Cribl, Exabeam Partner on Threat Detection, Investigation, and ResponseCribl, Exabeam Partner on Threat Detection, Investigation, and Response
In this Dark Reading News Desk segment, Cribl's Abby Strong and Exabeam's Chris Cesio discuss how their companies work together to detect and respond to threats.
Abby Strong of Cribl and Chris Cesio of Exabeam talk about their companies’ recent partnership designed to boost threat detection, and to give enterprises more control over their data and mitigate risk. The partnership is intended to accelerate security information event management (SIEM) deployments, and they discuss how their deal can help. Strong and Cesio also offer a real-world example of how their partnership brings all these benefits to life.
About the Speakers: Abby Strong leads customer experience and marketing at Cribl. She has spent over 20 years at high velocity tech companies, connecting people, ideas, and technology together to create business-changing outcomes. Her technical background gives her a deep understanding of how to passionately market across varied audiences.
Chris Cesio is Chief Revenue Officer at Exabeam where he leads the worldwide sales organization and is responsible for aligning all revenue-generating departments. With more than 20 years of experience in sales and channel management, Cesio is a veteran cybersecurity sales leader in Silicon Valley.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks