Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool

{elysiumsecurity}
Open Source IDS
How to use them as a powerful free
Defensive and Offensive tool
Version: 1.2w
Author: Sylvain Martinez
cyber protection & response
Classification: Public
{elysiumsecurity}
Agenda
• Introduction;
• Cyber Security Context;
• IDS Concept;
• Requirements for success;
• IDS Benefits;
• Something different…
{elysiumsecurity}
Who Am I?
https://www.elysiumsecurity.com
{elysiumsecurity}
Why Listen?
* If you already have a TAP setup
• Understand why you need an IDS;
• How everyone can get started with a free IDS;
• This dashboard in your home/company in less than 2h!*
{elysiumsecurity}
Today’s Cyber Security Risk Context
Cyber Security Risks’ probability and impact are increasing.
Their ability to disrupt companies business operation have
growing financial, reputational and legal negative consequences;
This	overall	diagram	is	copyright	Elysiumsecurity	LTD	and	can	only	be	re-used	if	the	source	is	referenced	as:	Sylvain	Martinez,	https://www.elysiumsecurity.com
Yesterday Tomorrow
100%
0%
TIME
GROWTH
Yesterday Tomorrow
100%
0%
TIME
GROWTH
Yesterday Tomorrow
100%
0%
TIME
GROWTH
{elysiumsecurity}
Cyber Security Puzzle
PREVENT DETECT RESPOND
• End Point Protection
• Policies
• DLP
• DRM
• SOC
• F/W
• IPS
• IDS • Incident Response
• Forensics
• DLP
• SIEM
• CERT
• Incident Management
{elysiumsecurity}
Importance of Detection
PREVENT DETECT RESPOND
DETECTION allows you to know there is a problem,
and that you need to do something!
{elysiumsecurity}
IDS? What IDS?
IDS
NIDS
HIDS
IPS
Signature Based
Behaviour Based
Pattern Based
Passive
Active
{elysiumsecurity}
FREE IDS
• Snort based engine;
• Suricata based engine;
• Suites of software available as VM:
- Security Onion (SO): https://securityonion.net/
- SELKS: https://www.stamus-networks.com/open-source/
• Great community is here to help;
• Authors are very active;
• Professional support available from them too;
• Various install guide available: https://www.elysiumsecurity.com/blog/Guides/post7.html
{elysiumsecurity}
cyber protection & response
DEFENSIVE
IDS
{elysiumsecurity}
Simplistic NIDS Concept
Guest	WIFI
Users Servers
DMZ
IDS
Duplicated
Traffic
Duplicated
Traffic
INTERNET
Traffic
Analysis
Signatures
Patterns/
Behaviours
Security	Alerts
Icons from VMWARE
{elysiumsecurity}
IDS Requirements for success
1. Traffic Visibility
2. Asset Inventory
3. Context
COVERAGE
TRACKING
TUNING
{elysiumsecurity}
Traffic Visibility
• TAP/Span port on key egress points
• Corporate Solutions
- Dedicated hardware
- Soft Config in most switch (Ubiquity Networks, CISCO...)
• Home Solutions:
- Netgear GS105E
- Mikrotik Router
NATting
{elysiumsecurity}
Asset Inventory
• IP/Asset inventory software
• - Network dedicated
• - Part of wider asset inventory
• Mac Address Fingerprinting
• Fixed IP
• Reserved DHCP
NATting
{elysiumsecurity}
Context
QUESTIONS
• Is	that	a	false	positive?
• Is	that	normal	behaviour?
• Is	the	end	point	targeted	critical?
• Is	this	a	configuration	issue?
• Have	we	seen	this	before?
• …
ANSWERS
• Network	Topology	knowledge;
• Asset	owner	knowledge;
• Application	owner	knowledge;
• Business	analyst	contact;
• Cyber	Security	knowledge.
• …
{elysiumsecurity}
IDS Defensive Benefits
• Alerts	you	of	Cyber	Security	attacks;
• Alerts	you	of	Cyber	Security	issues;
• Finds	vulnerable	hosts	on	your	network;
• Finds	vulnerable	applications	on	your	network;
• Monitors	network	flow	behaviours;
• Monitors	network	ports	activity;
• Monitors	network	traffic;
• Monitors	file	transfers;
• Establish	network	entity	relationships;
• …
{elysiumsecurity}
IDS Actionable Information
{elysiumsecurity}
IDS Defensive Benefits - revisited
• Alerts	you	of	Cyber	Security	attacks;
• Alerts	you	of	Cyber	Security	issues;
• Finds	vulnerable	hosts	on	your	network;
• Finds	vulnerable	applications	on	your	network;
• Monitors	network	flow	behaviours;
• Monitors	network	ports	activity;
• Monitors	network	traffic;
• Monitors	file	transfers;
• Establish	network	entity	relationships;
• …
{elysiumsecurity}
cyber protection & response
OFFENSIVE
IDS
{elysiumsecurity}
Simplistic NIDS Concept - Revisited
Guest	WIFI
Users Servers
DMZ
IDS
Duplicated
Traffic
Duplicated
Traffic
INTERNET
Traffic
Analysis
Signatures
Patterns/
Behaviours
Security	Alerts
Files
Passwords,…
Files	
Extraction
PCAP Files
PCAP Files
PCAP Files
Icons from VMWARE
{elysiumsecurity}
IDS Requirements - Offensive
1. Traffic Capture
REPLAY
&
ANALYSIS
2. Asset Inventory
3. Context
TARGETING
PRIORITISATION
{elysiumsecurity}
Traffic Capture
• Physical Access required in most cases
• TAP traffic against key targets
• Powered/Unpowered solutions
• Dummy Capture Devices:
• - Small Router;
• - Throwing Star LAN;
• Intelligent Capture Devices:
• - Raspberry Pi;
• - Hak5 Packet Squirrel.
NO IMPACT
{elysiumsecurity}
IDS Offensive Benefits
• Speed	up	Network	Traffic	Analysis;
• Identify	interesting	timelines;
• Identify	targets	of	interest;
• Identify	vulnerabilities	to	exploit;
• Extract	sensitive	information;
• Profile	users	and	applications;
• …
{elysiumsecurity}
Takeaway
• Free	IDS	available;
• Pre-configured	and	easy	to	deploy;
• Provide	good	defensive	visibility	and	alerts;
• Provide	good	offensive	capabilities;
• Instant	returned	value;
• Try	one	today!
{elysiumsecurity}
cyber protection & response
emailus@elysiumsecurity.com
THANK	YOU
https://www.elysiumsecurity.com
1 of 25

Recommended

Talk2 esc4 muscl-ids_v1_2 by
Talk2 esc4 muscl-ids_v1_2Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2Sylvain Martinez
766 views16 slides
Talk2 esc2 muscl-wifi_v1_2b by
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bSylvain Martinez
285 views25 slides
Talk1 esc3 muscl-standards and regulation_v1_1 by
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Sylvain Martinez
196 views18 slides
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica... by
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...BGA Cyber Security
2.8K views21 slides
Cisco ThreatGrid: Malware Analysis and Threat Intelligence by
Cisco ThreatGrid:  Malware Analysis and Threat IntelligenceCisco ThreatGrid:  Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat IntelligenceCisco Canada
2.2K views12 slides
Advanced threat security - Cyber Security For The Real World by
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
6.4K views22 slides

More Related Content

What's hot

Cisco Security Presentation by
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
4K views52 slides
Sourcefire Webinar - NEW GENERATION IPS by
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPSmmiznoni
3.9K views50 slides
SourceFire IPS Overview by
SourceFire IPS OverviewSourceFire IPS Overview
SourceFire IPS OverviewGuardEra Access Solutions, Inc.
8.1K views7 slides
Tomorrow Starts Here - Security Everywhere by
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
2.3K views45 slides
Talk1 esc7 muscl-dataprotection_v1_2 by
Talk1 esc7 muscl-dataprotection_v1_2Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2Sylvain Martinez
183 views15 slides
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla... by
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA Cyber Security
3.4K views48 slides

What's hot(20)

Cisco Security Presentation by Simplex
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
Simplex4K views
Sourcefire Webinar - NEW GENERATION IPS by mmiznoni
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
mmiznoni3.9K views
Tomorrow Starts Here - Security Everywhere by Cisco Canada
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Cisco Canada2.3K views
Talk1 esc7 muscl-dataprotection_v1_2 by Sylvain Martinez
Talk1 esc7 muscl-dataprotection_v1_2Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2
Sylvain Martinez183 views
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla... by BGA Cyber Security
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA Cyber Security3.4K views
Scalar Security Roadshow - Toronto Presentation by Scalar Decisions
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
Scalar Decisions1.9K views
Next Generation Security by Cisco Canada
Next Generation SecurityNext Generation Security
Next Generation Security
Cisco Canada2.5K views
Talos Insight: Threat Innovation Emerging from the Noise by Cisco Canada
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
Cisco Canada2K views
Presentation cisco cloud security strategy by xKinAnx
Presentation   cisco cloud security strategyPresentation   cisco cloud security strategy
Presentation cisco cloud security strategy
xKinAnx779 views
Cisco connect winnipeg 2018 accelerating incident response in organizations... by Cisco Canada
Cisco connect winnipeg 2018   accelerating incident response in organizations...Cisco connect winnipeg 2018   accelerating incident response in organizations...
Cisco connect winnipeg 2018 accelerating incident response in organizations...
Cisco Canada1.3K views
Software-Defined Segmentation Done Easily, Quickly and Right by SBWebinars
Software-Defined Segmentation Done Easily, Quickly and RightSoftware-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and Right
SBWebinars245 views
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution by Shah Sheikh
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
Shah Sheikh1.2K views
Using Your Network as a Sensor for Enhanced Visibility and Security by Lancope, Inc.
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
Lancope, Inc.1.5K views
Mobile Security: 2016 Wrap-Up and 2017 Predictions by Skycure
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Skycure614 views
The Four Horsemen of Mobile Security by Skycure
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
Skycure807 views
2015 ISA Calgary Show: IACS Cyber Incident Preparation by Cimation
2015 ISA Calgary Show: IACS Cyber Incident Preparation2015 ISA Calgary Show: IACS Cyber Incident Preparation
2015 ISA Calgary Show: IACS Cyber Incident Preparation
Cimation841 views
Zero Trust Run-time Kubernetes Security made easy with AccuKnox by AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
AccuKnox206 views
VIRTUAL CISO AND OTHER KEY CYBER ROLES by Sylvain Martinez
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLES
Sylvain Martinez418 views

Similar to Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool

Jak využít cloudu pro zvýšení bezpečnosti vašeho IT by
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITMarketingArrowECS_CZ
1.1K views17 slides
MT17_Building Integrated and Secure Networks with limited IT Support by
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
594 views15 slides
Chapter 5 overview by
Chapter 5 overviewChapter 5 overview
Chapter 5 overviewali raza
678 views79 slides
Logicalis Security Conference by
Logicalis Security ConferenceLogicalis Security Conference
Logicalis Security ConferencePaul Dutot IEng MIET MBCS CITP OSCP CSTM
381 views22 slides
Vdi overview by
Vdi overviewVdi overview
Vdi overviewIsa Pangestu
283 views11 slides
2021 01-27 reducing risk of ransomware webinar by
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinarAlgoSec
314 views59 slides

Similar to Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool(20)

Jak využít cloudu pro zvýšení bezpečnosti vašeho IT by MarketingArrowECS_CZ
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
MT17_Building Integrated and Secure Networks with limited IT Support by Dell EMC World
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
Dell EMC World594 views
Chapter 5 overview by ali raza
Chapter 5 overviewChapter 5 overview
Chapter 5 overview
ali raza678 views
2021 01-27 reducing risk of ransomware webinar by AlgoSec
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
AlgoSec314 views
Technology Overview - Symantec Endpoint Protection (SEP) by Iftikhar Ali Iqbal
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
Iftikhar Ali Iqbal4.5K views
Securing Beyond the Cloud Generation by Forcepoint LLC
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
Forcepoint LLC322 views
From SIEM to SA: The Path Forward by EMC
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
EMC4.4K views
Information Security by Mohit8780
Information SecurityInformation Security
Information Security
Mohit8780687 views
Starting your Career in Information Security by Ahmed Sayed-
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
Ahmed Sayed-326 views
CertainSafe MicroTokenization Technology Detailed Overview by Steven Russo
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
Steven Russo200 views
Cloud Security: Perception Vs. Reality by Internap
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Internap716 views
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע... by Hillel Kobrovski
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
Hillel Kobrovski365 views
1.3. (In)security Software by defconmoscow
1.3. (In)security Software1.3. (In)security Software
1.3. (In)security Software
defconmoscow432 views
Sharing Plant Data with Phones, Tablets and the Cloud (Englsh) by Digital Bond
Sharing Plant Data with Phones, Tablets and the Cloud (Englsh)Sharing Plant Data with Phones, Tablets and the Cloud (Englsh)
Sharing Plant Data with Phones, Tablets and the Cloud (Englsh)
Digital Bond801 views
Enterprise secure identity in the cloud with Single Sign On and Strong Authen... by GARL
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
GARL1.1K views

More from Sylvain Martinez

PROGRAMMING AND CYBER SECURITY by
PROGRAMMING AND CYBER SECURITYPROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYSylvain Martinez
234 views23 slides
INTRODUCTION TO CRYPTOGRAPHY by
INTRODUCTION TO CRYPTOGRAPHYINTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHYSylvain Martinez
1.2K views21 slides
INCIDENT RESPONSE NIST IMPLEMENTATION by
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONSylvain Martinez
5.5K views27 slides
DATA LOSS PREVENTION OVERVIEW by
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWSylvain Martinez
599 views21 slides
2019 CYBER SECURITY TRENDS REPORT REVIEW by
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEWSylvain Martinez
1.8K views18 slides
INCIDENT RESPONSE CONCEPTS by
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSSylvain Martinez
1.3K views39 slides

More from Sylvain Martinez(20)

INCIDENT RESPONSE NIST IMPLEMENTATION by Sylvain Martinez
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATION
Sylvain Martinez5.5K views
2019 CYBER SECURITY TRENDS REPORT REVIEW by Sylvain Martinez
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
Sylvain Martinez1.8K views

Recently uploaded

The Power of Heat Decarbonisation Plans in the Built Environment by
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built EnvironmentIES VE
67 views20 slides
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue by
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueShapeBlue
134 views54 slides
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... by
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...ShapeBlue
48 views17 slides
Kyo - Functional Scala 2023.pdf by
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdfFlavio W. Brasil
443 views92 slides
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates by
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesShapeBlue
178 views15 slides
Why and How CloudStack at weSystems - Stephan Bienek - weSystems by
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsShapeBlue
172 views13 slides

Recently uploaded(20)

The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE67 views
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue by ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue134 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... by ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue48 views
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates by ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue178 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems by ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue172 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson142 views
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... by ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue114 views
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue86 views
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... by ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue74 views
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely76 views
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... by ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue105 views
Business Analyst Series 2023 - Week 4 Session 7 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10110 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue by ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue75 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue68 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue113 views
State of the Union - Rohit Yadav - Apache CloudStack by ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue218 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc130 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue93 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...

Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool