Cybersecurity Architecture: Detection

แชร์
ฝัง
  • เผยแพร่เมื่อ 15 พ.ย. 2024
  • IBM Security QRadar EDR : ibm.biz/BdyQeU
    IBM Security X-Force Threat Intelligence Index 2023: ibm.biz/BdyQbx
    Security is about prevention, detection, and response. In this installment, IBM Distinguished Engineer and adjunct professor Jeff Crume explains the tools that are key to detecting an attack as soon as possible. He also clarifies the often-confused distinction between SIEM and XDR systems by delving into their historical usage, noting they're not either/or choices, but complementary tools that experienced cybersecurity analysts use with the help of federated search capabilities.
    Get started for free on IBM Cloud → ibm.biz/ibm-cl...
    Subscribe to see more videos like this in the future → ibm.biz/subscri...
    #AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #detection

ความคิดเห็น • 47

  • @jon34153
    @jon34153 9 หลายเดือนก่อน +8

    I can imagine this series becoming a classic. Absolutely great content!

    • @jeffcrume
      @jeffcrume 8 หลายเดือนก่อน +2

      Thanks so much!

  • @melbouananimelbouanani7561
    @melbouananimelbouanani7561 ปีที่แล้ว +6

    If I could hit the like button 1 million times I would do it, the content is extraordinary, words are not enough to thank you.
    Big thanks IBM

    • @IBMTechnology
      @IBMTechnology  ปีที่แล้ว

      Wow, thank you!

    • @jeffcrume
      @jeffcrume ปีที่แล้ว +1

      @melbouananimelbouanani7561 thanks so much for the enthusiastic complements!!!

  • @NK-iw6rq
    @NK-iw6rq หลายเดือนก่อน +2

    Thank you to Jeff and the IBM Team. These videos helped me so much in preparing for interview questions i've been asked. Jeff's students in-person are lucky to be able to learn from such a brilliant and passionate mind in this field.

    • @jeffcrume
      @jeffcrume 5 วันที่ผ่านมา

      You are so very kind to say so!

  • @naijagemstones6604
    @naijagemstones6604 5 หลายเดือนก่อน +5

    Jeff you are too much. Pls we need more series on deferent areas. Thanks once again. Greetings from Africa Nigeria

  • @digitalcloudtechnology
    @digitalcloudtechnology 2 หลายเดือนก่อน +1

    So educative with clarity of expression.

  • @venkat270484
    @venkat270484 ปีที่แล้ว +6

    SIEM and XDR was excellent concept, Thanks for your videos

    • @jeffcrume
      @jeffcrume ปีที่แล้ว

      You’re very welcome!

  • @PHElectronics
    @PHElectronics ปีที่แล้ว +6

    I have been following this series from no 1 thanks for making this videos

    • @jeffcrume
      @jeffcrume ปีที่แล้ว

      Thanks so much for continuing to watch!

  • @srivasala4080
    @srivasala4080 ปีที่แล้ว +7

    maybe my bad. I was developer in a security product company for 15 yrs and could never learn to such a level of extent and detail on all the products, reasonings, what-why-how and contextualities, well stitched together. Thanks again Jeff.
    At the end of the series, if you can light up the direction to proceed in the path towards continous learning, in this area, I will be greatful.

  • @KotiReddyaluri
    @KotiReddyaluri 7 หลายเดือนก่อน +1

    Excellent Series. 🙏🙏🙏Thank you for the videos.

    • @jeffcrume
      @jeffcrume 6 หลายเดือนก่อน

      Thanks for watching!

  • @jemimaho.4827
    @jemimaho.4827 3 หลายเดือนก่อน +2

    I've been liking comments so far because there are already so many comments that mention just how awesome this series is. Now, I've absolutely gotta drop mine. Thank you so much for this series (@ Jeff and IBM). I love how it puts everything into perspective; it's helped me see how topics I previously touched on in isolation fit into the larger security picture. I will come back to rewatch the entire series in a few months.

    • @jeffcrume
      @jeffcrume 3 หลายเดือนก่อน +2

      I’m so glad to hear that you enjoyed it!

  • @carol-lo
    @carol-lo ปีที่แล้ว +6

    Hoping to have more lessons from Jeff. Especially related to emerging technology risk.

  • @toenytv7946
    @toenytv7946 ปีที่แล้ว +6

    Wow that was a mouthful of security. Nice!

  • @jasgarcha4783
    @jasgarcha4783 ปีที่แล้ว +3

    Another great video in the series Jeff. Thank you 👍❤.

    • @jeffcrume
      @jeffcrume ปีที่แล้ว

      Thanks so much for saying so!

  • @theintjengineer
    @theintjengineer ปีที่แล้ว +6

    Jeff, I already commented on LinkedIn saying I wish you'd extend the series with more 100 videos, but just one question: should that not be possible, could you please start another series?😅
    Thank you very much!
    Greetings from Germany.
    #bestinstructor

    • @53darkknight53
      @53darkknight53 11 หลายเดือนก่อน

      I recommend IBM Cybersecurity Analyst course in Coursera, it's not this high quality but much more detailed on every subject + you get a certificate. You can also check google's Cybersecurity course in the same place which is very similar but better on quality and more recent

  • @jann9507
    @jann9507 6 หลายเดือนก่อน +2

    This was fantastic!
    The presenter did not try to push a vendor specific product or soft sell anything. Kudos !

    • @jeffcrume
      @jeffcrume 6 หลายเดือนก่อน +1

      Not easy for a guy that works in software sales but thank you for noticing!

  • @IngleseAngel
    @IngleseAngel ปีที่แล้ว +2

    difficult to pronounce SIEM and Jeff told me to call it whatever I like, therefore namining it Jonathan :)

    • @jeffcrume
      @jeffcrume ปีที่แล้ว +2

      “Jonathan” is a much better name! 😂

  • @LucyLucy66859
    @LucyLucy66859 5 หลายเดือนก่อน +1

    Awesome! The best series I’ve seen in cybersecurity❤

    • @jeffcrume
      @jeffcrume 4 หลายเดือนก่อน

      Thanks so much!

    • @adeleyejaphet8334
      @adeleyejaphet8334 2 หลายเดือนก่อน

      Very powerful

  • @velo1337
    @velo1337 ปีที่แล้ว +2

    thx for educating us, hope for more courses

  • @DearSX
    @DearSX 8 หลายเดือนก่อน +1

    Loving this series, thank you!

    • @jeffcrume
      @jeffcrume 7 หลายเดือนก่อน

      Thanks for watching!

  • @CharlieDuckQuack
    @CharlieDuckQuack 6 หลายเดือนก่อน +1

    This is brilliant. Thanks Jeff and a quick query: How do I start building my skillset in SIEM as a novice?

    • @jeffcrume
      @jeffcrume 4 หลายเดือนก่อน +1

      Glad you liked it. There’s really no substitute for hands-on training/experience. There are a number of courses that teach these skills including a deeper dive from Coursera

  • @shamielbhikha4756
    @shamielbhikha4756 ปีที่แล้ว +2

    This is awesome

  • @emc3000
    @emc3000 ปีที่แล้ว +3

    Ooooof 200 days is nuts.

  • @Pem7
    @Pem7 7 หลายเดือนก่อน +1

    Love it 🤞🏾

  • @JohnM-i9v
    @JohnM-i9v 8 หลายเดือนก่อน +1

    This might be a dumb question but would NDR be used here as well?

    • @jeffcrume
      @jeffcrume 8 หลายเดือนก่อน +1

      Definitely. It could also be considered part of network security so it just depends on where you want to cover it. Same for EDR.

    • @dougchampion8084
      @dougchampion8084 หลายเดือนก่อน

      NDR logs to the SIEM

  • @tyrojames9937
    @tyrojames9937 ปีที่แล้ว +2

    😎👍🏾

  • @MalvinderKaur-e7x
    @MalvinderKaur-e7x 6 หลายเดือนก่อน

    I am hooked on to tech no doubt about that, it's that adversity thrust on my head that made my mind study it and turns out that it is not that vast only the brains writing those programs TOLD to write grasp that then in their own complicated language which is easy for them they create that program to be written, but first comes the creative idea what is the problem, without understanding the problem there can never be solutions, till today almost all systems got broken into, only now alarm so called systems got going yet alarm is machine can be silenced so? A program I swear would make even the most cunning crafty hacker chew his streaky chaddis joke coming up on this

  • @salonsospain
    @salonsospain 3 หลายเดือนก่อน

    960

  • @MalvinderKaur-e7x
    @MalvinderKaur-e7x 6 หลายเดือนก่อน

    But those are for large organizations like govt or corporations companies, what about normal company consumers, are your packages for individuals coming equipped with security and I mean every gadget phones, pads,😊laptops, no of course not why not? It should have been done even if iOS operating systems bragged they are unhackable, they were broken through that means those firewalls are operating systems cannot safe guard, now in this realm most secure firewall system can be written, and installed which hacker will chew his/ her chaddis trying to break it, and I do have idea how it can be, how that particular programs of safety written then sold worldwide😊
    For once and all that program sold to all everyday use gadgets to consumer and every entry import of your streaming websites,every entry port of servers

  • @salonsospain
    @salonsospain 3 หลายเดือนก่อน

    709