Resources

A collection of Anvilogic blogs, webinars, and solution deep dives to explore our products, use cases, and integrations.

All Resources

Category
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Event
GBI: Los Angeles, CA
Event
Gartner Security & Risk Management Summit
Event
Minneapolis Forum
Event
GBI: Toronto, Canada
Event
IANS: Dallas, TX
Blog
A Technical Guide to Automating SOC Operations with Anvilogic Blueprints

Watch

Category
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security Data Lake Implementation: Beyond the SIEM?
Webinar
On-Demand Webinar
The Tines and Anvilogic Playbook for Slick Detection-to-Response
Webinar
On-Demand Webinar
SAP’s Playbook for AI-Native Threat Detection with Anvilogic and Databricks
Webinar
On-Demand Webinar
How Leading Teams Use Sentinel + Anvilogic to Correlate More with Confidence
Webinar
On-Demand Webinar
Anvilogic for Databricks: Decoupled Detection Engineering Meets Cost-Effective Lakehouse Power
Webinar
On-Demand Webinar
The State of Detection Engineering in 2025: Key Insights from a SANS & Anvilogic Survey Report
Webinar

Podcast

Build the Right Detections: An Intro to Threat Modeling
A Day in the Life of a Detection Engineer
Hands-on Technical Workshop: File Identification, Encoding, and Encryption for Beginners
From Practitioner to Security Leader: All Things Detection Engineering
Threat Hunting 101: Lateral Movements in Windows Networks
Part 3 | Time for Your Check-up: Leverage AI to Monitor the Health of Your Security Environment

Read

Category
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Blog
Anvilogic Sweeps 2023 Cybersecurity Excellence Awards with 3 Golds
Blog
Forge Insight: A Recap on Cyber Threats From the Russia & Ukraine Conflict
On-Demand Webinar
How PayPal Defends & Detects Across the Threat Landscape
Webinar
Blog
Don't Get Left Behind: A Savvy Solution to the SOC's Staffing Gap Woes
Blog
Meet the Logician: Jackie Gonzalez
Blog
10 Reasons to Automate Your Threat Detection Lifecycle

Build Detections You Want, Where You Want