A series of online discussions on hot topics in cybersecurity
Trellix Cyber Spring is 5 online discussions dedicated to Trellix products. Each focuses on a specific aspect of cybersecurity: EDR, DLP, corporate email protection, SIEM, and network perimeter protection.
At the discussions we showed how Trellix solutions can block any attempts to create a security gap, investigated Trellix EDR and Insights technologies, talked in detail about phishing protection and more.
Trellix is a cybersecurity solutions company formed by merging McAfee Enterprise and FireEye.
WEBINAR RECORDINGS
Culture of corporate data security. Trellix DLP
We analyzed: ● DLP and data life cycle in the company ● Vectors of information leakage and approaches to information security ● Handling incidents due to user inattention ● Insider detection in the organization ● Data protection on compromised systems
Checkmate to hackers. Investigations with Trellix EDR
Discussed:● Why an antivirus is not enough and why EDR is needed ● How to see more and react faster ● What tools Trellix provides for investigations ● How to conduct large-scale investigations in a few clicks ● If it's possible to defend against all attacks using EDR
NextGen network protection with Trellix IPS
Together with the speakers we:● Protected the perimeter and segmented the corporate network ● Discussed Trellix solutions for network protection● Simulated network attacks such as DoS, Botnet and others● Defeated these attacks with Trellix IPS● Investigated incidents and provided recommendations to protect the network
Trellix Email Security vs Phishing. Preventing Email Threats
We told:● Why corporate email protection should not be limited to Antispam and Antivirus ● What methods the attacker uses to attack through corporate mail ● What detection and investigation tools Trellix Email Security offers ● If Trellix Email Security can be a cloud-based email gateway replacement ● How to work with the solution when a malicious email is detected (Live Demo)
SIEM vs hackers. SOC based on Trellix SIEM
Told and showed: ● How to monitor information security in real time ● If it's possible to detect APT attacks at the initial stage ● Why endpoint/network security technologies are not enough● The portfolio of Trellix solutions for building SOC ● How to conduct an investigation exemplifying by current cases● How to understand from individual events that you are attacked
Ruslan Utchenko
Senior Sales Engineer, BAKOTECH
moc.hcetokab%40oknehctu.nalsur
Oleksander Sharuiev
Sales Engineer, BAKOTECH
moc.hcetokab%40veiurahs.rdnaskelo
Watch all the Trellix Cyber Spring online discussions on our website!
Contacts
moc.hcetokab%40xillert
Subscribe TRELLIX | BAKOTECH
Contacts
moc.hcetokab%40xillert
Subscribe TRELLIX | BAKOTECH
Контакти
+380 44 273 3333moc.hcetokab%40xillerT
Підписка на новини TRELLIX | BAKOTECH
Контакти
+380 44 273 3333moc.hcetokab%40xillerT
Підписка на новини TRELLIX | BAKOTECH