated to Trellix products. Each focuses on a specific aspect of cybersecurity: EDR, DLP, corporate email protection, SIEM, and network perimeter protection.
At the discussions we showed how Trellix solutions can block any attempts to create a security gap, investigated Trellix EDR and Insights technologies, talked in detail about phishing protection and more.
Trellix is a cybersecurity solutions company formed by merging McAfee Enterprise and FireEye.
WEBINAR RECORDINGS
Culture of corporate data security. Trellix DLP
We analyzed: ● DLP and data life cycle in the company ● Vectors of information leakage and approaches to information security ● Handling incidents due to user inattention ● Insider detection in the organization ● Data protection on compromised systems
Checkmate to hackers. Investigations with Trellix EDR
Discussed:● Why an antivirus is not enough and why EDR is needed ● How to see more and react faster ● What tools Trellix provides for investigations ● How to conduct large-scale investigations in a few clicks ● If it's possible to defend against all attacks using EDR
NextGen network protection with Trellix IPS
Together with the speakers we:● Protected the perimeter and segmented the corporate network ● Discussed Trellix solutions for network protection● Simulated network attacks such as DoS, Botnet and others● Defeated these attacks with Trellix IPS● Investigated incidents and provided recommendations to protect the network
Trellix Email Security vs Phishing. Preventing Email Threats
We told:● Why corporate email protection should not be limited to Antispam and Antivirus ● What methods the attacker uses to attack through corporate mail ● What detection and investigation tools Trellix Email Security offers ● If Trellix Email Security can be a cloud-based email gateway replacement ● How to work with the solution when a malicious email is detected (Live Demo)
SIEM vs hackers. SOC based on Trellix SIEM
Told and showed: ● How to monitor information security in real time ● If it's possible to detect APT attacks at the initial stage ● Why endpoint/network security technologies are not enough● The portfolio of Trellix solutions for building SOC ● How to conduct an investigation exemplifying by current cases● How to understand from individual events that you are attacked
Ruslan Utchenko
Senior Sales Engineer, BAKOTECH
Oleksander Sharuiev
Sales Engineer, BAKOTECH
Watch all the Trellix Cyber Spring online discussions on our website!
Contacts
moc.hcetokab%40xillert
Subscribe TRELLIX | BAKOTECH
Contacts
moc.hcetokab%40xillert
Subscribe TRELLIX | BAKOTECH
Контакти
+380 44 273 3333moc.hcetokab%40xillerT
Підписка на новини TRELLIX | BAKOTECH
Контакти
+380 44 273 3333moc.hcetokab%40xillerT
Підписка на новини TRELLIX | BAKOTECH