From zero to hero. The story of technology startup from national academic network of the Czech Republic to world leader in Netflow/IPFIX. Flowmon is developing artificial inteligence that detects and responds to volumetric attacks. Flowmon DDoS Defender is an example how DDoS protection can be easy, efficient and flexible.
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...PROIDEA
Na przykładzie rozwiązania AMS (Attack Mitigation System) firmy RADWARE niniejsza prezentacja przedstawi różne modele skutecznej ochrony aplikacji internetowych zarówno w modelu „chmurowym” jak również mieszanym (hybrydowym). Prezentacja przedstawi również zalety implementacji mechanizmów bezpieczeństwa w formie natywnych funkcji sieciowych oraz odpowie na pytanie w jaki sposób zapewnić najlepszą ochronę przy jednoczesnym zachowaniu najwyższego poziomu SLA aplikacji.
PLNOG 17 - Piotr Jasiniewski, Przemek Papużyński - Ericsson HDS 8000 Server p...PROIDEA
Prelegenci przedstawią w skrócie charakterystykę rozwiązania serwerowego HDS 8000 firmy ERICSSON, opartego o architekturę Rack Scale Design (RSD).
Poruszone zostaną zagadnienia związanie z przewagami takiego rozwiązania (zarówno od strony technicznej jak i użytkowej) nad dotychczas dostępnymi, i korzyściami które są tego efektem.
Modern business runs in the cloud, however traditional WAN routers weren't made for that. Silver Peak Unity EdgeConnect is primed for the cloud. In fact it is the industry leading SD-WAN solution that is freeing businesses from their dependency on routers
Relatore: Alessandro Legnani, Cisco CCIE e IP Network Architect di IT Global Consulting Srl
Sintesi e sinergia perfetta di un nuovo protocollo di routing (e non solo) con il caro vecchio e robusto IPsec (senza le problematiche ike). Perché inventarsi l’ennesima forma di tunnelig per il data plane?
Quanto sopra è la chiave del successo della soluzione sdwan Cisco/Viptela che la rende enormemente scalabile e unica sul mercato.
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...PROIDEA
Na przykładzie rozwiązania AMS (Attack Mitigation System) firmy RADWARE niniejsza prezentacja przedstawi różne modele skutecznej ochrony aplikacji internetowych zarówno w modelu „chmurowym” jak również mieszanym (hybrydowym). Prezentacja przedstawi również zalety implementacji mechanizmów bezpieczeństwa w formie natywnych funkcji sieciowych oraz odpowie na pytanie w jaki sposób zapewnić najlepszą ochronę przy jednoczesnym zachowaniu najwyższego poziomu SLA aplikacji.
PLNOG 17 - Piotr Jasiniewski, Przemek Papużyński - Ericsson HDS 8000 Server p...PROIDEA
Prelegenci przedstawią w skrócie charakterystykę rozwiązania serwerowego HDS 8000 firmy ERICSSON, opartego o architekturę Rack Scale Design (RSD).
Poruszone zostaną zagadnienia związanie z przewagami takiego rozwiązania (zarówno od strony technicznej jak i użytkowej) nad dotychczas dostępnymi, i korzyściami które są tego efektem.
Modern business runs in the cloud, however traditional WAN routers weren't made for that. Silver Peak Unity EdgeConnect is primed for the cloud. In fact it is the industry leading SD-WAN solution that is freeing businesses from their dependency on routers
Relatore: Alessandro Legnani, Cisco CCIE e IP Network Architect di IT Global Consulting Srl
Sintesi e sinergia perfetta di un nuovo protocollo di routing (e non solo) con il caro vecchio e robusto IPsec (senza le problematiche ike). Perché inventarsi l’ennesima forma di tunnelig per il data plane?
Quanto sopra è la chiave del successo della soluzione sdwan Cisco/Viptela che la rende enormemente scalabile e unica sul mercato.
The Cisco IWAN Application simplifies WAN deployments by providing highly intuitive, policy-based automation. It enables you to realize the benefits of SD-WAN: lower costs, simplified IT, increased security, and optimized application performance.
View the Webcast: http://cs.co/9007BKlEc
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
Many organizations anticipate significant growth in WAN bandwidth and Public Cloud usage. Leveraging the Internet to provide extra WAN bandwidth and to offload Public Cloud traffic is compelling, however network reliability, application performance and security are the primary roadblocks. Cisco IWAN transport solution is the most full featured architecture to support the Software Defined Wide Area Network (SD-WAN) requirements that are emerging in standards bodies like the Open Networking User Group (ONUG) to address these issues. Many enterprises are looking for the benefits these technologies deliver, but without the costs associated with owning and operating those technologies. Here is where VMS for IWAN meets market need. Cisco VMS is a full featured management platform for both virtual and physical devices. This session will cover a full description of the VMS platform and how it can be used to deliver exceptional customer experience when supporting a managed offering of IWAN. The roles of Customer and Resource Facing Services will be covered, along with integration between the IWAN service and SP operations. This session will also cover the topic of how Virtual Network Functions (VNFs) can be placed optimally in the network from the CPE to SP datacenter, along with a demo of the end user and operator experience.
With uCPE/SD-WAN taking center stage in enabling software-defined Cloud services to enterprise branch offices globally, this session will provide a uCPE review from a solution, deployment and reference design standpoint.
Speaker: Sab Gosal, Segment Manager
Network Platforms Group (NPG), September 2018
SD-WAN is a new and exciting opportunity to transform enterprises costly and rigid MPLS-based wide area networks (WAN). It promises to make the WAN more affordable and agile, boost capacity, and improve resiliency. But, SD-WAN goes far beyond replacing MPLS. It can optimize global connectivity, streamline network security, and seamlessly integrate cloud resources and mobile users into simple coherent network.
A generalized description and overview of SD-WAN technology without delving into vendor-specific implementations. Covers the motivation, history, software architecture of SD-WAN systems, day-in-the-life packet path, and various useful features.
Corsa Technology's introduced GigaFilter, a new feature on the Red Armor NSE7000 hardware platform that allows instant filtering of up to 4 Billion IPv4 addresses on 10 Gbps and 100 Gbps links to mitigate volumetric DDoS attacks.
VPN as the Key for a Successful MSP BusinessSafar Safarov
“VPN as the Key for a Successful MSP Business” is a Tactical eHandbook that reveals Virtual Private Networks as the tactics of a successful delivering of managed services and presupposes that you are an IT Services Provider whose strategy is delivering of managed services already. Please be aware that Virtual Private Networks are considered in the eHandbook as a way of delivering of managed services, but not as a service itself.
PLNOG 17 - Maciej Flak - Cisco Cloud Networking - czyli kompletna infrastrukt...PROIDEA
W trakcie sesji zostanie omówiony nowy zyskujący coraz większe uznanie model zarządzania i provisioningu sieci LAN, WAN, WIFI z chmury. Pokazane zostanie w jaki sposób operatorzy telekomunikacyjni przy pomocy platformy Cisco Cloud Networking mogą budować i dostarczać własne usługi zarządzane Klientom (manager LAN, WAN i WIFI).
PLNOG 17 - Stefan Meinders - Slow is the new DownPROIDEA
In this presentation, we will review trends in Over-the-Top (OTT) traffic usage, user behavior and rapidly growing volumes of video streaming from services such as Netflix. The amount of video traffic carried by networks and its interconnections is significant. Delivery methods and encryption are challenges for today’s methods of network analysis—as are unexpected network changes that can drastically impact subscribers, transit costs, and network overload. Recent research unveiled that existing monitoring tools cannot cope with these variations in traffic delivery, caching strategies, and encryption. Finally, we describe how the use of “big data” techniques and multi-dimensional databases combined with global internet service mapping provides new insights into traffic delivery, consumption, and quality.
The Cisco IWAN Application simplifies WAN deployments by providing highly intuitive, policy-based automation. It enables you to realize the benefits of SD-WAN: lower costs, simplified IT, increased security, and optimized application performance.
View the Webcast: http://cs.co/9007BKlEc
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
Many organizations anticipate significant growth in WAN bandwidth and Public Cloud usage. Leveraging the Internet to provide extra WAN bandwidth and to offload Public Cloud traffic is compelling, however network reliability, application performance and security are the primary roadblocks. Cisco IWAN transport solution is the most full featured architecture to support the Software Defined Wide Area Network (SD-WAN) requirements that are emerging in standards bodies like the Open Networking User Group (ONUG) to address these issues. Many enterprises are looking for the benefits these technologies deliver, but without the costs associated with owning and operating those technologies. Here is where VMS for IWAN meets market need. Cisco VMS is a full featured management platform for both virtual and physical devices. This session will cover a full description of the VMS platform and how it can be used to deliver exceptional customer experience when supporting a managed offering of IWAN. The roles of Customer and Resource Facing Services will be covered, along with integration between the IWAN service and SP operations. This session will also cover the topic of how Virtual Network Functions (VNFs) can be placed optimally in the network from the CPE to SP datacenter, along with a demo of the end user and operator experience.
With uCPE/SD-WAN taking center stage in enabling software-defined Cloud services to enterprise branch offices globally, this session will provide a uCPE review from a solution, deployment and reference design standpoint.
Speaker: Sab Gosal, Segment Manager
Network Platforms Group (NPG), September 2018
SD-WAN is a new and exciting opportunity to transform enterprises costly and rigid MPLS-based wide area networks (WAN). It promises to make the WAN more affordable and agile, boost capacity, and improve resiliency. But, SD-WAN goes far beyond replacing MPLS. It can optimize global connectivity, streamline network security, and seamlessly integrate cloud resources and mobile users into simple coherent network.
A generalized description and overview of SD-WAN technology without delving into vendor-specific implementations. Covers the motivation, history, software architecture of SD-WAN systems, day-in-the-life packet path, and various useful features.
Corsa Technology's introduced GigaFilter, a new feature on the Red Armor NSE7000 hardware platform that allows instant filtering of up to 4 Billion IPv4 addresses on 10 Gbps and 100 Gbps links to mitigate volumetric DDoS attacks.
VPN as the Key for a Successful MSP BusinessSafar Safarov
“VPN as the Key for a Successful MSP Business” is a Tactical eHandbook that reveals Virtual Private Networks as the tactics of a successful delivering of managed services and presupposes that you are an IT Services Provider whose strategy is delivering of managed services already. Please be aware that Virtual Private Networks are considered in the eHandbook as a way of delivering of managed services, but not as a service itself.
PLNOG 17 - Maciej Flak - Cisco Cloud Networking - czyli kompletna infrastrukt...PROIDEA
W trakcie sesji zostanie omówiony nowy zyskujący coraz większe uznanie model zarządzania i provisioningu sieci LAN, WAN, WIFI z chmury. Pokazane zostanie w jaki sposób operatorzy telekomunikacyjni przy pomocy platformy Cisco Cloud Networking mogą budować i dostarczać własne usługi zarządzane Klientom (manager LAN, WAN i WIFI).
PLNOG 17 - Stefan Meinders - Slow is the new DownPROIDEA
In this presentation, we will review trends in Over-the-Top (OTT) traffic usage, user behavior and rapidly growing volumes of video streaming from services such as Netflix. The amount of video traffic carried by networks and its interconnections is significant. Delivery methods and encryption are challenges for today’s methods of network analysis—as are unexpected network changes that can drastically impact subscribers, transit costs, and network overload. Recent research unveiled that existing monitoring tools cannot cope with these variations in traffic delivery, caching strategies, and encryption. Finally, we describe how the use of “big data” techniques and multi-dimensional databases combined with global internet service mapping provides new insights into traffic delivery, consumption, and quality.
Kiedy myślimy o nowoczesnych sieciach w Centrum Przetwarzania Danych (CPD), musimy się zmierzyć z poważnym wyzwaniem: w jaki sposób używać - rosnące prawie z prawem Moore’a - prędkości transmisji, nie tracąc jednocześnie możliwości „widzenia” co się naprawdę w naszej sieci dzieje.
PLNOG 17 - Paweł Wachelka - Zastosowanie 802.1x w sieciach kampusowych - nowe...PROIDEA
Na prezentacji zostanie omówiona technologia 802.1x, zostaną przedstawione praktyczne przykłady uwierzytelniania stacji oraz telefonów. Rozszerzeniem wykładu będzie omówienie rozwiązania bazującego na ID użytkownika/grupy, które ma za zadanie zunifikowanie polityk bezpieczeństwa w całej sieci kampusowej, ułatwienie implementacji oraz zwiększenie bezpieczeństwa.
PLNOG 17 - Piotr Wojciechowski - 802.1s MST, czyli STP u operatora i w DC nie...PROIDEA
Protokół spanning-tree - wypierany przez inne technologie w nowoczesnych rozwiązaniach nadal stanowi podstawę działania sieci. Wśród wielu jego odmian trochę zapomniane i niedocenione wcielenie stanowi 802.1s czyli MST. Sesja ma na celu przypomnienie podstaw działania MST i wskazanie scenariuszy, w których protokół ten może ułatwić nam życie.
This session provides an overview of the Next Generation Network Architecture with Segment Routing technology that helps Service Providers to simplify the network. You will get an understanding of the basic concepts behind the technology and its wide applicability ranging from simple transport for MPLS services, disjoint routing, traffic engineering and its benefits in the context of software defined networking. Previous knowledge of IP routing and MPLS is beneficial to understand Segment Routing.
PLNOG 17 - Rafał Wiosna - Euro 2016 -- case study (prawdopodobnie) największy...PROIDEA
Podczas prezentacji opowiem o tym, jak Telewizja Polska SA przygotowywała się do przeprowadzenia transmisji internetowej z 11 meczów Euro 2016, jakie porażki i sukcesy zostały odniesione oraz przybliżę technologię wykorzystywaną do masowych transmisji internetowych dla setek tysięcy widzów. Postawię też odważną tezę, że TVP, pod względem dystrybucji sygnału wideo w internecie, biorąc pod uwagę liczbę na terytorium RP, jest "większe" niż Akamai -- i postaram się to udowodnić z wykorzystaniem przeźroczy, plansz i materiałów źródłowych.
W trakcie sesji przedstawione zostaną różne sposoby budowania rozproszonych punktów wymiany ruchu internetowego. Zaprezentowane zostanie również jak w praktyce wykorzystano protokół TRILL w Slovak Internet Exchange.
PLNOG 17 - Robert Ślaski - Jak nie zostać bezrobotnym sieciowcem?PROIDEA
To co było w branży sieciowej aksjomatami ugruntowanymi przez lata a nawet dekady dość gwałtownie przestaje obowiązywać. Współczesne sieci zmieniają swój kształt, dostosowując się do wymagań współczesnego świata. Ty, jako pan i władca routerów musisz wreszcie uznać że świat powyżej warstwy czwartej już dawno zaczął żyć swoim życiem i odpływa w nieznanych Tobie kierunkach, a jeśli go nie dogonisz, zostaniesz bezrobotnym sieciowcem. W krótkiej prezentacji postaram się obalić kilka aksjomatów pokutujących jeszcze wśród sieciowców oraz przedstawić kilka technologii i rozwiązań, którymi warto się zainteresować aby za pięć lat nie zostać telemarketerem w call center.
PLNOG 17 - Łukasz Dorosz - Architektura Hybrydowa, jak połączyć własne data c...PROIDEA
Architektura hybrydowa, to najczęściej przyjmowany model w dużych firmach. Bez względu na charakter rozwiązania opartego o chmurę publiczną oraz własne data center, bardzo ważną kwestią pozostaje spięcie ze sobą tych dwóch środowisk. Podczas mojej prezentacji pokaże Wam różne modele architektury hybrydowej. Na przykładzie AWS, przyjrzymy się dokładniej jak wygląda konfiguracja oraz czym charakteryzują się usługi VPN i Direct Connect.
Podczas prezentacji postaram się przybliżyć infrastrukture sieciową obecnie największego na świecie dostawcy treści czyli Akamai. Opowiem jak można budować sieć CDN (Content Delivery Network), i jak robimy to w Akamai. Przedstawie w jaki sposób użytkownicy korzystają z sieci Akamai. Pokaże trochę statystyk z ruchu internetowego na świecie jak i w Polsce, prezentując jak szybko "rośnie" Internet. W dużym stopniu skupie się na protokole BGP, opowiem jak używamy go w naszej sieci, przedstawie kilka case-studies związanych z inżynierią ruchu BGP w Akamai.
PLNOG 17 - Sebastian Mikołajczyk - Wymiana silnika w aucie sportowym podczas ...PROIDEA
Na spotkaniu chcę powiedzieć o przygotowanej i wykonanej migracji trójwarstwowej sieci (DWDM, L2, IP/MPLS) zbudowanej początkowo na dedykowanym sprzęcie DWDM, przełącznikach i routerach dla każdej z warstw. Do postaci docelowego rozwiązania z wielousługowym sprzętem DWDM (z warstwą L2/MPLS) na dostępie oraz DWDM/L2/IP/MPLS w core, przy jednoczesnym znacznym uproszczeniu warstwy agregacji. Takie rozwiązanie daje spłaszczenie sieci, zmniejszenie ilości urządzeń w niej, możliwości realizacji nowych usług L1, uproszczeniu zarządzania usługami i siecią. Wszystko to obniża koszy inwestycyjne oraz operacyjne. Rozwiązania takie od kilku lat z powodzeniem stosują powszechnie w swojej sieci np. UPC czy Exatel.
PLNOG 17 - Tomasz Stachlewski - Infrastruktura sieciowa w chmurze AWSPROIDEA
Celem prezentacji jest przedstawienie sposobu tworzenia i zarządzania infrastrukturą sieciową w chmurze (AWS). Podczas prezentacji użytkownicy dowiedzą się z jakich komponentów składa się infrastruktura w chmurze, zapoznają się z tematyką VPC (Virtual Private Cloud), Security Group, Direct Connect, Avaibility Zone, Route53, Regions. Dodatkowo dowiedzą się jak należy projektować systemy aby były określane jako HA oraz w jaki sposób można tworzyć rozwiązania hybrydowe i połączyć chmurę z istniejącą infrastrukturą on-premise. Dodatkowo słuchacze zapoznają się ze sposobem zarządzania infrastrukturą sieciową jak kodem (tzw. IaC - Infrastructure as Code) – co pozwala w szybki sposób tworzyć i zarządzać całością infrastruktury sieciowej w chmurze.
PLNOG 17 - Sławomir Janukowicz - NFV – using Juniper vMX, vSRX and NFXPROIDEA
Zaprezentowany zostanie obecny status rozwiązań NFV. Ich historyczne znaczenie w przeszłości, zmiany na rynku, które doprowadziły do ponownego odkrycia tej technologii. Pokazane zostana możliwe scieżki rozwoju rozwiązań NFV i co w chwili obecnej stanowi blokadę do szerszego wdrożenia tych technologii. Zaprezentowane zostaną przykłady implementacji technolgoii NFV z wykorzystaniem rozwiązań Juniper vSRX vMX oraz produktów z rodziny NFX
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PROIDEA
W wyścigu wielu technologii i standardów budowy sieci Data Center oraz Data Center Interconnect, EVPN zdaje się być tym, który wysunął się na prowadzenie. W ramach sesji odpowiemy sobie na pytanie gdzie EVPN jest w tej chwili na tle innych technologii, gdzie go stosować, na co zwracać uwagę podczas wdrożenia.
PLNOG 17 - Robert Rosiak - Zcentralizowane i dystrybuowane CPE - różnice i po...PROIDEA
Podczas prezentacji zostaną zaprezentowane różnice i podobieństwa
zcentralizowanego i dystrubowanego CPE zarządzanego przez orkiestratora CSO.
Zcentralizowane CPE oparte jest o rozwiązanie hostowane w chmurze u
operatora w postaci gotowego rozwiązania do tworzenia usług NFV z
wykorzystaniem CSO jak i kontrolera contrail.
Rozwiązanie dystrybuowane, dedykowane dla bardziej wymagających
klientów, oparte jest o nowoczesne urządzenie NFX250 instalowane u
klienta, które oprócz standardowych funkcjonalności routera ma możliwość
uruchamiania wielu wirtualnych instancji VNF na wbudowanym hypervisorze KVM.
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...PROIDEA
W trakcie tej sesji zostaną przedstawione założenia, które stały u podstaw zbudowania przez firmę Dell rewolucyjnego i otwartego sieciowego systemu operacyjnego znanego pod kryptonimem OS10. Omówina zostanie jego architektura, funkcjonalności oraz praktyczne zastosowania. System OS10 to nastepny krok w promowanej od 2 lat przez firmę Dell idei otwartej sieciowości (Dell Open Networking) rozdzialając i standaryzując obecnie już nawet warstwy w samym sieciowym systemie operacyjnym !
PLNOG 17 - Nicolai van der Smagt - Building and connecting the eBay Classifie...PROIDEA
It seems everybody is talking about SDN. But where are the implementations? Nicolai talks about the intricacies of a successful cloud building project, at eBay Classifieds, and will discuss the implementation of the underlay network, virtualized overlay, hybrid cloud and MPLS integration.
Why Its time to Upgrade a Next-Generation FirewallAli Kapucu
The bad guys keep getting better. They have found out advanced techniques that get
around our old defenses. Scanning for their signatures was enough for a while, but not
now. We can no longer just lock a few ports and feel safe at night. An application port can change everyday. These security bandits hijack IP addresses, hiding behind legitimate people to launch their attacks. Stopping them has gotten harder; our defenses have become more durable. Older enterprise firewalls and IPS are not enough anymore.
Security Delivery Platform: Best practicesMihajlo Prerad
Security Delivery Platform: Best practices
The traditional Security model was one that operated under simple assumptions. Those assumptions led to deployment models which in todays’ world of cyber security have been proven to be quite vulnerable and inadequate to growing amount and diversity of threats.
A Security Delivery Platform addresses the above considerations and provides a powerful solution for deploying a diverse set of security solutions, as well as scaling each security solution beyond traditional deployments. Such platform delivers visibility into the lateral movement of malware, accelerate the detection of ex-filtration activity, and could significantly reduce the overhead, complexity and costs associated with such security deployments.
In today’s world of industrialized and well-organized cyber threats, it is no longer sufficient to focus on the security applications exclusively. Focusing on how those solutions get deployed together and how they get consistent access to relevant data is a critical piece of the solution. A Security Delivery Platform in this sense is a foundational building block of any cyber security strategy.
The presentation is dedicated to the main products of NUVX Technologies, which will be of interest to Telco companies, ISP providers, as well as integrators.
Our key products are: NUVX.DPI, NUVX.NAT and NUVX.QoE
Feel free to contact us in case of any questions: http://nuvx.com/contacts
O Sophos XG Firewall traz uma nova abordagem na forma de gerenciar o seu firewall, responder às ameaças e monitorar o que acontece na sua rede. Prepare-se para um novo nível de simplicidade, segurança e percepção.
Piotr Kędra – network consultant. Since 2007 Piotr has been working as Systems Engineer in Polish entity of Juniper Networks. He is responsible for network solutions for enterprise sector and technical support for channel. Previously he work in Solidex and NextiraOne as presales enginner. He participated in number of audits and many projects in area of LAN, WAN and network security.
Topic of Presentation: The role of information in modern security systems
Language: Polish
Abstract: TBD
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksCloudflare
DDoS attacks are evolving. Detecting and mitigating attacks quickly and accurately is a key strategy to ensure business continuity.
Join this webinar to learn about:
- What is a DDoS attack and what it can cost you
- Global DDoS attack trends and what it means to you
- How Cloudflare Magic Transit and Kentik together monitor and mitigate DDoS attacks of all sizes and kinds
Cyberoam UTM appliances enables small offices to shift from plain firewall to comprehensive UTM protection with cost effective, which gives powerful security to protect your network from malware, spam, trojan, DoS, DDoS, Phishing, pharming and intrusions. Large organizations can implement uniform security and gain high visibility into remote and branch offices with centralized management and Layer 8 Identity-based security.
Learn what makes SCADAguardian (the Nozomi Networks flagship technology) so unique and powerful. From enterprise IT, to OT, we enable scalable security strategies for ICS.
PLNOG14: Czy można żyć bez systemu ochrony przed atakami DDoS - Marek JanikPROIDEA
Marek Janik - Huawei
Language: Polish
W trakcie sesji postaram sie zaprezentować sposoby ochrony sieci przed atakami DDoS, zarówno ogólno dostępnych, specjalizowanych oraz jako forma usługi od operatora lub dedykowanej firmy. Po prezentacji będzie można samemu ocenić czy „jakieś” i „jakie” rozwiązanie AntiDDoS jest potrzebne ze względu na prowadzona działalność w Internecie.
Zarejestruj się na kolejną edycję PLNOG już dzisiaj: krakow.plnog.pl
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
4. Functional prototype of HW accelerated
multigigabit (4x1GE, 1x10GE) NetFlow probe
Final recommendation – monitor EU
networks by the Flowmon (NetFlow) probe
2005/6
Our beginnings
5. 600+ customers on 5 continents
100+ employees, HQ in CZ
Rapidly growing - organically
Recognized/awarded
by Gartner and
Deloitte, technology
partnership
Technology leader
in next generation
network, security and
application monitoring
Who we are today
8. Next Generation Network Traffic &
Performance Monitoring (NetFlow/IPFIX)
• Provides visibility – “eyes” into the network traffic
• Saves time and money for network administrators
• Enables quick troubleshooting and ticket resolution
• Delivers a substantial reduction in network
implementation, operation and management costs
Value proposition - visibility
9. Next Generation Network Security -
Behavior Analysis & Anomaly Detection
• Detects and alerts on abnormal behaviors
• Reports anomalies and advanced persistent threats
• Detect intrusions and attacks not visible
by standard signature based tools
Paul E. Proctor,
VP at Gartner:
“NBA is about
higher visibility in
the behavior of
your network to
cover gaps left by
signature based
mechanism.”
Value proposition - security
10. Out of path Detection and Mitigation
of volumetric DoS/DDoS attacks
• Average cost of one minute downtime is $22.000
• Average downtime is 54 minutes per attack
• Protect your business & customers satisfaction
Value proposition – DDoS protection
12. Network Traffic
Monitoring
Network Statistics
Collection & Analysis
Advanced Analysis of
Network Statistics
Flowmon Probes
• Stand-alone passive sources of
network statistics (NetFlow / IPFIX )
Flowmon Collector
• Storing, visualization and analysis of
network statistics
Flowmon Modules
• Anomaly detection, traffic capture,
Application Performance Monitoring,
DDoS attacks detection and mitigation
The solution
13. All-in-one package
• data generation, collection, analytics, reporting, detection capabilities,
troubleshooting on infrastructure, application, database level – as an
all-in-one device
Neat integration
• use the whole potential of your past investments into network/security
instruments
Massive performance
• first 100G NetFlow/IPFIX probes in the world, the most robust NetFlow
collector
Ultimate scalability
• proven in deployments in organizations from 50 to 50 million users
Transparent licensing
• perpetual and subscription licensing per appliance, only limitations is a
performance of the given device
Smashing user-friendliness
• agentless, non-intrusive, easy and quick deployment, intuitive, straight-
forward GUI, great time-to-value
Outstanding cost efficiency
• best price/performance ration in the industry, low operational costs
How are we better?
15. Average cost of one minute downtime is
$22.000
Average downtime is 54 minutes per attack
Protect your business & customers satisfaction
Facts about DDoS
16. In-line detection and mitigation fits enterprises
• Limited number of uplinks
• L7 attacks coverage
• Reasonable price/performance ratio
ISP/telco/datacenter need out-of-path mitigation
• Focus on covering volumetric attacks
• To many uplinks and throughput
Solution?
Flow-based volumetric DDoS detection combined with out of
path mitigation
Protection strategies
17. DDoS detection and mitigation
• Focused on volumetric attacks
• Uses flow data from any sources (routers, probes, …)
• Predicts traffic volume using baseline/static methods
• Provides attack characteristics and notifications
Multi-tenant environment to protect various customers, network
segments, services, etc.
Universal deployment scenarios
Flowmon DDoS Defender
Standalone
Out-of-band elimination of
DDoS attack
(PBR, BGP)
Scrubbing Center
DDoS Defender overview
18. Uses various types of flow specification used for dynamic
signature of the attack
Provides specific action for traffic corresponding to the attack
characteristics
Flowmon DDoS Defender 3.0 supports following attributes to
create dynamic signature:
• Destination Prefix
• Source Prefix
• IP Protocol
• Destination port
• ICMP type
• ICMP code
BGP Flowspec
19. Detection performed over protected segments
• Segments defined by network subnets
For each segment, a set of baselines is learned from monitored
traffic. The attack is detected if the current traffic exceeds defined
threshold.
Baseline is learned for:
• TCP traffic with specific flags
• UDP traffic
• ICMP traffic
Attack detection
20. Alerting
• E-mail, Syslog, SNMP trap
Routing diversion
• PBR (Policy Based Routing)
• BGP (Border Gateway Protocol),
• BGP Flowspec
• RTBH (Remotely-Triggered Black Hole)
User-defined scripting
Automatic mitigation
• With out-of-band mitigation devices
• With services of Scrubbing center
Response to attack
21. Internet
Service Provider Core
Flow Data Collection
Learning Baselines
Attack
Anomaly Detection
Mitigation
Enforcement
Scrubbing center
Attack path Clean path
Traffic Diversion via
BGP Route Injection
Dynamic Protection
Policy Deployment
incl. Baselines and
attack characteristics
Protected Object 1
e.g. Data Center,
Organization,
Service etc…
Protected Object 2
Out-of-band
22. Internet
Service Provider Core
Flow Data Collection
Learning Baselines
Attack
Anomaly Detection
Mitigation
Enforcement
Protected Object 1
e.g. Data Center,
Organization,
Service etc…
Protected Object 2
Sending specific Route
advertisement via BGP
FlowSpec
Dynamic signature:
Dst IP: 1.1.1.1/32
Dst Port: 135
Protocol IP: 17 (UDP)
Discard
Dropped traffic for
Dst IP: 1.1.1.1/32
Dst Port: 135
Protocol IP: 17 (UDP)
BGP Flowspec
24. Multitenant DDoS protection for ISPs,
DCs, Cloud providers against volumetric
attacks
Fast detection - up to 1 min
SDN compatible
Affordable pricing
Comprehensive solution including NPMD,
NBA, APM and full packet capture
Summary
29. Flowmon Networks a.s.
U Vodárny 2965/2
616 00 Brno, Czech Republic
www.flowmon.com
Artur Kane
artur.kane@flowmon.com
+420 734 754 449
Editor's Notes
Our target customers are organizations with more than 100 computers. We bring values for their IT security and network departments. We provide next generation traffic and performance monitoring based on NetFlow statistics for network engineers which enable them to get full traffic visibility, save time, work more effectively and save money on network operation.
In parallel, we help security guys to detect behavior changes, advanced malware and other network threats. Here is the example from one finance institutions where we detected several workstations infected by botnet. Compromised workstations were part of DDoS attack and were attacking targets in other countries with spoofed China IP addresses.
In parallel, we help security guys to detect behavior changes, advanced malware and other network threats. Here is the example from one finance institutions where we detected several workstations infected by botnet. Compromised workstations were part of DDoS attack and were attacking targets in other countries with spoofed China IP addresses.
In parallel, we help security guys to detect behavior changes, advanced malware and other network threats. Here is the example from one finance institutions where we detected several workstations infected by botnet. Compromised workstations were part of DDoS attack and were attacking targets in other countries with spoofed China IP addresses.