Redefining SaaS Security so SOC/IR Teams Aren’t in the Dark – Stephen Newman – ESW #230
Traditional options of acquiring network detection and response (NDR) solutions have their individual pros and cons. SaaS or On-Premises NDR solutions allow you to customize it to your environment but require costly care and feeding such as detection tuning that distracts your SOC/IR teams from hunting adversaries. If you go with a Managed NDR you have predictable costs but receive generic detections and response options in a one-size fits all model. Join Stephen Newman, VP of Product Marketing to see how ThreatINSIGHT Guided-SaaS NDR combines a purpose-built NDR platform for adversary detection and response with Gigamon SOC/IR human talent dedicated to delivering guided expertise to your security team… together closing the SOC visibility gap, removing distractions, and providing advisory guidance when it matters most.
This segment is sponsored by Gigamon.
Visit https://securityweekly.com/gigamon to learn more about them!
Don't miss any of your favorite Security Weekly content! Visit https://securityweekly.com/subscribe to subscribe to any of our podcast feeds and have all new episodes downloaded right to your phone! You can also join our mailing list, Discord server, and follow us on social media & our streaming platforms!
Security Weekly is ecstatic to announce that Security Weekly Unlocked will be held IN PERSON this December 5-8 at the Hilton Lake Buena Vista! Call for presentations & early registration for Security Weekly listeners is open now! Visit securityweekly.com/unlocked to submit your presentation & register for the early registration price before it expires!
Stephen Newman, VP of ThreatINSIGHT Product Marketing, has over 15 years of Product Management and Product Marketing experience in the field of Cyber Security, ranging from VPNs, email security, advance threats, identity-based security and cloud-native network detection and response. He has also lead teams of security researchers, engineers and analyst to track threat actors, understand their tactics, and devise machine learning techniques to identify their behavior inside enterprise networks.