On-Demand Webcast with Ultimate Windows Security & Rapid7
A vast majority of logs are collected on the network level and only contain IP addresses, making it difficult to identify the corresponding asset. For most security teams, retracing user activity across assets, accounts, and cloud services requires concentrated, manual effort.
Wondering how you can improve your threat detection and response effectiveness? In this training you will learn:
- How to correlate logs from a variety of sources to determine user attribution
- How to improve your investigations so you're able to investigate more, faster
- How Rapid7 InsightIDR automatically correlates all of this data
Speakers

Eric Sun
Senior Solutions Marketing Manager
Rapid7

Randy Smith
Ultimate Windows Security