Special Webinar Event Not What It SIEMs: Understanding the Anatomy of an Attack


  • Pure Storage

About This Webinar

A security breach can happen at any time. Quite often, it’s weeks or even months prior to the malware being deployed and attackers starting the encryption phase of the attack. They’ll poke around inside your network to identify vulnerabilities and to target the weakest link. Once inside your network, they’ll seek access to admin accounts, look to exploit known issues like unpatched systems, identify and target backup files and more.

Securing systems before an attack provides the foundation to enterprise-class security analytics. Using a platform providing speed and scale to access and analyze data is critical to meeting the stringent MTTD and MTTR requirements facing Security Operations teams.
In this webinar, we’ll discuss the anatomy of an attack with a focus on why storage systems used to support SIEM systems must be able to accommodate modern data types and provide support for modern applications.

As well, dramatic increases in storage performance can enable SIEM analytics being helpful everything to analytics - making use of the detection data in closer to real time to dramatically reduce the breakout time of an attack.

Additionally, you’ll see why enterprise-class, all-flash systems using disaggregated, scale-out architectures are a good fit for storage infrastructure supporting SIEM.

  1. David Davis

    Host David Davis Author, Speaker, and vExpert ActualTech Media

  2. Andrew Miller

    Featuring Andrew Miller Principal Technologist Pure Storage

  3. Seth Kindley

    Featuring Seth Kindley Principal Data Architect Pure Storage