Defend the Edge with Greater Network Insight and Enforcement

Tapping Big Data Security Analytics to Detect Breaches & Advanced Threats and Gain Actionable INTEL
Tapping Big Data Security Analytics to Detect Breaches & Advanced Threats and Gain Actionable INTEL
Defend the Edge with Greater Network Insight and Enforcement

Date: Mar. 6
Time: 2:00 p.m. ET / 11:00 a.m. PT

Click here to register for free

Enterprise networks are now more accessible than ever before. Increasingly, these networks are supporting a broader range of user types, including partners, consultants, customers and other guests. They are also supporting a greater number and variety of endpoint device types, such as tablets and smartphones – a significant number of which may be user-owned – and the growing number of applications and application types that run on these devices. This erosion of the traditional network perimeter and explosion of network devices demand a new approach to identity and access control and a comprehensive enterprise security solution that leverage both fully integrated security intelligence and granular policy enforcement to minimize threats to the enterprise network. 

Join us for this webinar and gain a deeper understanding of how Cisco and LogRhythm have developed an integrated enterprise security architecture that delivers: 

  • Greater visibility into endpoint and user activity, including mobile device activity, leveraging behavioral and trend analysis to immediately recognize truly suspicious changes in behavior that warrant action. 

  • Recognition of suspicious and unauthorized network activity, such as compromised accounts and rogue mobile devices via advanced correlation and pattern recognition that utilizes endpoint profiling and posture assessment. 

  • Assured continuous compliance with corporate access policies by whitelisting acceptable connection and network activity and monitoring host activities such as processes and user access.

In this webinar, Scott Pope, sr. manager, identity and policy management ecosystem, Cisco Systems will discuss how the combination Cisco Identity Services Engine (ISE) and LogRhythm's Big Data security analytics together provide a powerful yet flexible policy-based access control solution that reduces complexity and ensures consistent policy enforcement and security across the enterprise. 

Seth Goldhammer, director of product management at LogRhythm will discuss how LogRhythm's award-winning SIEM 2.0 solution, combined with ISE, leverage both automated behavioral analytics and correlation with endpoint profiling & posture assessment, to detect even the most sophisticated threats. Who should attend: CISOs, CIOs, IT directors and network security professionals.

Featured speakers:
Scott Pope, senior manager, identity and policy management ecosystem, Cisco Systems
Seth Goldhammer, director of product management, LogRhythm

Sponsored by:

Sign up to our newsletters

More in Vendor Webcasts

Why NAC? Why now?

Why are so many enterprises rushing to implement network access control (NAC) now? Watch this webcast to learn about the many uses of NAC.

Security Based on Trust, Not Fear

Security Based on Trust, Not Fear

Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, ...

Unknown Targeted Attacks - Stopping malware at the endpoint

Unknown Targeted Attacks - Stopping malware at the ...

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen. Organizations must ask ...