FEATURED EPISODE:
How to Quickly Identify Suspicious Network Behavior With Intuitive Dashboards

February 18, 2020
Log and event data are a boundless and valuable resource for identifying suspicious network activity and stopping potential breaches. However, analyzing lines and lines of text-based data can make this resource more trouble than it's worth. In this video, we'll explore the different ways you can customize log data in an easy-to-understand and visual dashboard in Security Event Manager to help turn it into something you can act on.
Top Comments
Refresh the page. Unfortunately, this went out a day early because I am incapable of reading a calendar. :-)
Much better now! I totally agree SEM is much better with the HTML5 dashboard too!
I agree jeremymayfield... much better now in HTML5... I'm already thinking about figuring out using the html pieces and showing them in Orion. Did you ever get the root password for your appliance?
…