|
Cloud Consumption
|
1.4: Service Health and Consumption |
10 |
|
|
The map, the map!!
|
1.3: Outcomes Navigator |
20 |
|
|
The map, the map!
|
1.3: Outcomes Navigator |
20 |
|
|
Posterize your Posture
|
1.3: Outcomes Navigator |
16 |
|
|
Improving the foundations
|
1.3: Outcomes Navigator |
12 |
|
|
Can you hear me now?
|
1.3: Outcomes Navigator |
14 |
|
|
Case in point
|
1.2: Automation Management |
30 |
|
|
Embedding the attack 2
|
1.1: Threat Center |
20 |
|
|
Embedding the attack 1
|
1.1: Threat Center |
20 |
|
|
How did it go so wrong
|
1.1: Threat Center |
20 |
|
|
Attack of the tooling
|
1.1: Threat Center |
20 |
|
|
Se(r)ver(e) implications
|
1.1: Threat Center |
20 |
|
|
What went wrong?
|
1.1: Threat Center |
20 |
|
|
Sea of Threats! 2
|
1.1: Threat Center |
20 |
|
|
Sea of Threats! 1
|
1.1: Threat Center |
20 |
|
|
Recent Releases
|
0.3: Exabeam Docs |
10 |
|
|
38 - Threat Detection Incident Response: Threat Center XII
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
7 |
|
|
37 - Threat Detection Incident Response: Threat Center XI
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
20 |
|
|
36 - Threat Detection Incident Response: Threat Center X
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
35 - Threat Detection Incident Response: Threat Center IX
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
34 - Threat Detection Incident Response: Threat Center VIII
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
33 - Threat Detection Incident Response: Threat Center VII
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
32 - Platform Insights: Outcomes Navigator III
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
31 - Platform Insights: Outcomes Navigator II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
30 - Platform Insights: Outcomes Navigator I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
29 - Threat Detection Incident Response: Automation Management III
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
28 - Threat Detection Incident Response: Automation Management II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
27 - Threat Detection Incident Response: Automation Management I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
20 |
|
|
26 - Threat Detection Incident Response: Search Natural Language II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
30 |
|
|
25 - Threat Detection Incident Response: Search Natural Language I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
40 |
|
|
24 - Threat Detection Incident Response: Search Basic
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
35 |
|
|
23 - Threat Detection Incident Response: Search Timeline II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
20 |
|
|
22 - Threat Detection Incident Response: Search Timeline I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
25 |
|
|
21 - Threat Detection Incident Response: Threat Center VI
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
20 - Threat Detection Incident Response: Threat Center V
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
19 - Threat Detection Incident Response: Threat Center IV
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
18 - Threat Detection Incident Response: Threat Center III
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
17 - Threat Detection Incident Response: Threat Center II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
16 - Threat Detection Incident Response: Threat Center I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
15 - Security Management: Threat Detection Management VI
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
14 - Security Management: Threat Detection Management V
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
13 - Security Management: Threat Detection Management IV
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
20 |
|
|
12 - Security Management: Threat Detection Management III
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
25 |
|
|
11 - Security Management: Threat Detection Management II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
10 - Security Management: Threat Detection Management I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
25 |
|
|
9 - Attack Surface Insights: Devices
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
8 - Attack Surface Insights: Users
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
7 - Context Management II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
6 - Context Management I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
5 - Log Stream: Enrichment
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
4 - Log Stream: Parsers II
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
15 |
|
|
3 - Log Stream: Parsers I
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
2 - Collection
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
10 |
|
|
1 - Platform Overview: Start Here!
|
0: New-Scale 101, Compromised Insider, Malicious Insider |
5 |
|