Next stop in the Summer of JupiterOne — Cisco Live! and Splunk .conf22

by

Next stop in the Summer of JupiterOne — Cisco Live! and Splunk .conf22

Last week, we kicked off the Summer of JupiterOne at RSAC 2022 in San Francisco, followed by the Gartner Security & Risk Management Summit near DC. If we take the success from both shows as a sign of what's to come, we're in for an awesome summer!

This week, we packed our green pants and sunglasses and headed over to Las Vegas for Cisco Live! and Splunk .conf22 to spend quality time with our partners, exhibit our platform, and meet with existing and future JupiterOne customers.

 

Live from Las Vegas, it's Cisco Live! 

At Cisco Live!, the team showcased the latest additions to the JupiterOne platform, including Critical Assets, which helps security teams easily identify, analyze, and secure their most important cyber assets. They also gave a sneak preview of our new Insights dashboards for Incident Response which can be used to immediately answer any security investigation and response question for your cloud workloads. (We'll talk more about these in an upcoming blog post, so stay tuned!)

On Monday night, JupiterOne and Cisco Secure hosted a happy hour at the Delano Hotel's Franklin Lounge. The place was packed and attendees enjoyed a double-shot of CAASM talk — in the form of Cisco Secure Cloud Insights and JupiterOne — along with their favorite beverage. 


image4
image5

Orbiting the Splunkverse at .conf22 

While in Vegas, the JupiterOne team also attended .conf22 and added its green flair to Splunk's coral, orange, and magenta color palette. The team hosted a booth at the event's source=*Pavilion expo hall to showcase our new JupiterOne Add-On for Splunk and the JupiterOne App for Splunk.  They helped answer questions around adding JupiterOne as a step in a Splunk SOAR playbook.



image6
image1

Our Product Manager for Integrations, Sam Andrus, and Director of Solutions Architecture, Akash Ganapathi, jointly delivered a technical presentation on how organizations can use Splunk and JupiterOne to shorten the investigation of threats against cloud-native apps. If you missed this presentation, word on the street is that the content may be available on Splunk's .conf22 website sometime in the fall. (Or you can just reach out to us and we'll show you a demo of the JupiterOne and Splunk integration — your call!)

Later in the week, Akash presented on why breaches still occur and what security leaders have missed all along to a standing-room-only audience at the .conf22 Theater. The gist? You need to go back to the beginning of your security strategy, and make sure you have full visibility and understanding of every single "thing" that lives in your infrastructure — your cyber assets. Without this depth and breadth of visibility, your attack surface will continue to expand unbeknownst to you, leaving your enterprise exposed to security breaches. But, guess what? That's exactly the type of visibility you get with the JupiterOne platform.  

 

image3

 

So, what's next? Lucky for us, our green pants travel well. Look for the JupiterOne team again on our next Summer of JupiterOne stop, coming soon! 

Ale Espinosa
Ale Espinosa

Ale is JupiterOne’s VP of Product Marketing and Partnerships. With over 20 years of experience in high-tech marketing, including a decade in cybersecurity, Ale has navigated the alphabet soup of infosec acronyms throughout her career, including EDR/XDR, DFIR, SIEM, UEBA, SOAR, AI/ML, and now, CAASM.

Keep Reading

Introducing Continuous Controls Monitoring (CCM) | JupiterOne
November 7, 2024
Blog
Introducing Continuous Controls Monitoring (CCM)

CCM delivers real-time visibility, proactive risk management, and streamlined compliance for security.

Now Available: JupiterOne’s Public Postman Workspace | JupiterOne
October 31, 2024
Blog
Now Available: JupiterOne’s Public Postman Workspace

Explore JupiterOne’s Public Postman Workspace to streamline your workflows and enhance your security operations.

Prioritizing Exploitable Vulnerabilities to Protect Your Business Critical Assets | JupiterOne
October 16, 2024
Blog
Prioritizing Exploitable Vulnerabilities to Protect Your Business Critical Assets

Vulnerability scanners flood teams with alerts, but CTEM helps prioritize based on exploitability and business impact, ensuring focus on the most critical threats.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.