LMTV LIVE | How to Improve Network Troubleshooting (with Keith Bromley and Bill Coon)
Wireshark Fundamentals (by Tony Fortunato)

LMTV LIVE | Improve Network Security with Visibility (with Keith Bromley and Martin Holste)


LIVE Event Start Time: 9:30 AM PST, March 7, 2018

NetworkVis_Ad_TroubleshootIT_170x200Keith Bromley from Keysight Technologies (formerly Ixia) and Martin Holste from FireEye will be talking about how to use network visibility to improve network security.

Network security is one of, if not THE, most important topics for anyone in IT. This is true from the security engineer all the way to the CISO, CIO, and even the CEO. Everyone wants to improve security. The question though is, “What can you really do to improve it?” One solid answer is to strengthen your deployment of inline security tools. This is critical to an architecture where you are trying to maximize your defenses. Network visibility is what enables you to quickly isolate security threats.

Some key thoughts we will discuss during the event:

  • A Visibility Architecture is an end-to-end infrastructure which enables physical and virtual network, application, and security visibility
  • There are several possible ways to optimize your security architecture:
    • Insert external bypass switches between the network and security tools to improve network availability and reliability
    • Deploy the right kind security tools, like an IPS, to inspect incoming data and improve threat detection and isolation
    • Perform serial tool chaining for suspect data to improve the data inspection process Insert network packet brokers to improve security device availability by using either n+1 or High Availability technology
  • Security tools, like those from FireEye, can provide inline capabilities to help you improve your network operations. This lets you see and capture threats before they enter your network.
  • A visibility architecture typically yields immediate benefits such as the following: eliminating blind spots, improving data flow to security tools, and maximizing network and tool availability

Join us for the third of several discussions to learn how to unleash the power of network visibility.

If you can’t make it to the event, watch the podcast on-demand or check out some of these free resources.