NetFlow provides visibility into network traffic by capturing metadata on network flows. It identifies the source and destination IP addresses and ports, protocol, start and end times, byte and packet counts for each flow. This flow data is exported from routers and switches to a collector, where NetFlow analyzers aggregate and analyze the data to provide insights into network usage, applications in use, traffic trends, and potential security issues.
Check Point75 Makes3 D Security A Reality Q22011chaucheckpoint
Check Point R75 makes 3D Security a reality by combining policies, people and enforcement through its unified security platform. It introduces identity awareness and application control capabilities to provide accurate security while simplifying management. Independent tests have shown it to outperform competitors and be the only firewall to pass the latest standards.
This document summarizes a presentation by Prakash Baskaran of Pawaa Software on data protection solutions. It discusses traditional approaches to data security that are no longer sufficient due to insider threats and activities like copying sensitive data to removable drives or screenshots. Pawaa's innovations include a browser wrapper that works on any computer to enforce usage policies for files downloaded from web applications, preventing unauthorized access or use of sensitive data. The presentation demonstrates PawaaWEBB, which deploys as a browser to protect a web application without requiring a locked down environment.
Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...e-Democracy Conference
This document discusses the key characteristics of advanced infrastructure needed as a foundation for effective e-democracy solutions. It outlines that the infrastructure should be secure, available, expandable, interoperable and manageable. It then describes several modern ICT ingredients that are important for such infrastructure, including directory services, messaging and collaboration, security, mobility, high availability and disaster resilience, virtualization and management. Each of these areas is discussed in more detail regarding their role in supporting e-democracy solutions.
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Novell
Mobility is a fact of organizational life, and administrators have a business imperative to make their end users as productive on the go as they are in the office. But mobile productivity can't come at the expense of security. Attend this session to learn about Novell ZENworks Endpoint Security Management and its role in enabling secure mobile productivity. Keeping your network safe, your data protected and you users productive is more important than ever. Learn how you do all three with comprehensive and centralized endpoint security management solutions from Novell.
The document describes InterGuard, a complete internal threat prevention platform that provides data loss prevention, web filtering, employee monitoring, and laptop security through a simple SaaS solution. It offers unmatched visibility and control through its next generation end-point architecture that works everywhere. The platform allows organizations to prevent data leaks, monitor internet and computer usage both on and off the network, and remotely retrieve lost or stolen laptops.
Fibre optic connections are often assumed to be secure, but they can be tapped. Senetas, a company that develops high-speed network encryption technology, explains how fibre tapping can be done with readily available devices. With some technical knowledge and effort, optical fibres can be tapped without detection by splicing into or polishing the fibres to create an evanescent wave coupler that splits the signal. While difficult, motivated attackers could potentially intercept transmitted data this way if not encrypted. Senetas recommends encryption to protect valuable data and discusses their CN range of encryptors that provide full-duplex encryption up to 10Gbps with low latency.
As you move your IT Infrastructure into the cloud, how secure can you expect your applications to be? Join Alert Logic and Internap on this webcast for an enlightening discussion on the state of cloud security and how it impacts security management decisions, especially in the context of deploying infrastructure to hosted and cloud environments.
The document provides an overview of software defined networking (SDN) and future-proofing data center networks. It discusses the evolution of networks since 2000 and current challenges around inflexibility. SDN is defined as separating the network control and forwarding functions, making the network programmable. Benefits include direct programmability, agility, centralized management, and open standards. SDN uses the OpenFlow protocol and virtualization. The future of SDN includes integration of LAN and WAN SDN, lower MPLS costs, and controlling networks through devices.
Check Point75 Makes3 D Security A Reality Q22011chaucheckpoint
Check Point R75 makes 3D Security a reality by combining policies, people and enforcement through its unified security platform. It introduces identity awareness and application control capabilities to provide accurate security while simplifying management. Independent tests have shown it to outperform competitors and be the only firewall to pass the latest standards.
This document summarizes a presentation by Prakash Baskaran of Pawaa Software on data protection solutions. It discusses traditional approaches to data security that are no longer sufficient due to insider threats and activities like copying sensitive data to removable drives or screenshots. Pawaa's innovations include a browser wrapper that works on any computer to enforce usage policies for files downloaded from web applications, preventing unauthorized access or use of sensitive data. The presentation demonstrates PawaaWEBB, which deploys as a browser to protect a web application without requiring a locked down environment.
Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...e-Democracy Conference
This document discusses the key characteristics of advanced infrastructure needed as a foundation for effective e-democracy solutions. It outlines that the infrastructure should be secure, available, expandable, interoperable and manageable. It then describes several modern ICT ingredients that are important for such infrastructure, including directory services, messaging and collaboration, security, mobility, high availability and disaster resilience, virtualization and management. Each of these areas is discussed in more detail regarding their role in supporting e-democracy solutions.
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Novell
Mobility is a fact of organizational life, and administrators have a business imperative to make their end users as productive on the go as they are in the office. But mobile productivity can't come at the expense of security. Attend this session to learn about Novell ZENworks Endpoint Security Management and its role in enabling secure mobile productivity. Keeping your network safe, your data protected and you users productive is more important than ever. Learn how you do all three with comprehensive and centralized endpoint security management solutions from Novell.
The document describes InterGuard, a complete internal threat prevention platform that provides data loss prevention, web filtering, employee monitoring, and laptop security through a simple SaaS solution. It offers unmatched visibility and control through its next generation end-point architecture that works everywhere. The platform allows organizations to prevent data leaks, monitor internet and computer usage both on and off the network, and remotely retrieve lost or stolen laptops.
Fibre optic connections are often assumed to be secure, but they can be tapped. Senetas, a company that develops high-speed network encryption technology, explains how fibre tapping can be done with readily available devices. With some technical knowledge and effort, optical fibres can be tapped without detection by splicing into or polishing the fibres to create an evanescent wave coupler that splits the signal. While difficult, motivated attackers could potentially intercept transmitted data this way if not encrypted. Senetas recommends encryption to protect valuable data and discusses their CN range of encryptors that provide full-duplex encryption up to 10Gbps with low latency.
As you move your IT Infrastructure into the cloud, how secure can you expect your applications to be? Join Alert Logic and Internap on this webcast for an enlightening discussion on the state of cloud security and how it impacts security management decisions, especially in the context of deploying infrastructure to hosted and cloud environments.
The document provides an overview of software defined networking (SDN) and future-proofing data center networks. It discusses the evolution of networks since 2000 and current challenges around inflexibility. SDN is defined as separating the network control and forwarding functions, making the network programmable. Benefits include direct programmability, agility, centralized management, and open standards. SDN uses the OpenFlow protocol and virtualization. The future of SDN includes integration of LAN and WAN SDN, lower MPLS costs, and controlling networks through devices.
This document contains a resume for Mohammed Khaled Alghurafi, a Yemeni national seeking an IT consulting position. He has a Bachelor's degree in Information Technology and 6 years of experience in IT roles including network administrator, network administrator assistant, and desktop technician. He has technical skills and certifications in networking, hardware, software applications, programming languages, and website design.
Slides of a talk given to the Seattle Chapter of the Cloud Security Alliance. Looks briefly at Architectures, Sources of Log Data, and behavioral signatures in the data and issues and observations around using Big Data products for security.
This product brochure summarizes ManageEngine NetFlow Analyzer, a network traffic analysis and security tool. It provides unparalleled network visibility [1] and supports various flow technologies. [2] The tool helps monitor network performance, security threats, and application usage to ensure business critical services run optimally. [3]
A superset of the slides I presented on voice biometrics at SxSW Interactive. The session (in conjunction with CSIdentity was to raise awareness VB as a physical and behavioral biometric.
This document discusses security challenges in the cloud era. It covers four pillars of cloud computing: infrastructure, applications, data protection, and consumerization. The rise of mobile devices and consumerization of IT brings new security risks. Advanced persistent threats are challenging to detect due to sophisticated techniques including social engineering, stealthy behavior, and use of zero-day vulnerabilities. Deep Discovery provides specialized threat detection across the attack sequence through network visibility, analysis, and correlation with Trend Micro's global threat intelligence.
The document discusses application security challenges and presents HP Fortify Software Security Center as a solution. It describes how the solution proactively identifies and eliminates risks in legacy applications and prevents risks during development. The solution protects applications across in-house, outsourced, commercial and open source development by embedding security into the entire software development lifecycle. It also provides comprehensive coverage across multiple vulnerability categories and programming languages.
Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...Paweł Kowalski
Level 3 and Global Crossing are combining their companies to create a stronger global telecommunications provider. The combined company will have $6.26 billion in annual revenue and improved financial metrics, including adjusted EBITDA of $1.3 billion initially and $1.6 billion once synergies are achieved. The combined network will span 45 countries across North America, Europe, Latin America, and Asia Pacific.
The document discusses networking fundamentals including how computer and telephone networks work, connecting to a network, and email basics. It covers networking topics like peer-to-peer networks, local area networks, wide area networks, client-server models, intranets, and extranets. Benefits of networking include communicating, sharing resources, and dedicated servers. Disadvantages include dependency on the network, security risks, autonomy loss, and vulnerability to viruses. Connections can be made via cable, fiber optics, wireless or other methods, and bandwidth is classified as low or high.
Arrow ECS is a leading UK security distributor that can offer customers solutions from its Security Center of Excellence and partnerships with top security vendors. It has expertise in translating industry knowledge into practical security solutions for issues like safeguarding data, securing the network and data center, and ensuring compliance. Arrow ECS works with IBM security products to help organizations address escalating security and compliance needs.
IP Centric Conferencing IP Centric Conferencing IP Centric ...Videoguy
IP Centric Conferencing involves real-time voice, video, and data conferencing over IP networks, allowing multiple participants to communicate simultaneously. Key benefits include reduced costs, improved communications, and increased business competitiveness. Implementing IP conferencing requires choices around standards, network devices, bandwidth, quality of service, scalability, management, security, and legacy system interconnectivity. Proper planning is needed to ensure a successful IP conferencing solution.
The document provides an overview of information lifecycle management, litigation lifecycle management, and eDiscovery. It discusses the phases of information and litigation lifecycle management. These include creation, review, use, retention, and disposal for information lifecycle management. For litigation lifecycle management, the phases include suit filed, response, discovery, trial, and post-trial. The document also defines eDiscovery and discusses the core elements of an eDiscovery offering as well as how to compare different eDiscovery solutions.
Mitel offers a portfolio of voice, data, and managed network solutions including local and long distance phone services, audio and web conferencing, dedicated internet access, MPLS VPN services, mobile wireless services, and network management tools. Their solutions are designed to meet the total communications needs of businesses through a single provider and are supported by industry-leading customer service.
Multipoint Video Conference Over Public InternetVideoguy
1) StarHub offers multipoint video conferencing over the public internet, which provides better quality than ISDN networks at a lower cost.
2) Using IP networks allows for higher quality video and audio through higher data rates compared to ISDN, and eliminates issues like lip synchronization problems.
3) The service offers reliability through a dedicated private IP network, ease of use with operator assistance, and affordability by avoiding call transport costs and supporting existing equipment.
SDN is an approach that decouples the control plane from the data plane in a network, allowing for centralized control and programmability. This document introduces SDN and network programmability, covering what SDN is and is not, the genesis of SDN, use cases solved by SDN, an overview of OpenFlow, Cisco's SDN solutions including ACI, network overlays, and network controllers. It also discusses the impact of SDN on IT service management.
Too soft[ware defined] networks SD-Wan vulnerability assessmentSergey Gordeychik
This document discusses security assessments of software-defined wide area networks (SD-WANs). It begins with an introduction to SD-WAN features and architectures. It then outlines the researchers' approach, which involves examining the SD-WAN attack surface and testing for security issues. The document summarizes potential threats in areas like the control plane, data plane, and virtual network functions. It also provides the perspectives of different roles involved in SD-WANs, such as network engineers, software architects, and security analysts. The researchers conducted a security assessment of SD-WAN that involved examining access control, platform security, management interfaces, and other components.
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYjmical
This document provides an overview of AccessData's Cyber Intelligence Response Technology (CIRT) platform. CIRT offers an integrated suite of digital forensics and incident response capabilities including network forensics, host-based forensics, data auditing, and malware analysis. Key features include an agent that can independently collect and store data from endpoints, a Cerberus module that analyzes files for malicious behaviors without signatures or prior knowledge, and modules for analyzing removable media, volatile memory, and network packet captures. The platform allows multiple teams such as incident response, computer forensics, and compliance to collaborate on investigations.
Arch Rock provides wireless sensor network solutions based on 6LoWPAN and IP networking standards. Their technology allows sensors to connect to the internet using low-power wireless mesh networks. They offer IP nodes, routers, and servers to build scalable wireless sensor networks for applications like environmental monitoring, asset tracking, and smart city infrastructure. Arch Rock's solutions leverage open standards to provide ease of deployment, management, and integration with existing IP networks and enterprise systems.
Meetup 4/2/2016 - Functionele en technische architectuur IoTDigipolis Antwerpen
Meetup waar we samen met iedereen die interesse heeft nadenken over een open IoT architectuur voor Antwerpen.
http://www.meetup.com/DigAnt-Cafe/events/228254825/
Developing Interoperable Components for an Open IoT Foundation Eurotech
In this presentation Eurotech and Red Hat present Kapua, a modular cloud platform that provides management for Internet of Things (IoT) gateways and smart edge devices. It represents a key milestone towards the development of a truly open, end-to-end foundation for IoT and its ecosystem of partners and solutions. Kapua provides a core integration framework with services for device registry, data and device management, message routing, and applications.
This document discusses using the Data Distribution Service (DDS) and RTI Connext DDS for building scalable, distributed systems for the Industrial Internet of Things (IIoT). DDS provides data-centric publish-subscribe communication that supports real-time integration of sensors, controllers and applications. It enables seamless data sharing across networks, platforms and locations. RTI is a leading provider of DDS middleware and has experience integrating DDS into large industrial and military systems.
This document contains a resume for Mohammed Khaled Alghurafi, a Yemeni national seeking an IT consulting position. He has a Bachelor's degree in Information Technology and 6 years of experience in IT roles including network administrator, network administrator assistant, and desktop technician. He has technical skills and certifications in networking, hardware, software applications, programming languages, and website design.
Slides of a talk given to the Seattle Chapter of the Cloud Security Alliance. Looks briefly at Architectures, Sources of Log Data, and behavioral signatures in the data and issues and observations around using Big Data products for security.
This product brochure summarizes ManageEngine NetFlow Analyzer, a network traffic analysis and security tool. It provides unparalleled network visibility [1] and supports various flow technologies. [2] The tool helps monitor network performance, security threats, and application usage to ensure business critical services run optimally. [3]
A superset of the slides I presented on voice biometrics at SxSW Interactive. The session (in conjunction with CSIdentity was to raise awareness VB as a physical and behavioral biometric.
This document discusses security challenges in the cloud era. It covers four pillars of cloud computing: infrastructure, applications, data protection, and consumerization. The rise of mobile devices and consumerization of IT brings new security risks. Advanced persistent threats are challenging to detect due to sophisticated techniques including social engineering, stealthy behavior, and use of zero-day vulnerabilities. Deep Discovery provides specialized threat detection across the attack sequence through network visibility, analysis, and correlation with Trend Micro's global threat intelligence.
The document discusses application security challenges and presents HP Fortify Software Security Center as a solution. It describes how the solution proactively identifies and eliminates risks in legacy applications and prevents risks during development. The solution protects applications across in-house, outsourced, commercial and open source development by embedding security into the entire software development lifecycle. It also provides comprehensive coverage across multiple vulnerability categories and programming languages.
Dowiedz się więcej o Level3. Poznaj usługi, historię firmy i jej największych...Paweł Kowalski
Level 3 and Global Crossing are combining their companies to create a stronger global telecommunications provider. The combined company will have $6.26 billion in annual revenue and improved financial metrics, including adjusted EBITDA of $1.3 billion initially and $1.6 billion once synergies are achieved. The combined network will span 45 countries across North America, Europe, Latin America, and Asia Pacific.
The document discusses networking fundamentals including how computer and telephone networks work, connecting to a network, and email basics. It covers networking topics like peer-to-peer networks, local area networks, wide area networks, client-server models, intranets, and extranets. Benefits of networking include communicating, sharing resources, and dedicated servers. Disadvantages include dependency on the network, security risks, autonomy loss, and vulnerability to viruses. Connections can be made via cable, fiber optics, wireless or other methods, and bandwidth is classified as low or high.
Arrow ECS is a leading UK security distributor that can offer customers solutions from its Security Center of Excellence and partnerships with top security vendors. It has expertise in translating industry knowledge into practical security solutions for issues like safeguarding data, securing the network and data center, and ensuring compliance. Arrow ECS works with IBM security products to help organizations address escalating security and compliance needs.
IP Centric Conferencing IP Centric Conferencing IP Centric ...Videoguy
IP Centric Conferencing involves real-time voice, video, and data conferencing over IP networks, allowing multiple participants to communicate simultaneously. Key benefits include reduced costs, improved communications, and increased business competitiveness. Implementing IP conferencing requires choices around standards, network devices, bandwidth, quality of service, scalability, management, security, and legacy system interconnectivity. Proper planning is needed to ensure a successful IP conferencing solution.
The document provides an overview of information lifecycle management, litigation lifecycle management, and eDiscovery. It discusses the phases of information and litigation lifecycle management. These include creation, review, use, retention, and disposal for information lifecycle management. For litigation lifecycle management, the phases include suit filed, response, discovery, trial, and post-trial. The document also defines eDiscovery and discusses the core elements of an eDiscovery offering as well as how to compare different eDiscovery solutions.
Mitel offers a portfolio of voice, data, and managed network solutions including local and long distance phone services, audio and web conferencing, dedicated internet access, MPLS VPN services, mobile wireless services, and network management tools. Their solutions are designed to meet the total communications needs of businesses through a single provider and are supported by industry-leading customer service.
Multipoint Video Conference Over Public InternetVideoguy
1) StarHub offers multipoint video conferencing over the public internet, which provides better quality than ISDN networks at a lower cost.
2) Using IP networks allows for higher quality video and audio through higher data rates compared to ISDN, and eliminates issues like lip synchronization problems.
3) The service offers reliability through a dedicated private IP network, ease of use with operator assistance, and affordability by avoiding call transport costs and supporting existing equipment.
SDN is an approach that decouples the control plane from the data plane in a network, allowing for centralized control and programmability. This document introduces SDN and network programmability, covering what SDN is and is not, the genesis of SDN, use cases solved by SDN, an overview of OpenFlow, Cisco's SDN solutions including ACI, network overlays, and network controllers. It also discusses the impact of SDN on IT service management.
Too soft[ware defined] networks SD-Wan vulnerability assessmentSergey Gordeychik
This document discusses security assessments of software-defined wide area networks (SD-WANs). It begins with an introduction to SD-WAN features and architectures. It then outlines the researchers' approach, which involves examining the SD-WAN attack surface and testing for security issues. The document summarizes potential threats in areas like the control plane, data plane, and virtual network functions. It also provides the perspectives of different roles involved in SD-WANs, such as network engineers, software architects, and security analysts. The researchers conducted a security assessment of SD-WAN that involved examining access control, platform security, management interfaces, and other components.
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYjmical
This document provides an overview of AccessData's Cyber Intelligence Response Technology (CIRT) platform. CIRT offers an integrated suite of digital forensics and incident response capabilities including network forensics, host-based forensics, data auditing, and malware analysis. Key features include an agent that can independently collect and store data from endpoints, a Cerberus module that analyzes files for malicious behaviors without signatures or prior knowledge, and modules for analyzing removable media, volatile memory, and network packet captures. The platform allows multiple teams such as incident response, computer forensics, and compliance to collaborate on investigations.
Arch Rock provides wireless sensor network solutions based on 6LoWPAN and IP networking standards. Their technology allows sensors to connect to the internet using low-power wireless mesh networks. They offer IP nodes, routers, and servers to build scalable wireless sensor networks for applications like environmental monitoring, asset tracking, and smart city infrastructure. Arch Rock's solutions leverage open standards to provide ease of deployment, management, and integration with existing IP networks and enterprise systems.
Meetup 4/2/2016 - Functionele en technische architectuur IoTDigipolis Antwerpen
Meetup waar we samen met iedereen die interesse heeft nadenken over een open IoT architectuur voor Antwerpen.
http://www.meetup.com/DigAnt-Cafe/events/228254825/
Developing Interoperable Components for an Open IoT Foundation Eurotech
In this presentation Eurotech and Red Hat present Kapua, a modular cloud platform that provides management for Internet of Things (IoT) gateways and smart edge devices. It represents a key milestone towards the development of a truly open, end-to-end foundation for IoT and its ecosystem of partners and solutions. Kapua provides a core integration framework with services for device registry, data and device management, message routing, and applications.
This document discusses using the Data Distribution Service (DDS) and RTI Connext DDS for building scalable, distributed systems for the Industrial Internet of Things (IIoT). DDS provides data-centric publish-subscribe communication that supports real-time integration of sensors, controllers and applications. It enables seamless data sharing across networks, platforms and locations. RTI is a leading provider of DDS middleware and has experience integrating DDS into large industrial and military systems.
This document discusses KURA, an open source Java and OSGi-based application framework for M2M/IoT service gateways. KURA aims to simplify embedded application development and deployment by providing a cohesive environment, modular components, hardware abstraction, and tools for remote management. It allows developers to focus on their applications while handling common tasks like communication protocols and device management. KURA also aims to reduce the gap between embedded and enterprise software through standards, tools, and decoupling layers.
NetFlow is a network monitoring technology that collects IP traffic data from network devices and analyzes it to provide visibility into network usage, problems, and threats. It helps plug security loopholes that exist in current network security systems like IDS/IPS. NetFlow data can be used to detect hacking attempts, stop zero-day malware infections, monitor internal network threats, and provide effective monitoring of high-speed and complex meshed networks. ManageEngine NetFlow Analyzer is a software solution that leverages NetFlow data to provide granular traffic reporting, conversation details, protocol distribution details, and anomaly detection capabilities.
Workflows are a key component of server side of IoT solution along with Analytics, Rule Engine and IoT device management. IoT focused Workflow tools draw their inspiration of classical workflow tools that exist in market, but focus more on IoT use cases. For example they are able to connect with IoT devices using IoT specific protocols like CoAP or MQTT. Node-RED is a visual tool for wiring together hardware devices, APIs and online services in new and interesting ways. It’s build by IBM Emerging Technology team from group for IoT, though it’s not limited only to IoT.
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
Patomphon Vimolket introduces Cisco's vision for enabling next-generation data center transformations through software-defined technologies. The document discusses challenges like evolving threats, manual operations, and digital disruption. It presents Cisco's data center reference architecture and portfolio including Cisco CloudCenter, Nexus, UCS, HyperFlex, ACI, Intersight, and security solutions like Tetration and AppDynamics. These provide application visibility, infrastructure optimization, and security to help businesses adapt to challenges like multicloud, microservices, and more dynamic environments.
This document discusses Internet of Things (IoT) solutions using Microsoft Azure cloud services. It provides an overview of IoT, why the cloud is useful for IoT, and Azure IoT services. It also demonstrates connecting devices to Azure using protocols like MQTT and streaming data to analytics tools. Finally, it discusses IoT platforms and devices like Arduino that can be used to build IoT solutions.
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...PROIDEA
The document discusses network traffic monitoring and anomaly detection solutions from INVEA-TECH. It provides background on INVEA-TECH, an overview of security threats facing networks, and introduces their FlowMon solution. FlowMon includes probes to collect network flow data, collectors to store and analyze the data, and plugins like ADS for automatic anomaly detection. The document uses statistics and examples to illustrate network threats and how FlowMon can provide visibility and detection of attacks.
Some problems can only be solved by looking across a complete compute ecosystem. IoT Devices, Mobile Devices, Media Servers Gateways, Cloud Edge Devices.

08 sdn system intelligence short public beijing sdn conference - 130828Mason Mei
This document discusses software defined networking (SDN) and IBM's SDN strategy. It introduces IBM's SDN Virtual Environment (SDN-VE) platform, which uses Distributed Overlay Virtual Ethernet (DOVE) technology to virtualize the physical network and provide automated connectivity for virtual workloads. SDN-VE integrates with OpenStack and IBM's SmartCloud solutions. It also discusses how SDN can address client requirements through dynamic virtual system provisioning, workload-aware networking, and simplified scalability of servers, storage and networks.
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE
Presentation by Parwinder Singh (Technical Specialist, NEC Technologies India Pvt Ltd.) and Satinder Jeet Singh (Group Project Manager, NEC Technologies India Pvt Ltd.)
FIWARE Global Summit
23-24 October 2019 - Berlin, Germany
Internet of Things has surpassed the hype phase and according to Gartner, in the next 5-10 years it is expected to become the mainstream. Estimates of this growth predict that IoT market shall grow to $8.9 trillion with over 212 billion connected things by 2020.
With so many devices in question, the ultimate success of IoT lies in the ability of these devices to seamlessly connect and share information securely with each other. With this primary requirement, one cannot overemphasize the role of software technology as an enabler for IoT devices to carry out the chores and achieve the goals.
Attendees got insights on the various software components that make an IoT application and also on some frameworks that help in building IoT apps.
As millions of embedded devices get connected to the cloud, it becomes crucial for the teams monitoring the performance of their production systems to get insight into the edge device’s health, and proactively fix problems before the news hits the front page of New York Times. As connected things move into traditional businesses like homes, retail, and industries - the traditional device management and diagnostic tools clash with backend enterprise performance management systems. This talk given at OpenIoTSummit in San Digeo covers best practices on how to bridge the device performance metrics with backend performance analysis to provide a unified view of a connected world.
The document discusses the need for standardization in the Internet-of-Things (IoT). It notes that IoT involves a highly heterogeneous set of sensors, devices, and data that needs interoperability standards. It describes some existing standards for different IoT layers including networking, data formats, protocols, and interfaces. The document advocates for both syntactic and semantic interoperability standards and outlines Tata Consultancy Services' contributions to various standards bodies.
This document discusses the role of cloud and analytics in IoT. It begins by explaining how IoT connects billions of devices via networks to deliver connected industry solutions. The key value is the data these devices collect. The document then covers several topics:
- IoT technology enablers like cloud computing, protocols, sensors, and gateways
- How sensor data is collected, processed at the edge and in the cloud, analyzed, and used in applications
- Popular IoT and cloud platforms that provide services for device management, data ingestion, storage, processing and analytics
- Security considerations and methods for IoT like authentication, authorization and encryption
- Programming tools and frameworks for developing applications and connecting
IAB3948 Wiring the internet of things with Node-REDPeterNiblett
Internet of Things developers need a tool to wire things together, and they also need to know how to maximize usage of existing services to create powerful connected apps. This session explains the usage of Node-RED as a tool to build powerful integrations that help in creating the connected products. We will explore integrations with devices and also with services to enable smarter products.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
"What does it really mean for your system to be available, or how to define w...Fwdays
We will talk about system monitoring from a few different angles. We will start by covering the basics, then discuss SLOs, how to define them, and why understanding the business well is crucial for success in this exercise.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
What is an RPA CoE? Session 2 – CoE RolesDianaGray10
In this session, we will review the players involved in the CoE and how each role impacts opportunities.
Topics covered:
• What roles are essential?
• What place in the automation journey does each role play?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
QA or the Highway - Component Testing: Bridging the gap between frontend appl...zjhamm304
These are the slides for the presentation, "Component Testing: Bridging the gap between frontend applications" that was presented at QA or the Highway 2024 in Columbus, OH by Zachary Hamm.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
BYOD Monitoring
1. Securing and Monitoring BYOD Networks
using NetFlow
How NetFlow can help with Security Analysis,
Application Detection and Traffic Monitoring
Don Thomas Jacob
Technical Marketing Engineer
ManageEngine NetFlow Analyzer
2. About ManageEngine
Servers & Windows Event Log &
Network Desktop ServiceDesk Security
Applications Infrastructure Compliance
Network Server Desktop Active Windows Vulnerability
Helpdesk
Monitoring Monitoring Management Directory Event Logs Analysis
Application
NetFlow Asset ITIL Service Syslog Patch
Perf SQL Server
Analysis Management Desk Management Management
Monitoring
Software
Network End User Remote Exchange Firewall Log Password
License
Config Mgmt Experience Control Server Analyzer Management
Tracking
ManageEngine is an IT management vendor focused on bringing a
complete IT management portfolio to all types of enterprises
3. Today’s Agenda
• What is BYOD
• Audience Poll
• Reasons for Concern
• Limitations of BYOD Solutions
• What is NetFlow
• Why NetFlow for BYOD Networks
• Questions
4. What is BYOD
Define: BYOD (Bring Your Own Device)
“ The practice of allowing employees to bring
their own computing devices like smartphones,
laptops or PDA to the workplace for use and
connectivity on the corporate network. “
5. What is BYOD
Define: BYOD (Bring Your Own Device)
“ The practice of allowing employees to bring their own computing
devices like smartphones, laptops or PDA to the workplace for use and
connectivity on the corporate network. “
• Cost Savings
Device/Hardware cost transferred to employee
• Free up your IT Team
Ownership on the employee – Devices handled better
Reduce the time spend by IT team on end-user device support and
troubleshooting
• Employee Satisfaction
Flexibility to work when & where as needed, on ones own chosen
device
• Increased Productivity
Telecommuting and flexible working hours increase productivity
6. What is BYOD
BYOD Reach
An Aberdeen study in July 2011 found 75% organizations are permitting
BYOD for business purposes
Gartner study says that by 2014, 90 percent of organizations will
support corporate applications on personal devices
http://www.gartner.com/it/page.jsp?id=1480514
Cisco is adopting a "Any Service, Any Device, Anywhere" architecture
which will evolve to a "Virtual Enterprise" – An enterprise which is
location and service independent
http://www.cisco.com/web/about/ciscoitatwork/downloads/ciscoitatwork/pdf/any_device_white_paper.pdf
7. POLL
What is your organization’s decision regarding
BYOD implementation?
BYOD allowed for all device types including laptops
BYOD permitted only for smartphones/tablets
Planning to implement
Currently not considering
9. Reasons for Concern
Reasons for Concern
Nascent Mobile Device Management (MDM)
No established MDM policies and monitoring solutions
No multi-platform or IPv6 support, may not be user friendly, etc.
Different devices, Different Operating Systems
Patch management and Compliance issues
Lack of Visibility
Where is the device in the network? ?
What is it accessing?
Applications - Unverified and Untrusted
Security issues, Malwares and Bandwidth Issues
Vanishing Network Perimeter
Remote connections, Security concerns
10. Reasons for Concern
Personal Work @ Work
• Tendency to use BYOD for personal purposes
• Exponential growth in HD Video and social media
• Live Streaming of highly popular NCAA men's college basketball
tournament was made available on Android devices
• Non-business related traffic volume increases
BANDWIDTH Issues / Poor Business Application Performance
12. Reasons for Concern
Device Loss = Data Loss
• Biggest threat is when BYOD leaves the enterprise network
• Business data / internal emails stored on device
• Device loss leads to sensitive information being left in the open
• Stolen device can be used to connect to your network remotely
for data theft or attacks
Major SECURITY Issues
13. Reasons for Concern
Unverified and Greedy Applications
• Mobile device growth has lead to an application explosion
• New and unverified applications downloaded and installed
• Security threats and malwares risks comes along unverified apps
• Greedy Apps: Un-optimized, bandwidth hogging applications
• Bottlenecks due to traffic from junk applications
SECURITY Issues & BANDWIDTH Bottlenecks
14. Reasons for Concern
Inviting Network Threats
• BYOD users browse from unsecured Wi-Fi networks, visits
untrusted sites or download from untrusted vendors
• “Dancing pigs over Security” – Users can be careless and devices
outside the network perimeter are easier to attack and infect
• Huge increase in number of malwares targeting mobile software
platforms like iOS and Android
• Infected device carried into the network – Malware enters LAN
Network open to MALWARE
15. Reasons for Concern
Inviting Network Threats
• BYOD users browse from unsecured Wi-Fi networks, visits
untrusted sites or download from untrusted vendors
• “Dancing pigs over Security” – Users can be careless and devices
outside the network perimeter are easier to attack and infect
• Huge increase in number of malwares targeting mobile software
platforms like iOS and Android
• Infected device carried into the network – Malware enters LAN
Network open to MALWARE
17. Limitations of BYOD Solutions
Limitations of BYOD Solutions
More Control on BYOD Devices & Web Traffic
Limitation: As good as having company issued device - BYOD advantage lost
Vague and impractical solution - Genuine users will be effected
Up-to-date Patch Management
Limitation: No multi-platform MDM or patch management solution available for
the highly diverse mobile ecosystem
Anti-Virus Software on Mobile Devices
Limitation: New age malware exploits zero-day vulnerabilities
Multi Layered Security & Internal IDS
Limitations: Traditional, layered security solutions (firewall, proxy, content filtering,
etc.) will fall short against new age threats
Expensive to implement IDS/IPS in access layer to stop internal malware
19. What is NetFlow
What is NetFlow
Technology developed by Cisco - Designed as a switching path
Is now the Primary IP Traffic accounting technology
Information on the WHO, WHAT, WHEN and WHERE of IP traffic
All major vendors now support flow export:
NetFlow - Cisco, Adtran, 3COM
J-Flow - Juniper
IPFIX - Nortel
sFlow - Alcatel, HP, Brocade, Enterasys, Dell
20. What is NetFlow
7 unique fields define a flow
Source Interface (ifindex)
Protocol
Source IP Address
Destination IP Address
Source Port
Destination Port
ToS
21. What is NetFlow
How NetFlow Works
Traffic passes through routing/switching device interface
Flow created (remember the 7 fields) and stored in NetFlow cache
Flows grouped and exported in UDP packets to collector based on
active and inactive flow timeout
NetFlow Cache
Flow Analyzer
22. What is NetFlow
NetFlow enabled interface
Core Network
Edge Router
NetFlow Packets
• Approximately 1500 bytes
• Each contains 20-50 flow
records
UDP NetFlow
NetFlow Collector
23. What is NetFlow
Source Port
Source IP Address
Who ? Destination Port What ?
Destination IP Address
Protocol
When ? Packet Count Usage ?
Flow Start and End time
Octet count
ToS
QoS ? TCP Flags QoS ?
Protocol
NextHop
Input and Output Interface
Path ? Source AS Information Route ?
(ifindex)
Destination AS Information
25. Why NetFlow for BYOD
In-Depth Tracking
• NetFlow provides real-time information about network traffic
• BYOD monitoring begins at the access layer - Closer to traffic
source
• Flow export supported on most enterprise devices including
core and access layer switches
• No impact on the network and devices due to flow export
3COM Brocade HP ProCurve
26. Why NetFlow for BYOD
In-Depth Tracking
• NetFlow provides real-time information about network traffic
• BYOD monitoring begins at the access layer - Closer to traffic
source
• Flow export supported on most enterprise devices including
core and access layer switches
• No impact on the network and devices due to flow export
27. Why NetFlow for BYOD
In-Depth Tracking
• NetFlow provides real-time information about network traffic
• BYOD monitoring begins at the access layer - Closer to traffic source
• Flow export supported on most enterprise devices including core and
access layer switches
• No impact on the network and devices due to flow export
• Track impact of BYOD on bandwidth, who are the top talkers for each
interface and IP Subnet
• What are the devices doing on your network, what application is being
used and what is the destination of traffic
28. Why NetFlow for BYOD
In-Depth Tracking
• NetFlow provides real-time information about network traffic
• BYOD monitoring begins at the access layer - Closer to traffic source
• Flow export supported on most enterprise devices including core and
access layer switches
• No impact on the network and devices due to flow export
• Track impact of BYOD on bandwidth, who are the top talkers for each
interface and IP Subnet
• What are the devices doing on your network, what application is being
used and what is the destination of traffic
29. Why NetFlow for BYOD
In-Depth Tracking
• NetFlow provides real-time information about network traffic
• BYOD monitoring begins at the access layer - Closer to traffic source
• Flow export supported on most enterprise devices including core and
access layer switches
• No impact on the network and devices due to flow export
• Track impact of BYOD on bandwidth, who are the top talkers for each
interface and IP Subnet
• What are the devices doing on your network, what application is being
used and what is the destination of traffic
30. Why NetFlow for BYOD
In-Depth Tracking
• NetFlow provides real-time information about network traffic
• BYOD monitoring begins at the access layer - Closer to traffic source
• Flow export supported on most enterprise devices including core and
access layer switches
• No impact on the network and devices due to flow export
• Track impact of BYOD on bandwidth, who are the top talkers for each
interface and IP Subnet
• What are the devices doing on your network, what application is being
used and what is the destination of traffic
31. Why NetFlow for BYOD
Where is the Network Perimeter
• Vanishing network perimeter – Increase in telecommuting and
hence more remote connections with BYOD
• Stolen mobile devices or malware infected devices can be used to
connect to the enterprise network over VPN
• Flow export supported by all major firewalls and routers
• Use NetFlow data to see which device is connecting over tunnels
and where the traffic is headed
32. Why NetFlow for BYOD
Where is the Network Perimeter
• Vanishing network perimeter – Increase in telecommuting and
hence more remote connections with BYOD
• Stolen mobile devices or malware infected devices can be used to
connect to the enterprise network over VPN
• Flow export supported by all major firewalls and routers
• Use NetFlow data to see which device is connecting over tunnels
and where the traffic is headed
33. Why NetFlow for BYOD
Where is the Network Perimeter
• Vanishing network perimeter – Increase in telecommuting and
hence more remote connections with BYOD
• Stolen mobile devices or malware infected devices can be used to
connect to the enterprise network over VPN
• Flow export supported by all major firewalls and routers
• Use NetFlow data to see which device is connecting over tunnels
and where the traffic is headed
34. Why NetFlow for BYOD
New-Age Malwares
• BYOD growth = Increase in malwares targeting mobile devices
• Most new malwares are zero day based - No signature for IDS or
IPS to identify and stop the malwares
• Infected devices are sometimes physically carried into the network
after being infected from elsewhere
• IDS and IPS in the internal network is not feasible due to costs
• Network traffic behavior analysis can help with anomaly detection
Image Source: PCWorld
35. Why NetFlow for BYOD
New-Age Malwares
• BYOD growth = Increase in malwares targeting mobile devices
• Most new malwares are zero day based - No signature for IDS or
IPS to identify and stop the malwares
• Infected devices are sometimes physically carried into the network
after being infected from elsewhere
• IDS and IPS in the internal network is not feasible due to costs
• Network traffic behavior analysis can help with anomaly detection
Image Source: PCWorld
36. Why NetFlow for BYOD
New-Age Malwares
• NetFlow packets holds granular information on IP traffic behavior
• ManageEngine NetFlow Analyzer’s has Advanced Security Analytics
Module (ASAM)
• ASAM leverages on the already exported NetFlow or sFlow data for
behavior anomaly detection
• Real time threat detection using Continuous Stream Mining Engine
technology
• Threats that surpass your IDS and other traditional security systems
can be detected
• Anomaly classification based on Offender, Target, Path and Problem
40. Conclusion
• MDM is Evolving – Hold the high-cost investment
Not multi-platform - Apple, Android, Blackberry, Symbian
Support for new technologies - IPv6, mobile apps
Many solutions are basic - Need to evolve a lot more
• Security and monitoring most important aspects of BYOD
• Leverage on default or low cost technologies like NetFlow
• Most Important - Educate users
Why security is more important than the fancy screensaver
Why bandwidth is important for the organization
41. Questions?
ManageEngine NetFlow Analyzer is used by over 4000 customers worldwide
www.netflowanalyzer.com
NetFlow Analyzer Blogs:
https://blogs.netflowanalyzer.com
User Forums:
http://forums.netflowanalyzer.com
LinkedIn:
http://www.linkedin.com/groups?gid=4208806&trk=hb_side_g
TAC Team:
netflowanalyzer-support@manageengine.com
ManageEngine Sales:
sales@manageengine.com