Last Day: Get a 10.2" iPad (32 G), Galaxy Tab A, or Take $250 Off with OnDemand Training

Sponsorship Opportunities: WhatWorks

Led by SANS Director of Emerging Security Trends John Pescatore, the SANS WhatWorks program allows your end-user to give a testimonial on their selection, deployment and experience of your product for their organization. Having a valid assessment of your product and a success story will position your brand to the SANS community as a trusted leader in the cybersecurity industry.

What's Included:

  • Interview by John Pescatore with your end-user/customer
  • Branded written case study
  • Q&A with the end-user in a live WhatWorks webcast
  • Promotions in weekly SANS Webcast email
  • Leads from all opt-in listeners to live and archived webcasts (minimum guarantee 200 leads with no cap)

John Pescatore has over 35 years of experience in computer, network and information security. John began his career at the National Security Agency, where he designed secure voice systems, and the United States Secret Service, where he developed secure communications and surveillance systems. He holds a BSEE from the University of Connecticut and is an NSA Certified Cryptologic Engineer.

View our recent SANS WhatWorks case studies:

Case Studies
Title Vendor Date
WhatWorks in Maintaining Deep Security and Enabling Detection and Response Across Data Center and Cloud Apps ExtraHop November 24, 2020
What Works in Secure Remote Access: Giving Users Seamless and Secure Connectivity with Always-On Visibility and Management Pulse Secure September 24, 2020
WhatWorks in Migrating to the Cloud while Maintaining Security and Network Performance (with a remote workforce) ExtraHop April 29, 2020
WhatWorks in High Security Alternatives for Remote Collaboration and Communications HighSide April 23, 2020
WhatWorks in SOC/NOC Integration: Improving Time to Detect, Respond and Contain with ExtraHop Reveal(x) ExtraHop November 7, 2019
WhatWorks in Application Security: How to Detect and Remediate Application Vulnerabilities and Block Attacks with Contrast Security Contrast Security December 12, 2018
What Works in Endpoint Security: Surviving Advanced Targeted Attacks by Augmenting (or Replacing) Legacy AV with enSilo enSilo October 02, 2018
What Works in Certificate and Key Management: Enabling Secure Digital Business Using Venafi's Trust Protection Platform Venafi September 26, 2018
What Works in Visibility, Access Control and IOT Security - Pulse Secure NAC Outcomes at Energy Provider Pulse Secure June 14, 2018
What Works in Situational Awareness and Visibility: Reducing Time to Detect and Enhancing Business Outcomes with Splunk Splunk May 15, 2017
Using Cisco Stealthwatch to Increase Security By Enhancing Critical Security Control Performance Cisco January 9, 2017
A Credit Union Increased Network Security With Network Access Control Based on Great Bay Software Beacon Great Bay Software August 4, 2016
What Works in Threat Prevention: Detecting and Stopping Attacks More Accurately and Quickly with ThreatSTOP ThreatSTOP May 16, 2016
Inspecting Encrypted Traffic with the Blue Coat SSL Visibility Appliance Blue Coat Mar. 23, 2016
Using WhiteHat Sentinel Dynamic and Static Solutions to Increase Application Security Before and After Production Deployment WhiteHat Security Oct. 9, 2015
Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 Nexpose Rapid7 Sept. 15, 2015
Using Palo Alto Networks Next Generation Firewalls to Increase Visibility into Threats and Reduce Threat Risks Palo Alto Networks May 19, 2015
Blocking Complex Malware Threats at Boston Financial Invincea Mar. 27, 2015
Increasing Security and Reducing Costs by Managing Administrator Rights with Process-based Privilege Management Viewfinity Mar. 27, 2015
Reaping the Benefits of Continuous Monitoring and Mitigation at Pioneer Investments ForeScout Mar. 27, 2015
How VCU uses FireEye for Advanced Threat Detection and Prevention FireEye Mar. 10, 2015
Increasing Vulnerability Management Effectiveness While Reducing Cost Tenable Feb. 19, 2015