SlideShare a Scribd company logo
1 of 33
Download to read offline
KNOW THE
UNKNOWN®
NIKSUN	Inc.,	CONFIDENTIAL	-	INTERNAL	USE	ONLY		
This	document	contains	confiden0al	informa0on	that	shall	be	distributed,	routed	or	made	available	only	within	NIKSUN.	
Comprehensive	Network	Monitoring	/	DPI	
NIKSUN	Inc.
  Why	does	cyber	crime	s0ll	persist,	despite	significant	
investment?	
  What	does	it	mean	to	have	truly	comprehensive	monitoring?	
  Surveillance,	Detec0on,	and	Forensics	
  How	can	this	help	you	in	the	real	world?	
  Contextual	Awareness	(Incident	Response)	
  Firewall	Monitoring	&	DDoS	
  Malware	/	Ransomware	
  Compliance	
  Informa0on	Hiding	
  DNS	Server	Hacked	(Forensics)	
Agenda	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	
Slide	2
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	
Why	Does	Cyber	Crime	Persist?	
Slide	3	Copyright NIKSUN 2014
Known
Unknown
Cyber Security Products Cover this Area
Sophisticated Hackers work here!
Known
Known
Unknown Unknown
Imagine if the CDC only
looked to prevent virus’
that have already wiped
out millions… they
would have no recourse
in mitigating incidents
like Ebola!
•  Now imagine if they had
full visibility into every
single person in the
United States… they
could monitor every
person’s body and
watch for the
development of both old
and new virus’
Preven0on	
  How	can	one	prevent	that	which	one	can’t	see?	
	
  What	new	services	and	applica0ons	have	
entered	your	network	that	you	are	unaware	of?	
	
  Who	is	behind	them?	Is	it	a	legi0mate	business	
applica0on	or	a	trojan	or	malware?	
  How	do	we	know	that	our	defenses	are	
effec0ve?	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	4
What	Knowledge	Is	Necessary?	
  We	need	more	advanced	signals	(“data”)	than	
those	which	we	have	programmed	a	priori	
	
  Good	cyber	a^ackers	evade	a	priori	indicators	
and	exploit	different	a^ack	vectors	
	
  A	novel	approach	is	necessary	to	gather	
informa0on	from	both	known	and	unknown	
a^ack	vectors	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	5
Comprehensive	Monitoring	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	6
What	is	needed?	
•  Video	camera	(surveillance)	
•  Sensor	detec0on	(laser	beams)	
•  Image	recogni0on	(easy	search	for	forensics,	incident	response)	
	
Why	are	flows	limited?	
•  Generally	only	provide	informa0on	at	layer	3	
•  Lack	good	support	for	correlated	flows	(FTP,	Mobility,	even	web	pages,	etc.)	
•  Lack	of	broader	Threat	Intelligence	support	(files,	domains,	cer0ficates,	
etc.)	
Why	are	logs	limited?	
•  Developers	choose	what	logs	to	record.	Can’t	know	about	a^acks	that	
have	not	even	occurred	yet	
	
	
What	is	Network	Monitoring?	
NIKSUN,	Inc.		CONFIDENTIAL.	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	7
Sample	Flow	logs	
NIKSUN,	Inc.		CONFIDENTIAL.	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	8
  Surveillance	&	Threat	Hun0ng	
  Top-down	Holis0c	view	of	All	Network	Ac0vity	
  Cri0cal	Network	Infrastructure	Indicators	
  Real-0me	Content	Analy0cs	
  Applica0on	Recogni0on	/	Applica0on	Metadata	
  Geo-IP	
  Detec0on	
  Anomaly	/	Signatures	/	Content	(Data	Leakage)	
  Intelligence	Feeds	
  Incident	Response	&	Forensics	
  Applica0on	Reconstruc0on	&	Ar0fact	Extrac0on	
  Sandbox	Integra0on	
  Flows	&	Connec0ons	
  Raw	Packets	
  Other	
  Performance	
  Compliance	
Comprehensive	Monitoring	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	9
Email		
Server	
CRM	
Server	
Web		
Server	
Enterprise-wide	Monitoring	
NIKSUN,	Inc.		CONFIDENTIAL.	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	10	
Monitor across all deployed physical and virtual devices,
centrally, from any smart device
Fast	Macro-to-Micro	Analysis	
Slide	11	NIKSUN Inc., CONFIDENTIAL. See confidentiality restrictions on title page
Global Visibility
Regional View
Specific
Session
Single
Packet
NIKSUN, Inc. CONFIDENTIAL -- See confidentiality restrictions on title page. Slide 11
Deep	Content	Inspec0on	-	Example	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	12	
With just a few clicks, DPI / DCI can identify all of this information
Use	Case	–	Contextual	Awareness	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	13
Use	Case:	Contextual	Awareness	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	14	
Alarms
Firewall
Log Analyzer
IDS/IPS
Content
Filters
SIEM
Scanners
Alarms
Incident Response
-Integrated Analysis
Alarms
Attacks often occur over disparate parts of
the network, over extended periods of time
à forensic investigation is necessary to
put together pieces of the puzzle and reveal
how an attack was crafted
Use	Case	–	Firewall	Monitoring	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	15
  Trending	informa0on	to	tune	Firewalls	
  TCP-SYN	rate	(common	firewall	metric)	
  Fragmented	packet	rate	(IPv4,	IPv6)	
  UDP,	ICMP,	DNS,	NTP,	etc.	packet	rates	
  Bandwidth	
  In-depth	analysis	of	a^ack	a^empts	
  Resolve	issues	with	firewalls	
  FW	vendors/users	oken	need	packets	to	tune	against	an	a^ack	
  Comprehensive	Intelligence	on	DDoS	a^acks	
  Isolate	bad	traffic	from	good	
  Threat	Intelligence	(did	any	bad	URLs	make	it	past	the	FW?)	
  Analyze	Firewall	effec0veness	(Retrospec0ve	IDS)	
  Replay	traffic	to	test	new	FW	rules	
Use	Case	-	Firewall	Monitoring	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	16	
Inline systems may face
latency and complexity
constraints, requiring a
reduction in the deployed
ruleset
•  Monitoring becomes
invaluable for a
constant pulse on
critical infrastructure
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	
Firewall	Inbound	+	Outbound	Monitoring	
Network
Internet
Who is trying
to get in?
What methods are
they using?
Who got in?
What did
they get
out?
Backdoor?
Slide	17
DDoS	Monitoring	(Volumetric	/	Applica0on)	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	18
Red	Zone	/	Green	Zone	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	19
Traffic	Volume	-	Before	and	Aker	Firewall	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	20
Use	Case	– Ransomware	(Wannacry)	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	21
Use	Case:	Wannacry	Inves0ga0on	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	22
Use	Case:	Wannacry	Inves0ga0on	(cont.)	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	23	
•  Leverage retrospective IDS
•  View SMB scans on your infrastructure
•  Real-time intelligence feed related information
Use	Case:	Wannacry	Inves0ga0on	(cont.)	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	24	
How can we know if the hosts scanned have actually been impacted?
Use	Case	–	Compliance	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	25
  Discover	compliance	level	with	traffic	monitoring	
  Faster	than	Pen	Tes0ng	
  Validate	security	pre	and	post	changes	
  Firewalls,	networks,	servers	
  Evidence	
  Raw	data	captures	
  Instantly	iden0fy	insecure	communica0ons	
  Who	is	using	non	compliant:	SSL	2.0,	SSL	3.0,	TLS	1.0		
  Who	is	using	which	ciphers	–	strong	or	weak?		
  What	Cer0ficates	are	in	use?	Cert	Organiza0ons?	
  Clear	text	protocols,	SSN	
	
Use	Case:	Compliance	-	PCI/Fed/Gov	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	
Slide	26
Compliance	–	SSL	Metadata	
Slide	27	NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.
Use	Case	–	InformaMon	Hiding	/	
ExfiltraMon	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	28
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	
Scenic?	
Slide	29
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	
And	Now?	
Slide	30	COPYRIGHT 2013 - NIKSUN Inc.
Social Security Numbers hidden in picture… only way to tell is by drilling down to the raw
packets!
Use	Case	–	DNS	Server	Hacked	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	31
  Spear-phishing	a^ack	lured	employees	to	go	to	their	bank	to	
update	their	info	
  They	were	redirected	to	a	BAD	site	
  Difficult	to	trace	as	the	DNS	server	fixed	itself	aker	some	
amount	of	0me	so	the	problem	could	not	be	iden0fied	by	
tradi0onal	methods	
  Forensic	analysis		
  Discovered	that	the	“window	of	opportunity”	was	transient	
  Gave	IP	address	of	all	those	that	were	lured	to	the	wrong	site	
  Reconstructed	the	a^ack	and	traced	the	a^acker’s	moves	step-by-step	
  Damage	was	minimized	due	to	rapid	idenMficaMon	and	
immediate	remediaMon	
Use	Case:	DNS	Server	Hacked	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	32
NIKSUN:		
Helping	You	Know	the	Unknown®	
	
	
	
Visit	us	at	niksun.com	or	
email	to	info@niksun.com		
	
For	addi0onal	informa0on:	
NIKSUN,	Inc.		CONFIDENTIAL	--	See	confiden0ality	restric0ons	on	0tle	page.	 Slide	33

More Related Content

What's hot

Network intrusi detection system
Network intrusi detection systemNetwork intrusi detection system
Network intrusi detection systemDuwinowo NT
 
Cevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryCevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryUKTI2014
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...BGA Cyber Security
 
Future Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloudFuture Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloudSedthakit Prasanphanich
 
Isf 2015 continuous diagnostics monitoring may 2015
Isf 2015 continuous diagnostics monitoring  may 2015Isf 2015 continuous diagnostics monitoring  may 2015
Isf 2015 continuous diagnostics monitoring may 2015abhi75
 
RSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackRSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackDan Gunter
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introductionJimmy Saigon
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsSteven SIM Kok Leong
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsSteven SIM Kok Leong
 
SoleraNetworks
SoleraNetworksSoleraNetworks
SoleraNetworksJoe Levy
 
A pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security SolutionsA pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security SolutionsB.A.
 
Hacking Closed Networks
Hacking Closed NetworksHacking Closed Networks
Hacking Closed NetworksPriyanka Aash
 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)JIEMS Akkalkuwa
 
Threat intelligence platform explained
Threat intelligence platform explainedThreat intelligence platform explained
Threat intelligence platform explainedMindy Kam
 
Network Intrusion Detection and Countermeasure Selection
Network Intrusion Detection and Countermeasure SelectionNetwork Intrusion Detection and Countermeasure Selection
Network Intrusion Detection and Countermeasure SelectionPramod M Mithyantha
 

What's hot (20)

Network intrusi detection system
Network intrusi detection systemNetwork intrusi detection system
Network intrusi detection system
 
Day4
Day4Day4
Day4
 
IPS Best Practices
IPS Best PracticesIPS Best Practices
IPS Best Practices
 
Cevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryCevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th January
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
 
Future Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloudFuture Prediction: Network Intrusion Detection System in the cloud
Future Prediction: Network Intrusion Detection System in the cloud
 
Isf 2015 continuous diagnostics monitoring may 2015
Isf 2015 continuous diagnostics monitoring  may 2015Isf 2015 continuous diagnostics monitoring  may 2015
Isf 2015 continuous diagnostics monitoring may 2015
 
Day3
Day3Day3
Day3
 
RSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackRSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System Hack
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introduction
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical Threats
 
SoleraNetworks
SoleraNetworksSoleraNetworks
SoleraNetworks
 
A pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security SolutionsA pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security Solutions
 
NGFW Brochure 08 08
NGFW Brochure 08 08NGFW Brochure 08 08
NGFW Brochure 08 08
 
Hacking Closed Networks
Hacking Closed NetworksHacking Closed Networks
Hacking Closed Networks
 
4 (data security in local network using)
4 (data security in local network using)4 (data security in local network using)
4 (data security in local network using)
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Threat intelligence platform explained
Threat intelligence platform explainedThreat intelligence platform explained
Threat intelligence platform explained
 
Network Intrusion Detection and Countermeasure Selection
Network Intrusion Detection and Countermeasure SelectionNetwork Intrusion Detection and Countermeasure Selection
Network Intrusion Detection and Countermeasure Selection
 

Similar to Comprehensive Network Monitoring and DPI

8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation SecurityBGA Cyber Security
 
A Tale of Software-Defined & Adaptive Security
A Tale of Software-Defined & Adaptive SecurityA Tale of Software-Defined & Adaptive Security
A Tale of Software-Defined & Adaptive SecuritySébastien Tandel
 
Five IDS mistakes people make
Five IDS mistakes people makeFive IDS mistakes people make
Five IDS mistakes people makeAnton Chuvakin
 
Network intrusi detection system
Network intrusi detection systemNetwork intrusi detection system
Network intrusi detection systemMaulana Arif
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat managementRajendra Menon
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemSweta Sharma
 
Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Barry Greene
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Mohamed Loey
 
How VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at RiskHow VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at RiskCyxtera Technologies
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSSylvain Martinez
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation SecurityCybera Inc.
 

Similar to Comprehensive Network Monitoring and DPI (20)

Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
A Tale of Software-Defined & Adaptive Security
A Tale of Software-Defined & Adaptive SecurityA Tale of Software-Defined & Adaptive Security
A Tale of Software-Defined & Adaptive Security
 
OFFENSIVE IDS
OFFENSIVE IDSOFFENSIVE IDS
OFFENSIVE IDS
 
Five IDS mistakes people make
Five IDS mistakes people makeFive IDS mistakes people make
Five IDS mistakes people make
 
Network intrusi detection system
Network intrusi detection systemNetwork intrusi detection system
Network intrusi detection system
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 
Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1
 
Cybersecurity - Jim Butterworth
Cybersecurity - Jim ButterworthCybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
 
Rhipe @Netpluz CS Event Nov 2017
Rhipe @Netpluz CS Event Nov 2017Rhipe @Netpluz CS Event Nov 2017
Rhipe @Netpluz CS Event Nov 2017
 
Idps technology starter v2.0
Idps technology starter v2.0Idps technology starter v2.0
Idps technology starter v2.0
 
How VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at RiskHow VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at Risk
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICS
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation Security
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
 

More from Gaurav "GP" Pal

stackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutionsstackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutionsGaurav "GP" Pal
 
stackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutionsstackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutionsGaurav "GP" Pal
 
stackArmor Security MicroSummit - Next Generation Firewalls for AWS
stackArmor Security MicroSummit - Next Generation Firewalls for AWSstackArmor Security MicroSummit - Next Generation Firewalls for AWS
stackArmor Security MicroSummit - Next Generation Firewalls for AWSGaurav "GP" Pal
 
stackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfeestackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfeeGaurav "GP" Pal
 
stackArmor Security MicroSummit - AWS Security with Splunk
stackArmor Security MicroSummit - AWS Security with SplunkstackArmor Security MicroSummit - AWS Security with Splunk
stackArmor Security MicroSummit - AWS Security with SplunkGaurav "GP" Pal
 
Rapid deployment of Sitecore on AWS
Rapid deployment of Sitecore on AWSRapid deployment of Sitecore on AWS
Rapid deployment of Sitecore on AWSGaurav "GP" Pal
 
Secured Hosting of PCI DSS Compliant Web Applications on AWS
Secured Hosting of PCI DSS Compliant Web Applications on AWSSecured Hosting of PCI DSS Compliant Web Applications on AWS
Secured Hosting of PCI DSS Compliant Web Applications on AWSGaurav "GP" Pal
 
Implementing Secure DevOps on Public Cloud Platforms
Implementing Secure DevOps on Public Cloud PlatformsImplementing Secure DevOps on Public Cloud Platforms
Implementing Secure DevOps on Public Cloud PlatformsGaurav "GP" Pal
 
FGMC - Managed Data Platform - CloudDC Meetup
FGMC - Managed Data Platform - CloudDC MeetupFGMC - Managed Data Platform - CloudDC Meetup
FGMC - Managed Data Platform - CloudDC MeetupGaurav "GP" Pal
 
stackArmor presentation for DevOpsDC ver 4
stackArmor presentation for DevOpsDC ver 4stackArmor presentation for DevOpsDC ver 4
stackArmor presentation for DevOpsDC ver 4Gaurav "GP" Pal
 
AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016Gaurav "GP" Pal
 
DevOps for ETL processing at scale with MongoDB, Solr, AWS and Chef
DevOps for ETL processing at scale with MongoDB, Solr, AWS and ChefDevOps for ETL processing at scale with MongoDB, Solr, AWS and Chef
DevOps for ETL processing at scale with MongoDB, Solr, AWS and ChefGaurav "GP" Pal
 
AWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceAWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceGaurav "GP" Pal
 
Big Data - Accountability Solutions for Public Sector Programs
Big Data - Accountability Solutions for Public Sector ProgramsBig Data - Accountability Solutions for Public Sector Programs
Big Data - Accountability Solutions for Public Sector ProgramsGaurav "GP" Pal
 
2013 11-06 adopting aws at scale - lessons from the trenches
2013 11-06 adopting aws at scale - lessons from the trenches2013 11-06 adopting aws at scale - lessons from the trenches
2013 11-06 adopting aws at scale - lessons from the trenchesGaurav "GP" Pal
 
DevOps in the Amazon Cloud – Learn from the pioneersNetflix suro
DevOps in the Amazon Cloud – Learn from the pioneersNetflix suroDevOps in the Amazon Cloud – Learn from the pioneersNetflix suro
DevOps in the Amazon Cloud – Learn from the pioneersNetflix suroGaurav "GP" Pal
 
Enterprise transformation with cloud computing Jan 2014
Enterprise transformation with cloud computing Jan 2014Enterprise transformation with cloud computing Jan 2014
Enterprise transformation with cloud computing Jan 2014Gaurav "GP" Pal
 

More from Gaurav "GP" Pal (19)

stackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutionsstackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutions
 
stackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutionsstackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutions
 
stackArmor Security MicroSummit - Next Generation Firewalls for AWS
stackArmor Security MicroSummit - Next Generation Firewalls for AWSstackArmor Security MicroSummit - Next Generation Firewalls for AWS
stackArmor Security MicroSummit - Next Generation Firewalls for AWS
 
stackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfeestackArmor - Security MicroSummit - McAfee
stackArmor - Security MicroSummit - McAfee
 
stackArmor Security MicroSummit - AWS Security with Splunk
stackArmor Security MicroSummit - AWS Security with SplunkstackArmor Security MicroSummit - AWS Security with Splunk
stackArmor Security MicroSummit - AWS Security with Splunk
 
Magento Hosting on AWS
Magento Hosting on AWS Magento Hosting on AWS
Magento Hosting on AWS
 
Rapid deployment of Sitecore on AWS
Rapid deployment of Sitecore on AWSRapid deployment of Sitecore on AWS
Rapid deployment of Sitecore on AWS
 
Secured Hosting of PCI DSS Compliant Web Applications on AWS
Secured Hosting of PCI DSS Compliant Web Applications on AWSSecured Hosting of PCI DSS Compliant Web Applications on AWS
Secured Hosting of PCI DSS Compliant Web Applications on AWS
 
Implementing Secure DevOps on Public Cloud Platforms
Implementing Secure DevOps on Public Cloud PlatformsImplementing Secure DevOps on Public Cloud Platforms
Implementing Secure DevOps on Public Cloud Platforms
 
FGMC - Managed Data Platform - CloudDC Meetup
FGMC - Managed Data Platform - CloudDC MeetupFGMC - Managed Data Platform - CloudDC Meetup
FGMC - Managed Data Platform - CloudDC Meetup
 
stackArmor presentation for DevOpsDC ver 4
stackArmor presentation for DevOpsDC ver 4stackArmor presentation for DevOpsDC ver 4
stackArmor presentation for DevOpsDC ver 4
 
AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016
 
DevOps for ETL processing at scale with MongoDB, Solr, AWS and Chef
DevOps for ETL processing at scale with MongoDB, Solr, AWS and ChefDevOps for ETL processing at scale with MongoDB, Solr, AWS and Chef
DevOps for ETL processing at scale with MongoDB, Solr, AWS and Chef
 
Hosting Tableau on AWS
Hosting Tableau on AWSHosting Tableau on AWS
Hosting Tableau on AWS
 
AWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceAWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and Compliance
 
Big Data - Accountability Solutions for Public Sector Programs
Big Data - Accountability Solutions for Public Sector ProgramsBig Data - Accountability Solutions for Public Sector Programs
Big Data - Accountability Solutions for Public Sector Programs
 
2013 11-06 adopting aws at scale - lessons from the trenches
2013 11-06 adopting aws at scale - lessons from the trenches2013 11-06 adopting aws at scale - lessons from the trenches
2013 11-06 adopting aws at scale - lessons from the trenches
 
DevOps in the Amazon Cloud – Learn from the pioneersNetflix suro
DevOps in the Amazon Cloud – Learn from the pioneersNetflix suroDevOps in the Amazon Cloud – Learn from the pioneersNetflix suro
DevOps in the Amazon Cloud – Learn from the pioneersNetflix suro
 
Enterprise transformation with cloud computing Jan 2014
Enterprise transformation with cloud computing Jan 2014Enterprise transformation with cloud computing Jan 2014
Enterprise transformation with cloud computing Jan 2014
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Comprehensive Network Monitoring and DPI