FireEye

FireEye

video on demand

Collection of useful video content related to security

From one phishing email to a serious incident? The reality of recent phishing emails and their countermeasures Duration: 23 minutes
video on demand
"Phishing emails" aimed at stealing authentication information by impersonating a certain person or brand are mainly attacks using URLs. I know there are a lot of things. In this video, we analyze recent trends based on statistical information and actual damage cases related to phishing emails, and introduce countermeasure solutions.
[With free trial information! ] What are the best practices to avoid Emotet attacks?
- Visualize threats with "FireEye Email Security"! Countering the latest email attacks
video on demand
Most cyber crimes are said to start with emails. Although companies have introduced e-mail security products and taken countermeasures, the current situation is that attackers are also trying to infiltrate using all possible means. In particular, the malware "Emotet", which has been wreaking havoc recently, constantly changes its modus operandi and forms, and continues to evolve to evade security measures. As a result, many companies rely on the IT literacy of their employees, falling into an extremely individualized state. This video explains the effectiveness of "FireEye Email Security Cloud Edition" against the latest threats based on specific detection information. If you are worried about the latest email threats such as Emotet, or if you are worried about what specific measures you should take, please take a look at this video.
Best practices for security operations based on Macnica own research Playing time: 49 minutes
video on demand
The burden on the security operation site tends to increase in response to recent sophisticated and diversified cyber attacks, and we are searching for the optimal operation method for our company on a daily basis. In this session, we will explain a series of operation flow from detection to response using SIEM and SOAR based on the issues in security operation obtained from our own research.
[Understand in 30 minutes! ] Improve the visibility of attackers' lateral expansion activities while reducing investment costs! Play time: 25 minutes
video on demand
Due to the increasing sophistication of cyber-attacks, we have taken countermeasures with multi-layered defense, but now it has become commonplace to be invaded. After infiltrating a network, today's sophisticated attacks remain hidden for long periods of time, performing covert reconnaissance and stealing valuable information. Therefore, it is important to be able to detect the activity as soon as possible after an intrusion and shorten the time to respond. Isn't there a lot of companies that feel the limit of visualization?
Office 365 introduction (consideration) company must-see!
Cloud email security measures that should be implemented now Playing time: 23 minutes
video on demand
Many cyber crimes are said to start with emails. Although companies have introduced email security products and are taking countermeasures, attackers are still trying to infiltrate their systems using all sorts of means. In particular, the number of companies using Office365 has increased significantly, and simultaneous attacks are being carried out against multiple targets.
Future Security Operation Issues and Practical Solution Approaches (Video) Duration: 31 minutes
video on demand
SOAR (Security Orchestration, Automation and Response) is expected to be a technology that solves problems from the perspective of "improving operational efficiency." However, in order to utilize it, it is important to set goals for introduction and make appropriate preparations. In this session, we will explain the issues and expected effects in introducing SOAR.
What is the latest framework for security operations that MSS operators talk about with limited human resources? Play time: 35 minutes
video on demand
While it is said that there is a shortage of IT human resources, it is necessary to consider the expertise, skills, and security required of security personnel, such as incident response to respond to increasingly sophisticated attacks and security countermeasure planning suitable for work style reform measures. The scope is expanding. We will use a framework to visualize whether the daily work and operations performed by the person in charge are the security operations that are currently required, and explain the direction of how to address the shortfalls.
I tried security automation Playing time: 20 minutes
video on demand
Cyber threats have become extremely sophisticated, increasing the burden and responsibility of security operators. In addition, the shortage of security engineers and IT personnel and the lack of skills are becoming more serious. SOAR (Security Orchestration, Automation and Response) is expected to be a technology that can solve this problem from the perspective of "improving operational efficiency." However, in order to utilize it, it is important to set goals for introduction and make appropriate preparations. In this session, we will explain the issues and expected effects in introducing SOAR.
What is the latest technology utilization service in the security operation site? Play time: 15 minutes
video on demand
Now that the shortage of security personnel is becoming more serious, external and internal threats are still increasing, and more advanced security operations are required with a limited number of people. Under such circumstances, we organized points such as the issues required in the security operation site, the adverse effects of such issues, and the functions required for future security operations, and by utilizing SOAR products provided by FireEye, I will explain how we can make operations more efficient.
FireEye Update Webinar 2020
- About our support for replacement Playback time: 8 minutes
- FireEye product replacement simple flow ~ NX, EX, CM version ~ Playing time: 8 minutes
video on demand
Some customers using FireEye products are in a situation where detection omissions occur because the OS is not updated and new functions cannot be used.
Also, recently, in order to utilize the newly implemented functions, we have received many questions from our support regarding how to select a successor device.
This video is intended for customers who are considering continuing to use FireEye products, and introduces how to proceed with considering a successor device and the new implementation functions of the successor device.

After completing the application, we will send you a link to the on-demand video page.

In addition, if we determine that you are a competing agency or a company that handles competing products, we may refuse to share the content. We apologize for the inconvenience.

Macnica
FireEye product manager