Gartner Blog Network


Upcoming Webinar: Modern Network Threat Detection and Response

by Anton Chuvakin  |  January 21, 2019  |  2 Comments

Here is my next Gartner webinar; this one is focused on network traffic use for detection and response.

Title: Modern Network Threat Detection and Response

Date: January 29, 2019

Time: EST: 11:00 a.m. | PDT: 8:00 a.m. | GMT: 16:00

Register: here

Description:

Join us for this complimentary security and risk webinar, as Gartner expert Anton Chuvakin looks at the key practices related to modern network security analytics. We review various modes of traffic analysis and the use of traffic data for detection and response. Discover how your organization can modernize network threat detection and response.

  • How you can use network traffic to support threat detection and response
  • The best places in the network to apply network traffic analysis
  • Technologies available for network traffic analysis

Enjoy!

P.S. As usual, Q&A to be posted here, so make sure to ask fun questions!

Past webinars and Q&A posts:

Additional Resources

View Free, Relevant Gartner Research

Gartner's research helps you cut through the complexity and deliver the knowledge you need to make the right decisions quickly, and with confidence.

Read Free Gartner Research

Category: analytics  announcement  detection  network  network-forensics  nta  security  

Anton Chuvakin
Research VP and Distinguished Analyst
8 years with Gartner
19 years IT industry

Anton Chuvakin is a Research VP and Distinguished Analyst at Gartner's GTP Security and Risk Management group. Before Mr. Chuvakin joined Gartner, his job responsibilities included security product management, evangelist… Read Full Bio


Thoughts on Upcoming Webinar: Modern Network Threat Detection and Response


  1. Jay Smilyk says:

    Very interested to hear about NDR and EDR vision in the market place.

  2. […] promised, here is my lightly edited Q&A from a recent webinar called “Modern Network Threat Detection and Response.” Questions about vendors are removed, and some are edited for […]



Comments are closed

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.