Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Overview of Popular Dashboards

Use pre-built dashboards as a starting point to visualize risk. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.

Build Trust In Your Software | Synopsys

Digital transformation is reshaping the way organizations operate. Whether you’re one of the thousands of companies that sell software, or one of the millions that use software to run your business, your ability to innovate and deliver value to your customers is powered by secure, reliable software. See why trust matters with Synopsys.

Configuring an Output with LimaCharlie

In this video we demonstrate how to configure an Output in LimaCharlie to send your telemetry anywhere. LimaCharlie users can relay their data anywhere they want for longer term storage and analysis. Where that data is sent depends on which Outputs are activated. You can have as many Output modules active as you want. For example you can send varying levels of data to multiple syslog destinations using the Syslog Output module and then send additional data to some cold storage over an Scp Output module.

Installing the LimaCharlie Sensor

In this short video we show you how easy it is to install the LimaCharlie EDR sensor and get telemetry flowing into the cloud. Once installed you can go live on the sensor and perform digital forensics in real-time. Visually navigate through historic telemetry, view memory maps, kill or suspend processes, explore the file system, view network connections and much more. Watch this video to see how powerful it is.

Case Study: Outsider Attacks - Before and After LogSentinel SIEM

Cyber attackers are relentless, but your security doesn’t have to be. Hackers can wreak havoc on your company. One way they do this is by attacking your IT infrastructure and look for vulnerabilities. The good news is, you don't have to spend a fortune to solve your security problems. LogSentinel SIEM is the first line of defense for organizations worldwide, helping businesses avoid security breaches before they happen.

Defending Against Insider Threats with Egnyte

An insider threat is perhaps the most difficult threat to deal with for most organizations. It occurs when someone uses legitimate access to copy, expose, damage, or delete sensitive information. It can be accidental, such as when a sensitive file is placed in a folder accessible to all employees. Or, it can be intentional, such as when an employee preparing to resign copies sensitive files to take with them. It can even be malicious, such as when a disgruntled employee intentionally deletes critical files.

NC Protect for Microsoft Teams

NC Protect offers a simpler, faster and scalable way to ensure secure collaboration in Teams. NC Protect dynamically adjusts access to and protection of chats, channels and files shared in Teams based on user and file attributes to control what users can see, how they can share information and with whom. Get granular security with less time and effort.

Custom Dimensions

Use custom dimensions to tailor views of your data sets. Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.