Velikost videa: 1280 X 720853 X 480640 X 360
Zobrazit ovladače přehrávání
Automatické přehrávání
Přehrát
This is so cool :o Currently, a cybersecurity student, and I just have to say this looks like an incredible SIEM tool.
this tool does pretty much everything. you do not need certification to work as a cybersecurity analyst. a degree will do it!
Thanks for sharing mate !
Oh my god . Good explanation
Nice video.
Great video however one thing shouldn't the case name be IRC Traffic into china rather then IRC traffic from China as its outbound connection.
So awesome you guys.
Help me no?
@@wesleyland3373 what ya need help with?
Drill Down. Align.
this is great
this is cool ... much better than our boring excel
Logrhythm is to Excel what Viagra is to a blue M&M dude :D
The Threat Activity Map has been in Splunk for years. You probably needed to lead with why this is better than your competitors.... The first few minutes was taken up by explaining that it was 'live traffic'.
This is so cool :o Currently, a cybersecurity student, and I just have to say this looks like an incredible SIEM tool.
this tool does pretty much everything. you do not need certification to work as a cybersecurity analyst. a degree will do it!
Thanks for sharing mate !
Oh my god . Good explanation
Nice video.
Great video however one thing shouldn't the case name be IRC Traffic into china rather then IRC traffic from China as its outbound connection.
So awesome you guys.
Help me no?
@@wesleyland3373 what ya need help with?
Drill Down. Align.
this is great
this is cool ... much better than our boring excel
Logrhythm is to Excel what Viagra is to a blue M&M dude :D
The Threat Activity Map has been in Splunk for years. You probably needed to lead with why this is better than your competitors.... The first few minutes was taken up by explaining that it was 'live traffic'.