For decades, security teams have relied on data connectors that vendors provide and often purchase a vendor based on their connector coverage. This is an outdated log management method where security teams must ingest the same data sets into different point products to derive insights. With the rise in popularity of security data lakes, security teams are taking advantage of data infrastructure and tools that do not require analysts to build their own data pipelines or rely on API connectors. Furthermore, analysts can ingest data into their security data lake once and leverage it for various use cases – reducing cost and data movement. Security leaders are also excited to own their data pipelines without extensive data engineering work.
Join us in this power-packed discussion to learn:
- Popular patterns of log ingestion and transformation for your security data lake
- How to ingest stateless and stateful data into Snowflake with ease
- How to leverage the power of the Snowflake Data Cloud for vulnerability and risk reporting
Speakers
KAM AMIR
Director of Technical Alliances
Cribl
KAUSHIK DEVIREDDY
Product Manager
Dassana
KELLY HUANG
Product Marketing Manager
Snowflake
RAVI KUMAR
Partner Sales Engineer
Snowflake