By Type:
Video
Uptycs Endpoint Security Overview

Watch this 2-minute video overview of Uptycs for endpoint security.

Learn More

Watch Now

Video
Uptycs Container Security Overview

Watch this 2-minute video overview of Uptycs for container security.

Learn More

Watch Now

Video
Uptycs SOC 2 Compliance Overview

Watch this 2-minute video overview of Uptycs for SOC 2 compliance.

Learn More

Watch Now

Video
Uptycs Cloud Security Overview

Watch this 2-minute video overview of Uptycs for cloud security.

Learn More

Watch Now

Video
Uptycs FedRAMP Compliance Overview

Watch this 2-minute video overview of Uptycs for FedRAMP compliance.

Learn More

Watch Now

Video
Uptycs PCI-DSS Compliance Overview

Watch this 2-minute video overview of Uptycs for PCI-DSS compliance.

Learn More

Watch Now

Video
Uptycs CIS Compliance Overview

Watch this 2-minute video overview of Uptycs for CIS compliance.

Learn More

Watch Now

eBook
Cloud Security Fundamentals

Here are ten questions to help guide your strategy for building a transparent and effective cloud security program.

Learn More

Download PDF

Webinar
Going on the ATT&CK versus FIN7 and Carbanak

In this 40-minute live webinar, we'll discuss how the Uptycs platform not only detects the activity of these groups but also provides the context that analysts need to quickly understand how signals are tied together.

Learn More

Watch Now

Podcast
A look at MITRE ATT&CK evaluations in their 3rd year

Uptycs’ Ganesh Pai and Amit Malik will discuss the threat groups Carbanak and FIN7 which are the focus of the upcoming 4th round MITRE ATT&CK evaluations. 

Learn More

Watch Now

Video
Extending osquery across the enterprise attack surface

Uma Reddy shares Uptycs’ vision for extending the capabilities of osquery to include cloud provider, container orchestrator, and SaaS provider data.

Learn More

Watch Now

Video
Uptycs for AWS Security

Improve your cloud security posture with continuous monitoring of your AWS configurations.

Learn More

Watch Now

Product Info Sheet
Uptycs for AWS Security

Easily answer questions about your cloud workloads with Uptycs for AWS Security.

Learn More

Download PDF

eBook
Osquery: What it is, How it Works, and How to Use it

Go deep into the features and functions of osquery, a universal endpoint agent that exposes an operating system as a relational database.

Learn More

Read Now

Podcast
Osquery with Ganesh Pai

Uptycs CEO, Ganesh Pai, was invited to join Software Engineering Daily for an interview that digests why organizations love osquery, how it's being used, and where Uptycs fits into the picture.

Learn More

Listen Now

Podcast Stream
The Future of Osquery

We connected with Paul and Matt, of the Enterprise Security Weekly podcast, to discuss osquery, the problems it solves, and what osquery might look like in the future.

Learn More

Watch Now

Video
Uptycs for MITRE ATT&CK

This four-minute video showcases how Uptycs handles MITRE ATT&CK mapping, detection visualizations, and threat scoring.

Learn More

Watch Now

Video
Compliance Reporting for CIS, SOC 2, FedRAMP, and More

See how Uptycs makes it fast and easy to gather evidence for standards such as CIS, SOC 2, FedRAMP, PCI DSS, and more.

Learn More

Watch Now

On-Demand Webinar
Automating Incident Response and Investigation with Uptycs and Cortex XSOAR

Get an understanding of the integration possibilities between Uptycs and Palo Alto Networks Cortex XSOAR.

Learn More

Watch Now

Video
Securing Remote Workers & Cloud Workloads

See how Uptycs helps keep laptops configured safely, monitor activity outside of the corporate network, and maintain visibility both for workloads running in the cloud, as well as services and users accessing those cloud environments.

Learn More

Watch Now

eBook
SIEM Optimization: How to cut costs without sacrificing endpoint security observability

This eBook lays out the challenge of SIEMs value based pricing and outlines how organizations can contain SIEM costs without sacrificing security observability.

Learn More

Read Now

On-Demand Demo
Uptycs Threat Books

Easily identify which, if any, of your systems are exhibiting behavior associated with known IOCs. By submitting different types of indicators, such as file hashes or IP addresses, you can quickly generate a summary report of any findings.

Learn More

Watch Now

On-Demand Webinar
Launching an Integrated Endpoint and Server Workload Security Program

Having a source of truth that can universally collect endpoint telemetry with a single agent allows organizations to gracefully shift towards an integrated endpoint and server workload protection model.

Learn More

Watch Now

Video
How Incident Investigation works with Uptycs & osquery

Learn why osquery is popular for incident investigation, and how the Uptycs Flight Recorder is instrumental for historical recreation, even in ephemeral environments.

Learn More

Watch Now

Analyst Report
451 Research - Market Insight Report

Fernando Montenegro, Senior Analyst at 451 Research offers his view of osquery, its potential and risk in the security market.

Learn More

Download PDF

White Paper
Trifecta of Security @ Scale

Learn more about the three major components of the Uptycs Osquery-Powered Security Analytics Platform: Collection, Aggregation and Analysis.

Learn More

Read Now

On-Demand Webinar
A Modern Approach to CSIRT Analytics

Join SANS Analyst, Dave Shackleford and Uptycs CTO, Milan Shah as they explore the new ways CSIRT teams are using osquery & Uptycs to provide a comprehensive, high-fidelity data set for incident investigation and more.

Learn More

Register Now

Video
8 macOS Security Best Practices

This 6 minute video explores 8 macOS security best practices, how to configure them properly, and how Uptycs works to monitor for compliance across your entire Mac fleet.

Learn More

Watch Now

Case Study
FedRAMP Compliance for Linux

This major SaaS-based customer relationship management services provider achieved FedRAMP certification within a three-month window using Uptycs.

Learn More

Read Now

Product Info Sheet
Uptycs for File Integrity Monitoring (FIM)

A highly scalable way to detect and reconcile changes to files across macOS, Linux, and Windows. FIM is offered as a precisely configurable module of the Uptycs Osquery-Powered Security Analytics Platform.

Learn More

Download PDF

Product Info Sheet
Uptycs for Audit & Compliance

Take the headaches and manual work out of compliance reporting and audit prep with ready-to-use, out-of-the-box reports that automate and dramatically improve the speed of evidence gathering.

Learn More

Download PDF

Video
Uptycs File Integrity Monitoring (FIM)

Explore how Uptycs FIM can be used to monitor and investigate critical file changes across macOS, Linux, and Windows environments; controls that are required for PCI and other compliance standards.

Learn More

Watch Now

Product Info Sheet
Uptycs for Docker Containers

Uptycs is a host based monitoring solution that enables complete visibility into what containers are running, where, and which processes.

Learn More

Download PDF

On-Demand Demo
Uptycs 15-Minute Demo: Incident Investigation

Check out this 15-minute Demo of Uptycs for Incident Investigation. We'll walk through a scenario from detection to triage, plus real-time and historical investigation!

Learn More

Watch Now

On-Demand Demo
Uptycs 15-Minute Demo: Linux Security at Scale

See how Uptycs is used to track software inventory, identify policy issues, monitor critical file changes, and reduce SIEM storage in Linux server environments. BONUS: Monitor Docker containers without installing anything on the container.

Learn More

Watch Now

On-Demand Webinar
osquery and macOS Security Best Practices

Learn macOS security best practices (that you can apply today!) and how to use osquery to monitor these configurations in support of a security policy.

Learn More

Watch Now

Case Study
Integrated Endpoint & Server Workload Protection

This cloud native customer deployed osquery to over 400 Mac workstations and 4,000 Linux servers for end-to-end security and visibility.

Learn More

Read Now

Product Info Sheet
Uptycs for Mac Fleet Visibility

Uptycs offers an integrated Mac malware feed, 8-point Mac Security Health Check Report, and Mac EDR Dashboard.

Learn More

Download PDF

On-Demand Webinar
Threat Hunting with Osquery

Explore using osquery to hunt for:

  • Connections to Malicious IP Addresses
  • Active Process Threats
  • Critical System File Changes
  • Malicious File Hashes
  • Brute Force Logins
Learn More

Watch Now

On-Demand Demo
Uptycs 15-Minute Demo: macOS Security Monitoring & User Driven Security

Join Principal Product Manager, Guillaume Ross, as he moves through the Uptycs interface and showcases how to use osquery telemetry to simplify macOS security, and empower device owners.

Learn More

Watch Now

On-Demand Webinar
Efficient Malware Detection with YARA and osquery

Learn to detect malware with limited resources by using two powerful open source tools: YARA & osquery.

Learn More

Watch Now

On-Demand Webinar
Malware Detection with JA3 and osquery

Register for this open source security webinar to learn how to detect malware and improve security monitoring using JA3 and osquery.

Learn More

Watch Now

Product Info Sheet
Uptycs for Detection and Investigation

Connect insights across laptops, servers, containers and cloud workloads with robust threat detection and investigation capabilities including MITRE ATT&CK mapping, composite threat scores and historical state recreation for ephemeral assets.

Learn More

Download PDF

On-Demand Webinar
Breach > ATT&CK > Osquery

We'll look at detailed reports from real breaches and map them to the MITRE ATT&CK framework. Then, we'll see how we can monitor our systems with the open-source and cross-platform tool Osquery in order to detect such breaches on Windows, Mac, and Linux.

Learn More

Watch Now

Case Study
Linux Security at Scale

This is an example of osquery being used to achieve Linux server security in a large, 100,000+ server deployment in a FinTech organization.

Learn More

Read Now

On-Demand Demo
Uptycs 15-Minute Overview

Spend a few minutes and get a glance of Uptycs- all the way from deployment to detection and beyond!

Learn More

Watch Now

No results found