Date: Mar. 6
Time: 2:00 p.m. ET / 11:00 a.m. PT
Click here to register for free
Enterprise networks are now more accessible than ever before. Increasingly, these networks are supporting a broader range of user types, including partners, consultants, customers and other guests. They are also supporting a greater number and variety of endpoint device types, such as tablets and smartphones – a significant number of which may be user-owned – and the growing number of applications and application types that run on these devices. This erosion of the traditional network perimeter and explosion of network devices demand a new approach to identity and access control and a comprehensive enterprise security solution that leverage both fully integrated security intelligence and granular policy enforcement to minimize threats to the enterprise network.
Join us for this webinar and gain a deeper understanding of how Cisco and LogRhythm have developed an integrated enterprise security architecture that delivers:
- Greater visibility into endpoint and user activity, including mobile device activity, leveraging behavioral and trend analysis to immediately recognize truly suspicious changes in behavior that warrant action.
- Recognition of suspicious and unauthorized network activity, such as compromised accounts and rogue mobile devices via advanced correlation and pattern recognition that utilizes endpoint profiling and posture assessment.
- Assured continuous compliance with corporate access policies by whitelisting acceptable connection and network activity and monitoring host activities such as processes and user access.
In this webinar, Scott Pope, sr. manager, identity and policy management ecosystem, Cisco Systems will discuss how the combination Cisco Identity Services Engine (ISE) and LogRhythm's Big Data security analytics together provide a powerful yet flexible policy-based access control solution that reduces complexity and ensures consistent policy enforcement and security across the enterprise.
Seth Goldhammer, director of product management at LogRhythm will discuss how LogRhythm's award-winning SIEM 2.0 solution, combined with ISE, leverage both automated behavioral analytics and correlation with endpoint profiling & posture assessment, to detect even the most sophisticated threats. Who should attend: CISOs, CIOs, IT directors and network security professionals.
Scott Pope, senior manager, identity and policy management ecosystem, Cisco Systems
Seth Goldhammer, director of product management, LogRhythm