audio audioduration (s) 0.66 23.8 | text stringlengths 0 165 | start_time stringlengths 12 12 | end_time stringlengths 12 12 |
|---|---|---|---|
And so that causes huge problems. | 00:15:49.710 | 00:15:52.080 | |
And that approach does not scale. | 00:15:52.590 | 00:15:55.200 | |
So what the alternative is is we started thinking about this about three years ago and realized that there was a missing scope here. | 00:15:55.590 | 00:16:04.440 | |
The missing step is that instead of forcing everything to come into the same place, even from the public cloud providers, | 00:16:05.040 | 00:16:13.477 | |
instead, what if we could do a federated approach to threat investigations and applying threat intelligence. | 00:16:13.477 | 00:16:22.938 | |
What does that mean? | 00:16:22.990 | 00:16:23.739 | |
Well, when you see a new indicator, a compromise crop up anywhere | 00:16:24.040 | 00:16:28.082 | |
instead of waiting for all the data to end up over here, instead, ask your security analytics platform, | 00:16:28.082 | 00:16:36.866 | |
ask your various security tools, ask AWS, and Azure, and Google Cloud and IBM Cloud, | 00:16:36.866 | 00:16:42.696 | |
what are they seeing at this? | 00:16:42.696 | 00:16:44.709 | |
And then make a decision right there. | 00:16:44.920 | 00:16:46.960 | |
That approach is simple, it's fast and it's effective. | 00:16:47.710 | 00:16:52.149 | |
So we started building that about three years ago | 00:16:52.660 | 00:16:55.148 | |
and going to a cloud native version of doing that, of doing federated searches and investigations | 00:16:55.148 | 00:17:02.278 | |
and tying it into this entire process has a radical impact | 00:17:02.278 | 00:17:07.675 | |
on not only your ability to threat management, but it allows you to modernize your approach to | 00:17:07.675 | 00:17:15.166 | |
providing cyber services to the modernizing organization around you because it's all built on cloud native microservices. | 00:17:15.166 | 00:17:22.898 | |
So this ability to move from standalone products and ingestion from all over the place | 00:17:23.470 | 00:17:30.061 | |
into cloud native microservices that use a federated approach | 00:17:30.061 | 00:17:34.343 | |
is far more powerful, and with the clients we've seen using it has a huge impact. | 00:17:34.343 | 00:17:39.280 | |
So that's the three trends we see that are having the biggest impact on Cyber today, and I thank you for your time. | 00:17:39.940 | 00:17:45.730 | |
Thank you. | 00:17:47.082 | 00:17:47.741 | |
If you like this video and want to see more like it, please like and subscribe. | 00:17:47.838 | 00:17:52.728 | |
If you have questions, please drop them in the comments below. | 00:17:52.832 | 00:17:55.651 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.