Support • (786) 621-8600 Contact us
Demo

Recent Posts

June 8th Webinar: You Don’t Have to Be a Packet Ninja to Know Who’s Talking in Your Network

{{date_event:2017-06-08}}  When attackers compromise the perimeter, or are operating from within, you need to know. You can only stop attackers from gaining a foothold in your network to expand their presence if you can see them The indicators of a breach are often first observed within the network itself, therefore network monitoring and forensics plays an essential role in helping to detect, respond, and naturalize attacks.

In this June 8th webinar sponsored by DigitalEra, LogRhythmn’s Emily Henriksen will discuss how to quickly identify emerging threats in your IT environment using network monitoring and forensic tools.

Join this webinar to learn:

* How to quickly identify emerging threats in your IT environment using network monitoring and forensic tools

* What Network Monitor is and the important role it plays in your security operations strategy

* Real-life use cases that highlight the power of Network Monitor

* How Network Monitor works with SIEM to reduce the mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to cyber attacks

Register now to learn how monitoring your network can help you detect and investigate potential malicious behavior within your IT environment

Click here to Register:

         

May 25th Webinar: Reducing the Time to Detect Ransomware in Your Network

{{date_event:2017-05-25}} You’re invited to join us for the first in a series of webinars sponsored by DigitalEra and presented by LogRhythmn “Reducing the Time To Detect Ransomware in your Network”.

Over the past three years, ransomware has jumped into the spotlight of the cyberthreat landscape. Until recently, most ransomware attacks were simply opportunistic and mostly affected individual users’ or small businesses’ computers. The ransom demands have commonly been the equivalent of just a few hundred dollars for an individual PC.

In this webinar, LogRhythmn’s Manija Poulatova discusses how to leverage SIEM technology to catch and respond to ransomware to prevent it from spreading and reaching the critical mass.

The Webinar is slated for 12:00 Noon ET.

To register click here now.

2017 Gartner IT Operations Strategies & Solutions Summit – Orlando FL

  {{date_event:2017-05-08}}The Summit is designed for individuals in the following roles: IT Operations Management, Cloud Operations and IT Service Support. Keynotes are Theresa Payton, Former White House Chief Information Officer, Author and Cyber Security Expert; Hank Marquis, Gartner Research Director and Milind Govekar, Gartner Research VP.   2017 Tracks include: Emerging Trends in IT Operations, Leadership & Strategy, DevOps & Agile in IT Operations, Optimize IT Operations and Cloud & Virtualization. “A Spotlight Tracks” will include a  selection of sessions from across the agenda  on Security in IT Operations, Digital workplace, Bimodal IT, Cost Optimization. For more information:

Michael Dyer Presenting at WordCamp Miami – March 23rd

{{date_event:2017-03-23}} If you are in Miami on March 23rd, you won’t want to miss the WordCamp Miami event. DigitalEra and Trapezoid’s Michael Dyer will be leading a session “Intro to GraphQL for REST Developers”.

The session will be technical in nature, but focused on fundamentals. Attendees will walk away with a solid understanding of key concepts.

Class outline is below, and you can register here:

GraphQL is a data query language developed by Facebook that provides a powerful alternative to traditional REST. In this session Mr. Dyer will provide a walkthrough of the GQL architecture and community, including:

  • The differences and benefits of GraphQL vs REST
  • Demonstrate GQL queries (your first 15 minutes with GQL)
  • See how to query `through` your data
  • Discuss schema design and architecture
  • GQL client alternatives

For more info: https://2017.miami.wordcamp.org/speakers/

Webinar: “NIST Firmware Controls for Non-Federal Entities: What You Need to Know”

Effective this month, compliance with NIST 800-53 and 800-53A applies to all types of organizations at all levels. This includes state, local, and tribal governments as well as all industry and academia. Your organization will be expected to comply.

DigitalEra is bringing together firmware experts José González and Michael Dyer for this timely presentation to review the requirements and share new firmware protection technologies to help you be prepared.

There are two sessions to choose from:

Tuesday, March 14th at 2:00 p.m., ET and Thursday, March 16th at 10:00 a.m. ET.

This 60 minute presentation covers:

  • The NIST Rule: Why it now affects you
  • Case Studies: The breaches that led to the ruling and how you’re at risk
  • NIST Compliance: What you need to know now to comply
  • Advanced Technologies for protecting your organization

Find out what you need to do to comply with NIST Regulations and see new technologies for protecting your firmware.   Register now.