Alerts
XDRAIV
Alerts
1:34
Compliance
XDRAIV
Compliance
0:57
Dashboard
XDRAIV
Dashboard
1:21
Events
XDRAIV
Events
0:47
File Integrity
XDRAIV
File Integrity
1:14
Offensive Tactics
XDRAIV
Offensive Tactics
1:02
Login and Profile Settings
XDRAIV
Login and Profile Settings
1:43
Security Configuration
XDRAIV
Security Configuration
1:01
Threat Intelligence
XDRAIV
Threat Intelligence
0:31
Vulnerabilities
XDRAIV
Vulnerabilities
2:17
XDRAIV Compliance
XDRAIV
XDRAIV Compliance
1:13
XDRAIV Dashboard
XDRAIV
XDRAIV Dashboard
1:55
XDRAIV Events
XDRAIV
XDRAIV Events
1:19
XDRAIV File Integrity
XDRAIV
XDRAIV File Integrity
1:21
XDRAIV Integrations
XDRAIV
XDRAIV Integrations
0:30
XDRAIV Offensive Tactics
XDRAIV
XDRAIV Offensive Tactics
1:33
XDRAIV Profile
XDRAIV
XDRAIV Profile
0:24
XDRAIV Reports
XDRAIV
XDRAIV Reports
1:18
XDRAIV Security Configuration
XDRAIV
XDRAIV Security Configuration
1:33
XDRAIV Threat Intelligence
XDRAIV
XDRAIV Threat Intelligence
0:55
XDRAIV Vulnerabilities
XDRAIV
XDRAIV Vulnerabilities
1:42
XDRAIV Admin
XDRAIV
XDRAIV Admin
1:44
XDRAIV Alerts
XDRAIV
XDRAIV Alerts
1:09
LogSentinel: The power of XDR – Stay ahead of the curve
XDRAIV
LogSentinel: The power of XDR – Stay ahead of the curve
20:29
Internet of Things and the Risk for Cybersecurity
XDRAIV
Internet of Things and the Risk for Cybersecurity
3:30
LogSentinel SIEM for MSSPS: Key MDR / MSSP Benefits
XDRAIV
LogSentinel SIEM for MSSPS: Key MDR / MSSP Benefits
3:35
Case Study: Outsider Attacks - Before and After LogSentinel SIEM
XDRAIV
Case Study: Outsider Attacks - Before and After LogSentinel SIEM
1:25
Case Study: Insider Attacks Before and After LogSentinel SIEM
XDRAIV
Case Study: Insider Attacks Before and After LogSentinel SIEM
1:34
LogSentinel SIEM Workshop: Dashboard, Threat Detection, Integrations
XDRAIV
LogSentinel SIEM Workshop: Dashboard, Threat Detection, Integrations
41:40
LogSentinel Webinar: Security Monitoring Beyond Logs
XDRAIV
LogSentinel Webinar: Security Monitoring Beyond Logs
20:54
LogSentinel SIEM at a Glance
XDRAIV
LogSentinel SIEM at a Glance
11:38
LogSentinel SIEM Case Study: Financial Sector
XDRAIV
LogSentinel SIEM Case Study: Financial Sector
2:15
How to Detect SAP Threats in Real-Time with LogSentinel SIEM?
XDRAIV
How to Detect SAP Threats in Real-Time with LogSentinel SIEM?
1:06
What Is An Audit Trail and Why Is It Important?
XDRAIV
What Is An Audit Trail and Why Is It Important?
4:01
LogSentinel SIEM Deployment Models
XDRAIV
LogSentinel SIEM Deployment Models
1:41
LogSentinel Threat Detection Capabilities
XDRAIV
LogSentinel Threat Detection Capabilities
4:17
Detecting Security Threats: How to Set up Alerts and Prevent Threats?
XDRAIV
Detecting Security Threats: How to Set up Alerts and Prevent Threats?
10:22
Kaseya Ransomware Attack: How Did It Affect the MSSPs And What To Do To Prevent The Risk?
XDRAIV
Kaseya Ransomware Attack: How Did It Affect the MSSPs And What To Do To Prevent The Risk?
7:26
Ransomware Attacks in 2021 And How To Prevent Them
XDRAIV
Ransomware Attacks in 2021 And How To Prevent Them
12:05
TeamViewer Security Risks and How To Avoid Them
XDRAIV
TeamViewer Security Risks and How To Avoid Them
5:13
How to Stop Insider Data Theft And Protect Privileged Access Management (PAM) Using SIEM?
XDRAIV
How to Stop Insider Data Theft And Protect Privileged Access Management (PAM) Using SIEM?
3:19
Using LogSentinel SIEM for Active Directory Security Monitoring
XDRAIV
Using LogSentinel SIEM for Active Directory Security Monitoring
3:46
GCP Security Monitoring Using LogSentinel SIEM | Cloud Security and Compliance
XDRAIV
GCP Security Monitoring Using LogSentinel SIEM | Cloud Security and Compliance
5:59
Website Integrity Monitoring using LogSentinel SIEM | Formjacking Detection & Data Breach Prevention
XDRAIV
Website Integrity Monitoring using LogSentinel SIEM | Formjacking Detection & Data Breach Prevention
4:14
LogSentinel  SIEM Implementation Guide | SIEM Integration Made Easy
XDRAIV
LogSentinel SIEM Implementation Guide | SIEM Integration Made Easy
2:17