SlideShare a Scribd company logo
Using NetFlow to Streamline
Security Analysis and Response
to Cyber-Threats
Richard Trujillo, Product Marketing Manager, Emulex
Joe Yeager, Director of Product Management, Lancope
Lee Doyle, Principal Analyst, Doyle Research

© 2013 Emulex Corporation
2013
2013

The Importance of
Network Visibility
Doyle Research, 2013

2
Leading Trends Impacting the Network
Cloud

VDI
Mobile

Big Data

Doyle Research, 2013

BYOD

3
Networks are Critical to the Business
 Networks deliver applications and information
throughout the organization
 Networks must be high performance, low
latency, reliable, and secure
 Traffic patterns are changing: more east-west,
less north-south

 Network/data center downtime is expensive
 Managing/Securing the network remains
challenging and costly (OPEX)
Doyle Research, 2013

4
Network Complexity and Value are
Increasing

Customer Value

SDN Adoption
Bandwidth
Growth
Data Center
 Server
virtualization
 VM mobility
 Network/Storage
Convergence

 Wide spread
adoption of
10GB

 Separation of
Control and Data
Plane
 Network
Programmability

 Cloud

 Centralized
Intelligence

 Video

 Network Slicing

 Mobility

Network Complexity
Doyle Research, 2013

5
Network Visibility Benefits
Security

Monitor All Traffic

Identify and isolate
“bad” traffic, ability to
handle DDOS attacks

Better understand and
tune the network;
respond to dynamic
traffic patterns

Performance

Improved OPEX

Supports off load of
traffic analysis from
production switches

Doyle Research, 2013

Improved network
management and
reduced operational
costs

Automation

Tools help
IT/network staff with
routine monitoring
tasks

6
Product Requirements
 Improved performance monitoring = visibility at scale
 Secure networks – leveraging behavior analysis to detect
traffic anomalies
 Monitoring solution must support complete analysis of
10GB traffic flow (high performance)
 Move from reactive to proactive management with new
tools – software defined applications
 Ease of installation, ease of operation, cost effective
 Support for standards and 3rd party applications

Doyle Research, 2013

7
StealthWatch for
Security Analysis and
Response to CyberThreats
Joe Yeager
Director of Product Mgmt

©2013 Lancope , Inc. All Rights Reserved.

8
Who is Lancope?
Company Profile

• 600+ enterprise clients -- Global 2000
• HQ in Atlanta, offices all around the world

Available on
Cisco’s Global
Price List

• 4 years profitability; 160+ employees
Technology Leadership
• StealthWatch Labs Research Team
• Patented behavioral analysis techniques
• 150+ algorithms
• Scalable flow analysis
Management Team
• Experienced senior leadership from IBM,
nCircle, ISS, DELL SecureWorks, HP, and
Motorola/AirDefense
• Over 100 years combined experience
©2013 Lancope , Inc. All Rights Reserved.

9
Big Data Center Focus Areas

Cyber Threat Problem

Cyber Threat Solution

DDoS Case Study
©2013 Lancope , Inc. All Rights Reserved.

10
Big Data Center Focus Areas

Cyber Threat Problem

Cyber Threat Solution

DDoS Case Study
©2013 Lancope , Inc. All Rights Reserved.

11
Threat Landscape of Today
APT and Insider Threats Top of Mind

174M
855
98%
416 days
100%

• Records stolen
• Incidents
• Involve external threat actors
• Before attackers discovered by a 3rd party
• Valid credentials used
Sources: Verizon 2013 Data Breach Investigations Report, Mandiant M Trends

©2013 Lancope , Inc. All Rights Reserved.
Visibility Throughout the Kill Chain
Strategy for APT and Insider Threats

Recon

Exploitation

Initial
Infection

Command &
Control

Internal
Pivot

Data
Preparation

Data
Exfiltration

• This is the Kill Chain concept introduced by Mike Cloppert at Lockheed.
• Each step in the chain is important to look at individually to develop a
security strategy across both tools and departments.
• Many of these can be covered by a NetFlow solution that has both
analytics and incident response capabilities.

©2013 Lancope , Inc. All Rights Reserved.

13
APT Timeline Example
Do you know what happened while you were responding?
1:06:15 PM:
Internal Host
Visits Malicious
Web Site

1:06:30 PM:
Malware Infection
Complete, Accesses
Internet Command and
Control

©2013 Lancope , Inc. All Rights Reserved.

1:06:35 PM:
Malware begins
scanning internal
network

1:07:00 PM:
Gateway malware analysis
identifies the transaction
as malicious

1:13:59 PM:
Multiple internal
infected hosts

1:14:00 PM:
Administrators
manually disconnect
the initial infected host

14
Big Data Center Focus Areas

Cyber Threat Problem

Cyber Threat Solution

DDoS Case Study
©2013 Lancope , Inc. All Rights Reserved.

15
Why Use NetFlow?
Complete Network Visibility
• NetFlow is a record of every conversation on your network from a
“trusted 3rd party” – i.e. it is not affected by trustworthiness of hosts
 Perfect audit trail
 Provides ability to baseline what is normal
• NetFlow is very lightweight and compresses very well
 Typically can store for 45-90 days with StealthWatch
NetFlow

Phone Bill (CDR)
©2013 Lancope , Inc. All Rights Reserved.

16
Cyber Threat Solution
Goal: Knowledge as Focus instead of Data

Visibility

Analysis

Cyber
Threat
Intelligence

Data

Information

Knowledge

Big Data Collection

©2013 Lancope , Inc. All Rights Reserved.

+

Big Analytics

+

Big Incident Response

17
Big Data Collection
What Constitutes “Big”?

Per Second
Per Hour
Per Day
Per 45 Days

1 StealthWatch Collector
Events
Data (MB)
120,000
9
432,000,000
30,960
10,368,000,000
743,040
466,560,000,000
33,436,800

Per Second
Per Hour
Per Day
Per 45 Days

StealthWatch System (x25)
Events
Data (MB)
3,000,000
215
10,800,000,000
774,000
259,200,000,000
18,576,000
11,664,000,000,000
835,920,000

©2013 Lancope , Inc. All Rights Reserved.

18
Big Analytics
Real-time Detection of Indicators of Compromise

Collect Vast
Amount of Data

Correlate
Metadata for
Context

©2013 Lancope , Inc. All Rights Reserved.

Baseline
Normal
Activity

Identify
Deviations
from Norm

Alert on
Indicators of
Compromise

19
Big Incident Response
Powerful Investigation Capabilities
• Who did this?
– Usernames, IP Addresses, Devices,
Country, ISP

• What did they do?
– What behavior did they engage in?
What else did they do?

• Where did they go?
– What hosts on my network were
accessed?

• When?
– Have we investigated the full
intrusion timeline?

• Why?
– What is their objective?
© 2013 Lancope, Inc. All rights reserved.

20
Big Data Center Focus Areas

Cyber Threat Problem

Cyber Threat Solution

DDoS Case Study
©2013 Lancope , Inc. All Rights Reserved.

21
DDoS – a Big Problem!
Sec Ops & Net Ops
StealthWatch’s Focus:
• Alert on attack, citing individual target of attack
• Fast investigative workflow for impact & root
cause analysis
• Monitor mitigation success

© 2013 Lancope, Inc. All rights reserved.

22
DDoS
Sometimes DDoS Attacks Are Obvious…

© 2013 Lancope, Inc. All rights reserved.

23
DDoS
And Sometimes They Are Not So Obvious…

Increase in Malformed
Fragment Alarms

Strange Short Bursts in Traffic

© 2013 Lancope, Inc. All rights reserved.

24
DDoS
Quick Investigation Workflow

- 1.5 Gbps of DNS Traffic and 1.5 Gbps of Undefined UDP Traffic
- Total of 107.25 GB of data sent between these two services

-

Right-click drill down to identify Top DNS Hosts
Top 3 Hosts have over 96,000 peers and over 190,000 flows EACH

© 2013 Lancope, Inc. All rights reserved.

25
DDoS
Quick Investigation Workflow

Each DNS response contains
the same domain: “pkts.asia”

Conclusion: This is a DNS amplification attack
and these type of packets need to be blocked.
© 2013 Lancope, Inc. All rights reserved.

26
Network Visibility Solution:
EndaceFlow 3040 & StealthWatch
FlowCollector
Richard Trujillo – Marketing Manager, Emulex

Emulex Confidential - © 2013 Emulex Corporation
Our Approach to NPM/APM/SEM – Best of Breed
APM
App

NPM
App

IDS
App

HFT
App

EndaceVision Network Search
Engine with Fusion
Connectors

Endace Network Visibility Products
10/40/100GbE

Our approach enables tailored best-of-breed solutions
– All tools share data from same secure location in datacenter
– Automated workflow, “pivot to packets” speeds up issue resolution

Lower Investment While Increasing ROI
– Only buy what you need

– Plan and train staff on the tools that fit your situation best
28

© 2013 Emulex Corporation
How Much Network Visibility Do You Need?
Just as in the video world, there is a big difference between lowdef network visibility and high-def network visibility
– Low-def shows you the overall trends – great for long-term traffic
planning and identifying large deviations from the norm
– High-def lets you see the action (microbursts, dropped packets, protocol
errors) that underlie the most difficult application performance issues
The visibility Emulex tools
provide
•
•
•

See microbursts
Know exactly what data has been
compromised
Identify issues impacting
application performance

The visibility most tools provide

Sampled data cannot provide the detail you need to resolve
difficult security breaches or application performance issues
29

© 2013 Emulex Corporation
EndaceFlow™ 3040– NetFlow Generation
Extreme Performance
– The EndaceFlow 3040 provides complete flow visibility at
10Gbps (4x10GbE)
– 30Gbps of flow generation and a total of 64M active flows.
Custom Filtering
– Customize exports to gain visibility of specific networks within
the datacenter.
– Load balance flow records across multiple collectors
– The EndaceFlow 3040 supports up to 120 filters across 4
collectors for load balancing flow records across multiple
collectors
Advanced Hash Load Balancing
– The advanced HLB feature minimizes manual configuration
with flow safe load balancing, reducing operational
expenditures (OPEX).
Ease of Integration
– Supports V5, V9 and IPFIX flow formats and a broad range
of fields, allows seamless integration with any NetFlow
collector in the market.
30

© 2013 Emulex Corporation

EndaceFlow 3040

High-speed NetFlow
generation
4x10GbE ports
Data Center Deployment Topology
Access
Layer

Core
Switch
Tap or
SPAN

Edge
Firewall
Tap or
SPAN

Tap or
SPAN

Edge
Router

`

NetFlow

Packets

Packets
NetFlow

Packets
NetFlow

Rack
Servers

Internet

`

Packets
NetFlow

Packets
NetFlow

DMZ

SecOps deployment
monitoring both sides of the
DMZ; record attacks, ID
compromised data

Packets
NetFlow

Endpoint
Security

Packets

NetFlow

EndaceProbe
Packet Capture

EndaceFlow
NetFlow Generation

Lancope StealthWatch
FlowCollector
Endace
Management
Server

Forensics
NBAD
EndaceVision

SIEM

StealthWatch

Security Operations Center
31

`

© 2013 Emulex Corporation

1. Alarm triggers
event. Analyst
investigates using
the EM interface

2. Analyst pivots to
forensics tool for deep
dive into packets enabling
rapid resolution
3. Analyst closes event
and makes changes to
prevention rules if
appropriate
Use Case: Security Operations
Consumer Electronics/Content Provider Uses Lancope and
EndaceFlow to Improve Security Incident Response Times
Business problem: As the customer increased deployment of 10GbE in
their data centers, they needed to improve their security monitoring
capabilities and significantly reduce their incident response time and costs.
The customer considered integrated solutions, but found that the poor
performance and high costs impacted the amount of monitoring they could
deploy. They also found that the sampled nature of the data hindered the
response teams ability to resolve issues quickly.

Products deployed:
– EndaceFlow 3040 NetFlow Generator Appliances
– Lancope StealthWatch™ FlowCollector

Competitors
– Cisco NGA

32

© 2013 Emulex Corporation
Use Case: Security Operations (cont’d)
Why did we win?
Network

Ability to generate 100%
unsampled netflows on
multiple 10GbE links

Misc
15-20 Gbps

Console

Network
Packet
Broker

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

PWR1
PWR2

Director X Stream

V

Ability of our overall
solution to handle up to
60Gb/s of traffic

HTTPS
45-60 Gbps

Management

HTTPS
12-20 Gbps

Misc
8-10 Gbps

100K Flows/sec

Collector Collector Collector Collector Collector Collector Collector Collector

Advanced filtering and
load balancing enabled
overall system success

NetFlow
Dock VM

100K Flows/sec
Collector Collector Collector Collector Collector Collector Collector Collector

NetFlow
Dock VM

Business benefits:
– Reduced response time for critical security incidents from 30-50 hours to a
couple of hours (average)
– Reduced the time required per team member per incident by 12 man-hours
– Provided future expansion room for customer to run traffic up to 100Gb/s
33

© 2013 Emulex Corporation
Conclusions
Complete, real-time and end-to-end visibility
Endace and Lancope provides a highly scalable solution
Reduces cost and helps eliminate downtime

…. How can we help you with visibility into your network?

34

© 2013 Emulex Corporation
35

© 2013 Emulex Corporation

More Related Content

What's hot

Data Center Security
Data Center SecurityData Center Security
Data Center Security
Cisco Canada
 
SDN Abstractions
SDN AbstractionsSDN Abstractions
SDN Abstractions
martin_casado
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
Cohesive Networks
 
Mellanox Market Leading Solutions
Mellanox Market Leading SolutionsMellanox Market Leading Solutions
Mellanox Market Leading Solutions
Mellanox Technologies
 
Presentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforumPresentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforum
videos
 
Software Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXSoftware Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSX
Zivaro Inc
 
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las VegasIntroduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
Bruno Teixeira
 
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSX
VMworld
 
TFI2014 Session I - State of SDN - Gary Hemminger
TFI2014 Session I - State of SDN - Gary HemmingerTFI2014 Session I - State of SDN - Gary Hemminger
TFI2014 Session I - State of SDN - Gary Hemminger
Colorado Internet Society (CO ISOC)
 
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld
 
The Generation of Open Ethernet
The Generation of Open Ethernet The Generation of Open Ethernet
The Generation of Open Ethernet
Mellanox Technologies
 
APAC Webinar: Learn how to maximise the benefits of NFV
APAC Webinar: Learn how to maximise the benefits of NFVAPAC Webinar: Learn how to maximise the benefits of NFV
APAC Webinar: Learn how to maximise the benefits of NFV
F5NetworksAPJ
 
Presentación Intel evento NFV movilforum
Presentación Intel evento NFV movilforumPresentación Intel evento NFV movilforum
Presentación Intel evento NFV movilforum
videos
 
Virtualization Acceleration
Virtualization Acceleration Virtualization Acceleration
Virtualization Acceleration
Mellanox Technologies
 
SDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center NetworkingSDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center Networking
Thomas Graf
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge Clouds
Jay Bryant
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)
Milson Munakami
 
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld
 
Mellanox's Operational Excellence
Mellanox's Operational ExcellenceMellanox's Operational Excellence
Mellanox's Operational Excellence
Mellanox Technologies
 
POE+ L2 switches HPE FlexNetwork 5130 vs Dell Networking N2048P
POE+ L2 switches HPE FlexNetwork 5130 vs Dell Networking N2048PPOE+ L2 switches HPE FlexNetwork 5130 vs Dell Networking N2048P
POE+ L2 switches HPE FlexNetwork 5130 vs Dell Networking N2048P
juet-y
 

What's hot (20)

Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
SDN Abstractions
SDN AbstractionsSDN Abstractions
SDN Abstractions
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
 
Mellanox Market Leading Solutions
Mellanox Market Leading SolutionsMellanox Market Leading Solutions
Mellanox Market Leading Solutions
 
Presentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforumPresentación Enrique Algaba NFV movilforum
Presentación Enrique Algaba NFV movilforum
 
Software Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXSoftware Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSX
 
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las VegasIntroduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
 
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSXVMworld 2014: Virtualize your Network with VMware NSX
VMworld 2014: Virtualize your Network with VMware NSX
 
TFI2014 Session I - State of SDN - Gary Hemminger
TFI2014 Session I - State of SDN - Gary HemmingerTFI2014 Session I - State of SDN - Gary Hemminger
TFI2014 Session I - State of SDN - Gary Hemminger
 
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSX
 
The Generation of Open Ethernet
The Generation of Open Ethernet The Generation of Open Ethernet
The Generation of Open Ethernet
 
APAC Webinar: Learn how to maximise the benefits of NFV
APAC Webinar: Learn how to maximise the benefits of NFVAPAC Webinar: Learn how to maximise the benefits of NFV
APAC Webinar: Learn how to maximise the benefits of NFV
 
Presentación Intel evento NFV movilforum
Presentación Intel evento NFV movilforumPresentación Intel evento NFV movilforum
Presentación Intel evento NFV movilforum
 
Virtualization Acceleration
Virtualization Acceleration Virtualization Acceleration
Virtualization Acceleration
 
SDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center NetworkingSDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center Networking
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge Clouds
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)
 
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
 
Mellanox's Operational Excellence
Mellanox's Operational ExcellenceMellanox's Operational Excellence
Mellanox's Operational Excellence
 
POE+ L2 switches HPE FlexNetwork 5130 vs Dell Networking N2048P
POE+ L2 switches HPE FlexNetwork 5130 vs Dell Networking N2048PPOE+ L2 switches HPE FlexNetwork 5130 vs Dell Networking N2048P
POE+ L2 switches HPE FlexNetwork 5130 vs Dell Networking N2048P
 

Viewers also liked

How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-Suite
SurfWatch Labs
 
Se “Embrace Change” è difficile.
Se “Embrace Change” è difficile.Se “Embrace Change” è difficile.
Se “Embrace Change” è difficile.
Fabio Mora
 
La salute del software
La salute del softwareLa salute del software
La salute del software
Guido Pederzini
 
When Tdd Goes Awry (IAD 2013)
When Tdd Goes Awry (IAD 2013)When Tdd Goes Awry (IAD 2013)
When Tdd Goes Awry (IAD 2013)
Uberto Barbini
 
Agile@scale - Agile Day 2013
Agile@scale - Agile Day 2013Agile@scale - Agile Day 2013
Agile@scale - Agile Day 2013
Felice Pescatore
 
Lean anche io! No tu no! - Italian Agile Days 2013
Lean anche io! No tu no! - Italian Agile Days 2013Lean anche io! No tu no! - Italian Agile Days 2013
Lean anche io! No tu no! - Italian Agile Days 2013
Andrea Scavolini
 
TDD anche su iOS
TDD anche su iOSTDD anche su iOS
TDD anche su iOS
Andrea Francia
 
Effective Code Transformations in C++
Effective Code Transformations in C++Effective Code Transformations in C++
Effective Code Transformations in C++
Marco Arena
 
Outcome not Output: A Story of Lean UX Adoption
Outcome not Output: A Story of Lean UX AdoptionOutcome not Output: A Story of Lean UX Adoption
Outcome not Output: A Story of Lean UX Adoption
Steve Maraspin
 
Instilling Scrum Workshop
Instilling Scrum WorkshopInstilling Scrum Workshop
Instilling Scrum Workshop
Raoul Buzziol
 
Bravi si diventa
Bravi si diventaBravi si diventa
Bravi si diventa
Filippo Liverani
 
Agileday Coderetreat 2013
Agileday Coderetreat 2013Agileday Coderetreat 2013
Agileday Coderetreat 2013
Gabriele Lana
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
Candan BOLUKBAS
 
Agile requirements - alla ricerca del filo rosso (iad 2013)
Agile requirements - alla ricerca del filo rosso (iad 2013)Agile requirements - alla ricerca del filo rosso (iad 2013)
Agile requirements - alla ricerca del filo rosso (iad 2013)
Fabio Armani
 
10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk
Mark Gibson
 
One, No One, One Hundred Thousand Projects (Uno, Nessuno, Centomila Progetti)
One, No One, One Hundred Thousand Projects (Uno, Nessuno, Centomila Progetti)One, No One, One Hundred Thousand Projects (Uno, Nessuno, Centomila Progetti)
One, No One, One Hundred Thousand Projects (Uno, Nessuno, Centomila Progetti)
Gaetano Mazzanti
 
Agile in 45 minuti
Agile in 45 minutiAgile in 45 minuti
Agile in 45 minuti
Giulio Roggero
 
From Vision To Product
From Vision To ProductFrom Vision To Product
From Vision To Product
Stefano Leli
 
Manual mikrotik
Manual mikrotikManual mikrotik
Manual mikrotik
Alex Dau
 

Viewers also liked (20)

How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-Suite
 
Se “Embrace Change” è difficile.
Se “Embrace Change” è difficile.Se “Embrace Change” è difficile.
Se “Embrace Change” è difficile.
 
La salute del software
La salute del softwareLa salute del software
La salute del software
 
When Tdd Goes Awry (IAD 2013)
When Tdd Goes Awry (IAD 2013)When Tdd Goes Awry (IAD 2013)
When Tdd Goes Awry (IAD 2013)
 
Agile@scale - Agile Day 2013
Agile@scale - Agile Day 2013Agile@scale - Agile Day 2013
Agile@scale - Agile Day 2013
 
Lean anche io! No tu no! - Italian Agile Days 2013
Lean anche io! No tu no! - Italian Agile Days 2013Lean anche io! No tu no! - Italian Agile Days 2013
Lean anche io! No tu no! - Italian Agile Days 2013
 
TDD anche su iOS
TDD anche su iOSTDD anche su iOS
TDD anche su iOS
 
Effective Code Transformations in C++
Effective Code Transformations in C++Effective Code Transformations in C++
Effective Code Transformations in C++
 
Outcome not Output: A Story of Lean UX Adoption
Outcome not Output: A Story of Lean UX AdoptionOutcome not Output: A Story of Lean UX Adoption
Outcome not Output: A Story of Lean UX Adoption
 
Instilling Scrum Workshop
Instilling Scrum WorkshopInstilling Scrum Workshop
Instilling Scrum Workshop
 
dalTDDalBDD
dalTDDalBDDdalTDDalBDD
dalTDDalBDD
 
Bravi si diventa
Bravi si diventaBravi si diventa
Bravi si diventa
 
Agileday Coderetreat 2013
Agileday Coderetreat 2013Agileday Coderetreat 2013
Agileday Coderetreat 2013
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 
Agile requirements - alla ricerca del filo rosso (iad 2013)
Agile requirements - alla ricerca del filo rosso (iad 2013)Agile requirements - alla ricerca del filo rosso (iad 2013)
Agile requirements - alla ricerca del filo rosso (iad 2013)
 
10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk
 
One, No One, One Hundred Thousand Projects (Uno, Nessuno, Centomila Progetti)
One, No One, One Hundred Thousand Projects (Uno, Nessuno, Centomila Progetti)One, No One, One Hundred Thousand Projects (Uno, Nessuno, Centomila Progetti)
One, No One, One Hundred Thousand Projects (Uno, Nessuno, Centomila Progetti)
 
Agile in 45 minuti
Agile in 45 minutiAgile in 45 minuti
Agile in 45 minuti
 
From Vision To Product
From Vision To ProductFrom Vision To Product
From Vision To Product
 
Manual mikrotik
Manual mikrotikManual mikrotik
Manual mikrotik
 

Similar to Using NetFlow to Streamline Security Analysis and Response to Cyber Threats

Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
Scalar Decisions
 
Using NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application PerformanceUsing NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application Performance
Emulex Corporation
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
Cloudera, Inc.
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
 
Nas nie zaatakują!
Nas nie zaatakują!Nas nie zaatakują!
Nas nie zaatakują!
Biznes to Rozmowy
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021
Mouaz Alnouri
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
Savvius, Inc
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
Dell EMC World
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
Tryzens
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
Lokesh Sharma
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
Cloudflare
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
Frederik Lawson
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overview
Priyanka Aash
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
Zscaler
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
TranVu383073
 
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointExtending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Lancope, Inc.
 
DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.
Глеб Хохлов
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
Lancope, Inc.
 

Similar to Using NetFlow to Streamline Security Analysis and Response to Cyber Threats (20)

Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Using NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application PerformanceUsing NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application Performance
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Nas nie zaatakują!
Nas nie zaatakują!Nas nie zaatakują!
Nas nie zaatakują!
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overview
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointExtending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
 
DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
 

More from Emulex Corporation

Acronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNFAcronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNF
Emulex Corporation
 
Improving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT InfrastructureImproving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT Infrastructure
Emulex Corporation
 
SC Magazine eSymposium: SIEM
SC Magazine eSymposium: SIEMSC Magazine eSymposium: SIEM
SC Magazine eSymposium: SIEM
Emulex Corporation
 
Network Forensics for Splunk, an Emulex presentation
Network Forensics for Splunk, an Emulex presentationNetwork Forensics for Splunk, an Emulex presentation
Network Forensics for Splunk, an Emulex presentation
Emulex Corporation
 
The Great IT Migration
The Great IT MigrationThe Great IT Migration
The Great IT Migration
Emulex Corporation
 
Using Network Recording and Search to Improve IT Service Delivery
Using Network Recording and Search to Improve IT Service DeliveryUsing Network Recording and Search to Improve IT Service Delivery
Using Network Recording and Search to Improve IT Service Delivery
Emulex Corporation
 
Introducing Endace Packets - EndaceVision™ with Protocol Decodes
Introducing Endace Packets - EndaceVision™ with Protocol DecodesIntroducing Endace Packets - EndaceVision™ with Protocol Decodes
Introducing Endace Packets - EndaceVision™ with Protocol Decodes
Emulex Corporation
 
Linked in Twitter Facebook Google+ Email Embed Share Flash Across Virtualized...
Linked in Twitter Facebook Google+ Email Embed Share Flash Across Virtualized...Linked in Twitter Facebook Google+ Email Embed Share Flash Across Virtualized...
Linked in Twitter Facebook Google+ Email Embed Share Flash Across Virtualized...
Emulex Corporation
 
Tap DANZing - Arista Networks Redefining the Cost of Accessing Network Traffic
Tap DANZing - Arista Networks Redefining the Cost of Accessing Network TrafficTap DANZing - Arista Networks Redefining the Cost of Accessing Network Traffic
Tap DANZing - Arista Networks Redefining the Cost of Accessing Network Traffic
Emulex Corporation
 
First Look Webcast: OneCore Storage SDK 3.6 Roll-out and Walkthrough
First Look Webcast: OneCore Storage SDK 3.6 Roll-out and WalkthroughFirst Look Webcast: OneCore Storage SDK 3.6 Roll-out and Walkthrough
First Look Webcast: OneCore Storage SDK 3.6 Roll-out and Walkthrough
Emulex Corporation
 
Why I/O is Strategic for Convergence - with 451 Research
Why I/O is Strategic for Convergence - with 451 ResearchWhy I/O is Strategic for Convergence - with 451 Research
Why I/O is Strategic for Convergence - with 451 Research
Emulex Corporation
 
Emulex and the Evaluator Group Present Why I/O is Strategic for Big Data
Emulex and the Evaluator Group Present Why I/O is Strategic for Big Data Emulex and the Evaluator Group Present Why I/O is Strategic for Big Data
Emulex and the Evaluator Group Present Why I/O is Strategic for Big Data
Emulex Corporation
 
Emulex and IDC Present Why I/O is Strategic for the Cloud
Emulex and IDC Present Why I/O is Strategic for the Cloud Emulex and IDC Present Why I/O is Strategic for the Cloud
Emulex and IDC Present Why I/O is Strategic for the Cloud
Emulex Corporation
 
Get Better I/O Performance in VMware vSphere 5.1 Environments with Emulex 16G...
Get Better I/O Performance in VMware vSphere 5.1 Environments with Emulex 16G...Get Better I/O Performance in VMware vSphere 5.1 Environments with Emulex 16G...
Get Better I/O Performance in VMware vSphere 5.1 Environments with Emulex 16G...
Emulex Corporation
 
Get Better I/O Performance in VMware vSphere 5.1 Environments with Emulex 16G...
Get Better I/O Performance in VMware vSphere 5.1 Environments with Emulex 16G...Get Better I/O Performance in VMware vSphere 5.1 Environments with Emulex 16G...
Get Better I/O Performance in VMware vSphere 5.1 Environments with Emulex 16G...
Emulex Corporation
 
Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...
Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...
Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...
Emulex Corporation
 
Introducing OneCommand Vision 3.0, I/O management that gives your application...
Introducing OneCommand Vision 3.0, I/O management that gives your application...Introducing OneCommand Vision 3.0, I/O management that gives your application...
Introducing OneCommand Vision 3.0, I/O management that gives your application...
Emulex Corporation
 
Emulex Presents Why I/O is Strategic Global Survey Results
Emulex Presents Why I/O is Strategic Global Survey ResultsEmulex Presents Why I/O is Strategic Global Survey Results
Emulex Presents Why I/O is Strategic Global Survey Results
Emulex Corporation
 
Integrating and Optimizing Suricata with FastStack™ Sniffer10G™
Integrating and Optimizing Suricata with FastStack™ Sniffer10G™Integrating and Optimizing Suricata with FastStack™ Sniffer10G™
Integrating and Optimizing Suricata with FastStack™ Sniffer10G™
Emulex Corporation
 
Optimizing Performance of your Oracle Database using 8Gb Fibre Channel
Optimizing Performance of your Oracle Database using 8Gb Fibre ChannelOptimizing Performance of your Oracle Database using 8Gb Fibre Channel
Optimizing Performance of your Oracle Database using 8Gb Fibre Channel
Emulex Corporation
 

More from Emulex Corporation (20)

Acronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNFAcronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNF
 
Improving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT InfrastructureImproving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT Infrastructure
 
SC Magazine eSymposium: SIEM
SC Magazine eSymposium: SIEMSC Magazine eSymposium: SIEM
SC Magazine eSymposium: SIEM
 
Network Forensics for Splunk, an Emulex presentation
Network Forensics for Splunk, an Emulex presentationNetwork Forensics for Splunk, an Emulex presentation
Network Forensics for Splunk, an Emulex presentation
 
The Great IT Migration
The Great IT MigrationThe Great IT Migration
The Great IT Migration
 
Using Network Recording and Search to Improve IT Service Delivery
Using Network Recording and Search to Improve IT Service DeliveryUsing Network Recording and Search to Improve IT Service Delivery
Using Network Recording and Search to Improve IT Service Delivery
 
Introducing Endace Packets - EndaceVision™ with Protocol Decodes
Introducing Endace Packets - EndaceVision™ with Protocol DecodesIntroducing Endace Packets - EndaceVision™ with Protocol Decodes
Introducing Endace Packets - EndaceVision™ with Protocol Decodes
 
Linked in Twitter Facebook Google+ Email Embed Share Flash Across Virtualized...
Linked in Twitter Facebook Google+ Email Embed Share Flash Across Virtualized...Linked in Twitter Facebook Google+ Email Embed Share Flash Across Virtualized...
Linked in Twitter Facebook Google+ Email Embed Share Flash Across Virtualized...
 
Tap DANZing - Arista Networks Redefining the Cost of Accessing Network Traffic
Tap DANZing - Arista Networks Redefining the Cost of Accessing Network TrafficTap DANZing - Arista Networks Redefining the Cost of Accessing Network Traffic
Tap DANZing - Arista Networks Redefining the Cost of Accessing Network Traffic
 
First Look Webcast: OneCore Storage SDK 3.6 Roll-out and Walkthrough
First Look Webcast: OneCore Storage SDK 3.6 Roll-out and WalkthroughFirst Look Webcast: OneCore Storage SDK 3.6 Roll-out and Walkthrough
First Look Webcast: OneCore Storage SDK 3.6 Roll-out and Walkthrough
 
Why I/O is Strategic for Convergence - with 451 Research
Why I/O is Strategic for Convergence - with 451 ResearchWhy I/O is Strategic for Convergence - with 451 Research
Why I/O is Strategic for Convergence - with 451 Research
 
Emulex and the Evaluator Group Present Why I/O is Strategic for Big Data
Emulex and the Evaluator Group Present Why I/O is Strategic for Big Data Emulex and the Evaluator Group Present Why I/O is Strategic for Big Data
Emulex and the Evaluator Group Present Why I/O is Strategic for Big Data
 
Emulex and IDC Present Why I/O is Strategic for the Cloud
Emulex and IDC Present Why I/O is Strategic for the Cloud Emulex and IDC Present Why I/O is Strategic for the Cloud
Emulex and IDC Present Why I/O is Strategic for the Cloud
 
Get Better I/O Performance in VMware vSphere 5.1 Environments with Emulex 16G...
Get Better I/O Performance in VMware vSphere 5.1 Environments with Emulex 16G...Get Better I/O Performance in VMware vSphere 5.1 Environments with Emulex 16G...
Get Better I/O Performance in VMware vSphere 5.1 Environments with Emulex 16G...
 
Get Better I/O Performance in VMware vSphere 5.1 Environments with Emulex 16G...
Get Better I/O Performance in VMware vSphere 5.1 Environments with Emulex 16G...Get Better I/O Performance in VMware vSphere 5.1 Environments with Emulex 16G...
Get Better I/O Performance in VMware vSphere 5.1 Environments with Emulex 16G...
 
Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...
Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...
Emulex and Enterprise Strategy Group Present Why I/O is Strategic for Virtual...
 
Introducing OneCommand Vision 3.0, I/O management that gives your application...
Introducing OneCommand Vision 3.0, I/O management that gives your application...Introducing OneCommand Vision 3.0, I/O management that gives your application...
Introducing OneCommand Vision 3.0, I/O management that gives your application...
 
Emulex Presents Why I/O is Strategic Global Survey Results
Emulex Presents Why I/O is Strategic Global Survey ResultsEmulex Presents Why I/O is Strategic Global Survey Results
Emulex Presents Why I/O is Strategic Global Survey Results
 
Integrating and Optimizing Suricata with FastStack™ Sniffer10G™
Integrating and Optimizing Suricata with FastStack™ Sniffer10G™Integrating and Optimizing Suricata with FastStack™ Sniffer10G™
Integrating and Optimizing Suricata with FastStack™ Sniffer10G™
 
Optimizing Performance of your Oracle Database using 8Gb Fibre Channel
Optimizing Performance of your Oracle Database using 8Gb Fibre ChannelOptimizing Performance of your Oracle Database using 8Gb Fibre Channel
Optimizing Performance of your Oracle Database using 8Gb Fibre Channel
 

Recently uploaded

Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

Using NetFlow to Streamline Security Analysis and Response to Cyber Threats

  • 1. Using NetFlow to Streamline Security Analysis and Response to Cyber-Threats Richard Trujillo, Product Marketing Manager, Emulex Joe Yeager, Director of Product Management, Lancope Lee Doyle, Principal Analyst, Doyle Research © 2013 Emulex Corporation
  • 2. 2013 2013 The Importance of Network Visibility Doyle Research, 2013 2
  • 3. Leading Trends Impacting the Network Cloud VDI Mobile Big Data Doyle Research, 2013 BYOD 3
  • 4. Networks are Critical to the Business  Networks deliver applications and information throughout the organization  Networks must be high performance, low latency, reliable, and secure  Traffic patterns are changing: more east-west, less north-south  Network/data center downtime is expensive  Managing/Securing the network remains challenging and costly (OPEX) Doyle Research, 2013 4
  • 5. Network Complexity and Value are Increasing Customer Value SDN Adoption Bandwidth Growth Data Center  Server virtualization  VM mobility  Network/Storage Convergence  Wide spread adoption of 10GB  Separation of Control and Data Plane  Network Programmability  Cloud  Centralized Intelligence  Video  Network Slicing  Mobility Network Complexity Doyle Research, 2013 5
  • 6. Network Visibility Benefits Security Monitor All Traffic Identify and isolate “bad” traffic, ability to handle DDOS attacks Better understand and tune the network; respond to dynamic traffic patterns Performance Improved OPEX Supports off load of traffic analysis from production switches Doyle Research, 2013 Improved network management and reduced operational costs Automation Tools help IT/network staff with routine monitoring tasks 6
  • 7. Product Requirements  Improved performance monitoring = visibility at scale  Secure networks – leveraging behavior analysis to detect traffic anomalies  Monitoring solution must support complete analysis of 10GB traffic flow (high performance)  Move from reactive to proactive management with new tools – software defined applications  Ease of installation, ease of operation, cost effective  Support for standards and 3rd party applications Doyle Research, 2013 7
  • 8. StealthWatch for Security Analysis and Response to CyberThreats Joe Yeager Director of Product Mgmt ©2013 Lancope , Inc. All Rights Reserved. 8
  • 9. Who is Lancope? Company Profile • 600+ enterprise clients -- Global 2000 • HQ in Atlanta, offices all around the world Available on Cisco’s Global Price List • 4 years profitability; 160+ employees Technology Leadership • StealthWatch Labs Research Team • Patented behavioral analysis techniques • 150+ algorithms • Scalable flow analysis Management Team • Experienced senior leadership from IBM, nCircle, ISS, DELL SecureWorks, HP, and Motorola/AirDefense • Over 100 years combined experience ©2013 Lancope , Inc. All Rights Reserved. 9
  • 10. Big Data Center Focus Areas Cyber Threat Problem Cyber Threat Solution DDoS Case Study ©2013 Lancope , Inc. All Rights Reserved. 10
  • 11. Big Data Center Focus Areas Cyber Threat Problem Cyber Threat Solution DDoS Case Study ©2013 Lancope , Inc. All Rights Reserved. 11
  • 12. Threat Landscape of Today APT and Insider Threats Top of Mind 174M 855 98% 416 days 100% • Records stolen • Incidents • Involve external threat actors • Before attackers discovered by a 3rd party • Valid credentials used Sources: Verizon 2013 Data Breach Investigations Report, Mandiant M Trends ©2013 Lancope , Inc. All Rights Reserved.
  • 13. Visibility Throughout the Kill Chain Strategy for APT and Insider Threats Recon Exploitation Initial Infection Command & Control Internal Pivot Data Preparation Data Exfiltration • This is the Kill Chain concept introduced by Mike Cloppert at Lockheed. • Each step in the chain is important to look at individually to develop a security strategy across both tools and departments. • Many of these can be covered by a NetFlow solution that has both analytics and incident response capabilities. ©2013 Lancope , Inc. All Rights Reserved. 13
  • 14. APT Timeline Example Do you know what happened while you were responding? 1:06:15 PM: Internal Host Visits Malicious Web Site 1:06:30 PM: Malware Infection Complete, Accesses Internet Command and Control ©2013 Lancope , Inc. All Rights Reserved. 1:06:35 PM: Malware begins scanning internal network 1:07:00 PM: Gateway malware analysis identifies the transaction as malicious 1:13:59 PM: Multiple internal infected hosts 1:14:00 PM: Administrators manually disconnect the initial infected host 14
  • 15. Big Data Center Focus Areas Cyber Threat Problem Cyber Threat Solution DDoS Case Study ©2013 Lancope , Inc. All Rights Reserved. 15
  • 16. Why Use NetFlow? Complete Network Visibility • NetFlow is a record of every conversation on your network from a “trusted 3rd party” – i.e. it is not affected by trustworthiness of hosts  Perfect audit trail  Provides ability to baseline what is normal • NetFlow is very lightweight and compresses very well  Typically can store for 45-90 days with StealthWatch NetFlow Phone Bill (CDR) ©2013 Lancope , Inc. All Rights Reserved. 16
  • 17. Cyber Threat Solution Goal: Knowledge as Focus instead of Data Visibility Analysis Cyber Threat Intelligence Data Information Knowledge Big Data Collection ©2013 Lancope , Inc. All Rights Reserved. + Big Analytics + Big Incident Response 17
  • 18. Big Data Collection What Constitutes “Big”? Per Second Per Hour Per Day Per 45 Days 1 StealthWatch Collector Events Data (MB) 120,000 9 432,000,000 30,960 10,368,000,000 743,040 466,560,000,000 33,436,800 Per Second Per Hour Per Day Per 45 Days StealthWatch System (x25) Events Data (MB) 3,000,000 215 10,800,000,000 774,000 259,200,000,000 18,576,000 11,664,000,000,000 835,920,000 ©2013 Lancope , Inc. All Rights Reserved. 18
  • 19. Big Analytics Real-time Detection of Indicators of Compromise Collect Vast Amount of Data Correlate Metadata for Context ©2013 Lancope , Inc. All Rights Reserved. Baseline Normal Activity Identify Deviations from Norm Alert on Indicators of Compromise 19
  • 20. Big Incident Response Powerful Investigation Capabilities • Who did this? – Usernames, IP Addresses, Devices, Country, ISP • What did they do? – What behavior did they engage in? What else did they do? • Where did they go? – What hosts on my network were accessed? • When? – Have we investigated the full intrusion timeline? • Why? – What is their objective? © 2013 Lancope, Inc. All rights reserved. 20
  • 21. Big Data Center Focus Areas Cyber Threat Problem Cyber Threat Solution DDoS Case Study ©2013 Lancope , Inc. All Rights Reserved. 21
  • 22. DDoS – a Big Problem! Sec Ops & Net Ops StealthWatch’s Focus: • Alert on attack, citing individual target of attack • Fast investigative workflow for impact & root cause analysis • Monitor mitigation success © 2013 Lancope, Inc. All rights reserved. 22
  • 23. DDoS Sometimes DDoS Attacks Are Obvious… © 2013 Lancope, Inc. All rights reserved. 23
  • 24. DDoS And Sometimes They Are Not So Obvious… Increase in Malformed Fragment Alarms Strange Short Bursts in Traffic © 2013 Lancope, Inc. All rights reserved. 24
  • 25. DDoS Quick Investigation Workflow - 1.5 Gbps of DNS Traffic and 1.5 Gbps of Undefined UDP Traffic - Total of 107.25 GB of data sent between these two services - Right-click drill down to identify Top DNS Hosts Top 3 Hosts have over 96,000 peers and over 190,000 flows EACH © 2013 Lancope, Inc. All rights reserved. 25
  • 26. DDoS Quick Investigation Workflow Each DNS response contains the same domain: “pkts.asia” Conclusion: This is a DNS amplification attack and these type of packets need to be blocked. © 2013 Lancope, Inc. All rights reserved. 26
  • 27. Network Visibility Solution: EndaceFlow 3040 & StealthWatch FlowCollector Richard Trujillo – Marketing Manager, Emulex Emulex Confidential - © 2013 Emulex Corporation
  • 28. Our Approach to NPM/APM/SEM – Best of Breed APM App NPM App IDS App HFT App EndaceVision Network Search Engine with Fusion Connectors Endace Network Visibility Products 10/40/100GbE Our approach enables tailored best-of-breed solutions – All tools share data from same secure location in datacenter – Automated workflow, “pivot to packets” speeds up issue resolution Lower Investment While Increasing ROI – Only buy what you need – Plan and train staff on the tools that fit your situation best 28 © 2013 Emulex Corporation
  • 29. How Much Network Visibility Do You Need? Just as in the video world, there is a big difference between lowdef network visibility and high-def network visibility – Low-def shows you the overall trends – great for long-term traffic planning and identifying large deviations from the norm – High-def lets you see the action (microbursts, dropped packets, protocol errors) that underlie the most difficult application performance issues The visibility Emulex tools provide • • • See microbursts Know exactly what data has been compromised Identify issues impacting application performance The visibility most tools provide Sampled data cannot provide the detail you need to resolve difficult security breaches or application performance issues 29 © 2013 Emulex Corporation
  • 30. EndaceFlow™ 3040– NetFlow Generation Extreme Performance – The EndaceFlow 3040 provides complete flow visibility at 10Gbps (4x10GbE) – 30Gbps of flow generation and a total of 64M active flows. Custom Filtering – Customize exports to gain visibility of specific networks within the datacenter. – Load balance flow records across multiple collectors – The EndaceFlow 3040 supports up to 120 filters across 4 collectors for load balancing flow records across multiple collectors Advanced Hash Load Balancing – The advanced HLB feature minimizes manual configuration with flow safe load balancing, reducing operational expenditures (OPEX). Ease of Integration – Supports V5, V9 and IPFIX flow formats and a broad range of fields, allows seamless integration with any NetFlow collector in the market. 30 © 2013 Emulex Corporation EndaceFlow 3040 High-speed NetFlow generation 4x10GbE ports
  • 31. Data Center Deployment Topology Access Layer Core Switch Tap or SPAN Edge Firewall Tap or SPAN Tap or SPAN Edge Router ` NetFlow Packets Packets NetFlow Packets NetFlow Rack Servers Internet ` Packets NetFlow Packets NetFlow DMZ SecOps deployment monitoring both sides of the DMZ; record attacks, ID compromised data Packets NetFlow Endpoint Security Packets NetFlow EndaceProbe Packet Capture EndaceFlow NetFlow Generation Lancope StealthWatch FlowCollector Endace Management Server Forensics NBAD EndaceVision SIEM StealthWatch Security Operations Center 31 ` © 2013 Emulex Corporation 1. Alarm triggers event. Analyst investigates using the EM interface 2. Analyst pivots to forensics tool for deep dive into packets enabling rapid resolution 3. Analyst closes event and makes changes to prevention rules if appropriate
  • 32. Use Case: Security Operations Consumer Electronics/Content Provider Uses Lancope and EndaceFlow to Improve Security Incident Response Times Business problem: As the customer increased deployment of 10GbE in their data centers, they needed to improve their security monitoring capabilities and significantly reduce their incident response time and costs. The customer considered integrated solutions, but found that the poor performance and high costs impacted the amount of monitoring they could deploy. They also found that the sampled nature of the data hindered the response teams ability to resolve issues quickly. Products deployed: – EndaceFlow 3040 NetFlow Generator Appliances – Lancope StealthWatch™ FlowCollector Competitors – Cisco NGA 32 © 2013 Emulex Corporation
  • 33. Use Case: Security Operations (cont’d) Why did we win? Network Ability to generate 100% unsampled netflows on multiple 10GbE links Misc 15-20 Gbps Console Network Packet Broker 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 PWR1 PWR2 Director X Stream V Ability of our overall solution to handle up to 60Gb/s of traffic HTTPS 45-60 Gbps Management HTTPS 12-20 Gbps Misc 8-10 Gbps 100K Flows/sec Collector Collector Collector Collector Collector Collector Collector Collector Advanced filtering and load balancing enabled overall system success NetFlow Dock VM 100K Flows/sec Collector Collector Collector Collector Collector Collector Collector Collector NetFlow Dock VM Business benefits: – Reduced response time for critical security incidents from 30-50 hours to a couple of hours (average) – Reduced the time required per team member per incident by 12 man-hours – Provided future expansion room for customer to run traffic up to 100Gb/s 33 © 2013 Emulex Corporation
  • 34. Conclusions Complete, real-time and end-to-end visibility Endace and Lancope provides a highly scalable solution Reduces cost and helps eliminate downtime …. How can we help you with visibility into your network? 34 © 2013 Emulex Corporation
  • 35. 35 © 2013 Emulex Corporation

Editor's Notes

  1. Skipping the problem domain in the interest of time