Webinar - Is your deep packet inspection testing deep enough


Published on

Watch this short security webinar to learn more about the
the impact of BYOD (bring your own device), how traffic inspection is more than just the application and listen to
real word case study examples such as how datasheet performance claims stand up against the reality and how specific security protocols impact performance

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Apps are exploding – over 1 M apps just on Facebook, App Store and Android. In June Android apps are expected to exceed App Store Smartphone usage is shooting up – close to 500 M last year. According to Mobilefuture.org, by 2012 it will exceed combined sales of PC and laptops. According to ATT report, Smartphones account for 30X the bandwidth and the price increase is around 3X. Http is the new tcp. Apps are moving to the cloud and everything –from consumer to business apps and everything in between are accessed over the webAll this is putting intense pressure on all parts of the ecosystem.
  • Adware – While some forms of adware may be considered legitimate, others make unauthorized access to computer systems and greatly disrupt users.Keyloggers – Typically done in a covert manner, keyloggers track the keys struck on a keyboard and may capture passwords or credit card numbers.Ransomware – After establishing itself on a computer system, ransomware restricts access to the system and demands a ransom be paid to remove it.Rootkits – This type of malware gains privileged access to computer systems and hides itself from normal methods of detection.Spyware – Spyware observes the activities of computer users without their consent and reports it to the software's author or other entity.Trojan Horses – A Trojan Horse initially appears to perform a desirable function and then facilitates unauthorized access to the computer system.Viruses – A computer virus typically attaches itself to an executable file so it can perform malicious activities and replicate itself on other systems.Worms – A worm is a standalone piece of software that, like a virus, can perform malicious activities and replicate itself on other systems.
  • Webinar - Is your deep packet inspection testing deep enough

    1. 1. Is your Deep Packet Inspection testing ‘Deep’ enough? Ankur Chadda Product Marketing Manager PROPRIETARY AND CONFIDENTIAL
    2. 2. The Application Explosion – it never ends! PROPRIETARY AND CONFIDENTIAL
    3. 3. What are IT Departments Asking for… PROPRIETARY AND CONFIDENTIAL
    4. 4. Understanding Malware  Short for Malicious Software  Represents hostile software used to • Disrupt computer operation • Gather sensitive information • Gain access to private computer systems  Common malware types: • • • • Adware Keyloggers Ransomware Rootkits • • • • MALWARE INFECTIONS BY TYPE IN 2012 Spyware Trojan Horses Viruses Worms Source: PandaLabs Annual Report for 2012 by Panda Security PROPRIETARY AND CONFIDENTIAL
    5. 5. Malware Testing Infected host emulation Binary transfer emulation • Test security counter measures and policies for detecting spreading malware • Test inline or antivirus detection effectiveness Malware testing • Test the effectiveness and accuracy of your security under devices and policies under application load real work load PROPRIETARY AND CONFIDENTIAL
    6. 6. Summary  BYOD adds complexity with number of devices, endpoints and versions of apps on your network  Security infrastructure testing is no longer legacy firewall testing, but more involved with multiple vectors  Realistic emulation critical to understand actual impact www.spirent.com PROPRIETARY AND CONFIDENTIAL
    7. 7. To listen to the full webinar visit: http://www.spirent.com/OnDemand/Networks_and_ Applications/DPI_Testing PROPRIETARY AND CONFIDENTIAL