Featured
Proactive Threat Hunting with Network Detection & Response
Carl Bolterstein, Director of Product Management
Enterprise networks are experiencing a deluge of highly sophisticated threats from motivated attackers. Cloud computing, remote working, and traffic encryption expand the attack surface while making threats harder to detect. Addressing security gaps requires total visibility and a proactive approach to finding threats. This presentation will explore how OpenText Network Detection and Response (NDR) empowers security operations professionals in fast-evolving infrastructures.
All episodes
-
Opentext Cybersecurity at Infosec Europe 2023
Steven Wood, Director, Solutions Consulting
It was great to see so many new and existing customers and Partners at Infosec Europe 2023. Steven Wood, Director, Solutions Consulting, Opentext Cybersecurity spoke with Brian McKenna, Business Applications Editor at Computer Weekly about the conference in general, as well as some key topics around the war in Ukraine, GenAI and cloud.
-
Implementing DRaaS with Carbonite Recover and Google Cloud Platform
Andy Ebbs, Lead Solutions Consultant
Implementing DRaaS with Carbonite Recover and Google Cloud Platform demonstration
-
Migrate to Public Cloud
Andy Ebbs, Lead Solutions Consultant
Watch a live demo of a full server migration workflow - see our unique solution.
-
Webroot DNS Protection
Josko Gadzic, Sr. Solutions Consultant
The first DNS protection service to truly combine privacy and security for cyber resilience.
-
Data resilience in a cloud-centric deployment
Philip Nowlan, Lead Solutions Consultant
Moving suitable workloads to the cloud, such as Email, files and shared files, CRM has created a challenge for companies that recognise the need to maintain a robust and resilient backup strategy. Using Cloud2Cloud backup for supported SaaS services and Server Backup for off-cloud servers and services, as well as cloud servers, will enable companies to maintain immutable offsite and resilient backup content with ease and deliver realistic and workable RTO and RPOs.
-
The danger within - Benefits of Managed Detection and Response for Cybersecurity
Steven Wood, Director, Solutions Consulting
In today's fast-paced digital landscape, the risk of cyber threats and attacks is higher than ever before. To combat these threats, businesses need to have a robust cybersecurity strategy in place. One such strategy is Managed Detection and Response (MDR). MDR is a proactive approach to cybersecurity that involves continuous monitoring of a company's network, detection of potential threats, and immediate response to any identified attacks.
During this 15-minute presentation, we will explore the benefits of MDR for businesses of all sizes. We will discuss how MDR can help identify and mitigate potential threats before they cause significant harm, leading to increased protection against data breaches, system downtime, and financial losses. Additionally, we will examine how MDR can free up resources and enable companies to focus on their core business activities while leaving the security concerns to the experts. Finally, we will provide insights into the various MDR solutions available and best practices for selecting the right MDR provider. By the end of this presentation, attendees will have a better understanding of the role MDR plays in modern cybersecurity and how it can help their business stay protected in the ever-evolving digital landscape.
-
BrightCloud Threat Intelligence: Enabling the world’s leading security solutions
Matt Aldridge, Principal Solutions Consultant
Whether you are building, purchasing or using cybersecurity solutions, you should know about BrightCloud - it is the secret sauce threat intelligence service which is at the heart of many leading security gateway solutions on the market. During this 15 minute presentation you’ll learn what BrightCloud is, how it is used and how all users benefit from the collective intelligence it brings to bear against attacks
-
Accelerating the Pace of Digital Forensic Investigations
Jeremy Fryd, Sr. Solutions Consultant
With enterprises facing an increased number of cybersecurity attacks that come from both internal and external threats, the ability to quickly investigate those attacks has never been more critical. This task has become more challenging with the proliferation of endpoints that exist both on and off the network. This presentation will explore how OpenText Endpoint Investigator utilizes capabilities such conditions, EnScripts, high-speed processing and image analysis to find whatever you want to see in seconds to minutes, accelerating the pace of your investigation without disrupting employee productivity.
-
Comprehensive and Defensible Data Collection for Information Assurance
Jeremy Fryd, Sr. Solutions Consultant
Corporations and government agencies are faced with performing discrete, targeted collections of electronically stored information from a multitude of sources, including on-premises systems, cloud repositories and distributed endpoints. This session will discuss the modern data collection challenges with multitude of data sources, types and volumes and how to collect relevant data, gain early insight and reduce downstream review costs and time.
-
Introduction to ArcSight Intelligence
Paul Reid, Global Head of Threat Intelligence
Introduction to ArcSight Intelligence
-
Archiving and Data Loss Prevention with Encryption
Jack Skinner, Lead Solutions Consultant
Do you work in a regulated industry? Do you require your data to be archived for a set period of time? Have you ever sent a message with sensitive data on and wished you'd never hit send?
Find out how we can help you archive data and prevent sensitive data leaving your domain.
-
Proactive Threat Hunting with Network Detection & Response
Carl Bolterstein, Director of Product Management
Enterprise networks are experiencing a deluge of highly sophisticated threats from motivated attackers. Cloud computing, remote working, and traffic encryption expand the attack surface while making threats harder to detect. Addressing security gaps requires total visibility and a proactive approach to finding threats. This presentation will explore how OpenText Network Detection and Response (NDR) empowers security operations professionals in fast-evolving infrastructures.