Exabeam Case Study: Envida
3:35
Exabeam SIEM Overview
20:46
3 ай бұрын
Feature Demo: Correlation Rules
2:18
Feature Demo: Log Stream
1:20
4 ай бұрын
Feature Demo: Outcomes Navigator
1:13
Feature Demo: Dashboards
1:07
4 ай бұрын
Feature Demo: Search
1:23
4 ай бұрын
Feature Demo: Collectors
0:49
4 ай бұрын
Feature Demo: Threat Center
4:04
4 ай бұрын
Exabeam Fusion Demonstration
30:26
Spotlight23: Highlights in Review
0:35
Spotlight23: Voice of the SOC
1:17
Пікірлер
@BrookeThePersonalTrainer
@BrookeThePersonalTrainer 13 күн бұрын
thank you!
@danishuddin9752
@danishuddin9752 15 күн бұрын
Nice thank you!
@Tantejuju65
@Tantejuju65 19 күн бұрын
From one ID to another, very nice consumable info nugget!!
@JarrodKoehler-n1t
@JarrodKoehler-n1t Ай бұрын
Mills River
@KishorKumar-z8e
@KishorKumar-z8e 2 ай бұрын
thanks a lot for valuable video please keep doing such a videos very informative. thanks again.
@ABDULBASIT-q8m7f
@ABDULBASIT-q8m7f 2 ай бұрын
what is the software used @ 7.50 ?
@Ray-p8d
@Ray-p8d 3 ай бұрын
How to resolve this one?
@izumizhang9680
@izumizhang9680 3 ай бұрын
does this potentially offend privacy?
@claudiamanta1943
@claudiamanta1943 6 ай бұрын
Can a threat- detecting software itself constitute a threat? A hacker would mess with your algorithmic architecture so that the client becomes a victim by being lulled into a sense of false security and by over reliance on- basically, another piece of software that, like any piece of software- is hackable.
@claudiamanta1943
@claudiamanta1943 6 ай бұрын
2:38 So…you say that cloud is a good idea. Say no more. ✋ You just discredited you and your company in my non- specialist eyes. Even if a service is ‘just’ IsaaS, it’s anything but secure.
@claudiamanta1943
@claudiamanta1943 6 ай бұрын
1:57 I think this is BS. Who would have allowed him to do this? And who can claim it was just gross negligence when it shows clear intent and planning? I doubt that employees at DoD or similar institutions unscrew computers on a regular basis and put them in their lunch boxes, casually waltzing through the gate’s metal detectors.
@claudiamanta1943
@claudiamanta1943 6 ай бұрын
Thanks for sharing, it’s really interesting. I don’t know much about IT, but isn’t it risky to use any automated system to flag up problems? Such system is only as good as its algorithms and the way the administrator configures it. Re the incident. Maybe this lady works remotely from Ukraine? Last but not least, shouldn’t the company’s IT admin check her activity? Please, tell me that Admins can do that despite the employees using VPN, otherwise the system would be safe-ish from external attacks but totally vulnerable to internal attacks. Thanks.
@claudiamanta1943
@claudiamanta1943 6 ай бұрын
3:45 How do you know info about somebody’s behaviour if they use a VPN?
@sielecassharpe678
@sielecassharpe678 7 ай бұрын
As a new soc analyst, I found this video very valuable! I got so much insight in such a short amount of time as well as how you should investigate and look into activities. Thanks a ton!
@tinatwintinny1205
@tinatwintinny1205 7 ай бұрын
Thank you for sharing. I have been trying to get an entry-level job as a SOC, and 😐it's an exciting role.
@juliusweston8036
@juliusweston8036 8 ай бұрын
Awesome Stuff!
@harshal07051995
@harshal07051995 8 ай бұрын
How can we implement ueba in our firm
@neonpolo
@neonpolo 8 ай бұрын
great video, gives you insight on how attackers think
@joemorgan2253
@joemorgan2253 8 ай бұрын
Thank you. That's an eye opening demonstration.
@SkygirlGamingChannel
@SkygirlGamingChannel 8 ай бұрын
Thank you a lot for this in depth video.
@jeffnaval4894
@jeffnaval4894 8 ай бұрын
It looks simple. not too much coding. Finally i have a dreamjob i'm dreaming about.
@dylanlee8476
@dylanlee8476 9 ай бұрын
The mic almost made me deaf
@SreeProshntoBiswas
@SreeProshntoBiswas 9 ай бұрын
Hi there, Develop your business quickly, You need an efficient Social Media Market. I want to read about the application of that skill in your business. And want to see your success as a result. I will be very happy to be with you.
@SreeProshntoBiswas
@SreeProshntoBiswas 9 ай бұрын
Hi there, Develop your business quickly, You need an efficient Social Media Market. I want to read about the application of that skill in your business. And want to see your success as a result. I will be very happy to be with you.
@Poorselipitanoff
@Poorselipitanoff 9 ай бұрын
Привет с двача
@akpologun6654
@akpologun6654 9 ай бұрын
Wow, this is amazing, I'll try this out
@jackchn23
@jackchn23 10 ай бұрын
Thanks Keatron! Subbed to YOUR channel!
@ishwaryanarayan1010
@ishwaryanarayan1010 11 ай бұрын
Sir your videos are great . I am looking for trial version to update my skills . Do you offer free trial version?
@gavinreynolds942
@gavinreynolds942 Жыл бұрын
Thank you for uploading these videos. Could you please add a video or series discussing how tokenize using regex. I am not understanding the Tokenization Parameter Requirements.
@priyankakale8652
@priyankakale8652 Жыл бұрын
Thanks for such an informative video.
@toliskoutovas7267
@toliskoutovas7267 Жыл бұрын
Trying to get into SOC T1. What if instead of uploading the rootkit executable on VirusTotal, you instead extracted its hash and compared it to the virustotal database? Wouldn't that be safer?
@daveclark9411
@daveclark9411 Жыл бұрын
Promo`SM 🤤
@draperw86
@draperw86 Жыл бұрын
Dang Keatron you break it down like this was a sermon !! This is awesome
@zak1686
@zak1686 Жыл бұрын
Thank you %100 works
@xCheddarB0b42x
@xCheddarB0b42x Жыл бұрын
This was excellent: short, informative, and clear. Thank you!
@daslynhug8953
@daslynhug8953 Жыл бұрын
Whew would recommend this video to anyone! Thank you for a value add!
@MinaBrinzo
@MinaBrinzo Жыл бұрын
Didnt work for me
@akotamaki3385
@akotamaki3385 Жыл бұрын
Great video thank you
@stocktip8030
@stocktip8030 Жыл бұрын
I have a question: i am the only one at home. i have 2 laptops. i remotely connected to my other laptop (RDP) and locked it and i kept my terminal window minimized. when i switched back to it, i found it unlocked. what could have caused that?
@rb-os4cm
@rb-os4cm Жыл бұрын
Very Interesting topic. Will UBA work effectively by just ingesting from an IAM tool and application access logs ?
@rohithreddy7695
@rohithreddy7695 Жыл бұрын
Simple and straight
@rohithreddy7695
@rohithreddy7695 Жыл бұрын
thanks mate
@rohithreddy7695
@rohithreddy7695 Жыл бұрын
great explaination...cheers mate
@jksalamon
@jksalamon Жыл бұрын
Wanted to check on SOC. Can there be an IT SOC and an OT SOC. Is it right to say so. Or is it just one SOC and have a SIEM separately for IT and OT. In one of our groups we had this endless debate about SOC, each side backed with their own experience and opinions. What do you think is the right approach, any document/whitepaper you can share that you know of.
@zacherymahoney12
@zacherymahoney12 Жыл бұрын
Just super cool. This is why its so fun
@fromthemoonandmybed
@fromthemoonandmybed Жыл бұрын
Watching this in 2023 and seeing 3:55 is wild 😭
@Hotchoclate5444
@Hotchoclate5444 Жыл бұрын
Great video!!
@ankaarao123
@ankaarao123 Жыл бұрын
Thanks to everybody for a lovely video
@TestUser-i6z
@TestUser-i6z Жыл бұрын
SuperCybex can provide a cyber defense services for businesses with 50-5000 employees throughout the US to help identify cyber threats and mitigate the risks. Whether your business needs firewalls, network upgrades, or cyber defense and training, we can provide a complete solution including Incident Response
@user-vu4tf3eb9l
@user-vu4tf3eb9l Жыл бұрын
Is she single?