157 posts categorized "LMTV" Feed

LMTV LIVE | Meet the Ekahau Geeks (with Tony Fortunato and Tim O'Neil)

 

Join Tony Fortunato and Tim O'Neill Wednesday April 4 at 9:30 Eastern as they interview the geeks from Ekahau (https://www.ekahau.com).

Jerry Olla, Jussi Kiviniemi and Joel Crane will be discussing WiFi tools and common Wifi issues that they see out there. Why is Wi-Fi often so bad? What can we do about it? What does bad, and good Wi-Fi look like?

We will also see live demos of their brand-new Wi-Fi design and troubleshooting hardware and software tools.

As Tim O’Neil says, “WiFi is now an essential part of your corporate network infrastructure! Learn from experts on how to monitor, manage and secure.”

Ekahau upcoming event 
Cisco-Geekfest-2018-logo_400x400-146x146

2018 Cisco Geekfest

May 8th - 10th, 2018
Chicago, IL 

LMTV LIVE | Troubleshooting Tesla Model S Connectivity (with Jonathan Whiteside, Darrin Roach and Paul Offord)

Tesla Motors is very much at the forefront of the ‘Connected Vehicle’ revolution, producing vehicles with ‘always on’ connectivity through 4G LTE and WiFi. This gives the driver features such as Google Maps navigation, web access and Spotify.

If you had a connectivity issue with a Tesla Model S, how could you troubleshoot it?  Are specialist tools needed or could you just use standard kit?

In this week's session, Jonathan Whiteside and Darrin Roach of Advance7 describe an experiment to learn more about connected vehicle technology by tracing the data flows between a desktop PC app called Tesla Control, the Tesla Cloud Services and a Tesla Model S.  There were some challenges and a couple of surprises.

For more background information, see Jonathan's paper "Tesla Model S Remote Control" on the TribeLab site - https://community.tribelab.com/course/view.php?id=37


Upcoming LMTV Event on How to Improve Compliance Activities for IT

Upcoming LMTV Event on How to Improve Compliance Activities for IT

There is a new LMTV event happening on April 11, 2018. Keith Bromley from Keysight Technologies (formerly Ixia) and Wayne Dixon from ForeScout will be talking about how to use network visibility to improve regulatory compliance. While regulatory compliance is an important activity for medium to large businesses, easy and cost-effective solutions can be difficult to find.

Network visibility is an often overlooked, but critically important activity, that can help lower costs and make life easier for IT personnel working on compliance requirements. Solutions like network packet brokers (NPBs) allow you mask sensitive data, perform packet slicing, implement lawful intercept, and discover rogue IT. Purpose-built compliance solutions can also use data filtered by NPBs to perform activities better and also allow IT to demonstrate their regulatory compliance in an easy manner.

Some key thoughts we will discuss during the event:

  • A Visibility Architecture is an end-to-end infrastructure which enables physical and virtual network, application, and security visibility. Instead of just adding components as you need them at sporadic intervals (i.e. crisis points), step back and take a larger view of where you are and what you want to achieve.
  • There are at least four specific areas where NPBs can help compliance activities for network monitoring to:
  • Provide masking of sensitive data. This includes data masking for one or more digits so that security and monitoring tools downstream don’t receive clear text data.
  • Remove the data packet payload with packet trimming. When packet header information is all you need, packet slicing allows you to eliminate the propagation of unnecessary and dangerous data within the payload of the packet.
  • Perform lawful intercept of data from specified IP addresses and VLANs.
  • Create regular expression search strings using application intelligence to enable better searches for specific data
  • There are at least two additional areas where NPBs can help a security architecture to:
  • Discover rogue IT (unauthorized applications and devices), which helps avoid policy and compliance issues.
  • Enforce IT policies, like detecting off-network storage and unapproved web-based email solutions, to identify exfiltration of data potential security risks.
  • Data from NPBs can also be fed to purpose-built compliance solutions like the ForeScout CounterACT solution to support demonstration of regulatory and endpoint compliance.

Join us for the fourth of several discussions to learn how to unleash the power of network visibility.

If you can’t make it to the event, watch the podcast on-demand or check out some of these free resources.

 

 


LMTV LIVE | Improve Network Security with Visibility (with Keith Bromley and Martin Holste)

 

LIVE Event Start Time: 9:30 AM PST, March 7, 2018

NetworkVis_Ad_TroubleshootIT_170x200Keith Bromley from Keysight Technologies (formerly Ixia) and Martin Holste from FireEye will be talking about how to use network visibility to improve network security.

Network security is one of, if not THE, most important topics for anyone in IT. This is true from the security engineer all the way to the CISO, CIO, and even the CEO. Everyone wants to improve security. The question though is, “What can you really do to improve it?” One solid answer is to strengthen your deployment of inline security tools. This is critical to an architecture where you are trying to maximize your defenses. Network visibility is what enables you to quickly isolate security threats.

Some key thoughts we will discuss during the event:

  • A Visibility Architecture is an end-to-end infrastructure which enables physical and virtual network, application, and security visibility
  • There are several possible ways to optimize your security architecture:
    • Insert external bypass switches between the network and security tools to improve network availability and reliability
    • Deploy the right kind security tools, like an IPS, to inspect incoming data and improve threat detection and isolation
    • Perform serial tool chaining for suspect data to improve the data inspection process Insert network packet brokers to improve security device availability by using either n+1 or High Availability technology
  • Security tools, like those from FireEye, can provide inline capabilities to help you improve your network operations. This lets you see and capture threats before they enter your network.
  • A visibility architecture typically yields immediate benefits such as the following: eliminating blind spots, improving data flow to security tools, and maximizing network and tool availability

Join us for the third of several discussions to learn how to unleash the power of network visibility.

Continue reading "LMTV LIVE | Improve Network Security with Visibility (with Keith Bromley and Martin Holste)" »


LMTV LIVE | How to Improve Network Troubleshooting (with Keith Bromley and Bill Coon)

With Paul Offord of Advance7 hosting, Keith Bromley from Keysight Technologies (formerly Ixia) and Bill Coon from Riverbed will be talking about how to use network visibility to improve troubleshooting.

According to an Enterprise Management Associates report (Network Management Megatrends 2016), IT teams already spend around 36% of their daily efforts on reactive troubleshooting efforts. In addition, pressure can increase exponentially on IT personnel as problem resolution time increases, since it directly correlates to network and application slowness and downtime. There is a new LMTV event happening on February 21, 2018. Keith Bromley from Keysight Technologies (formerly Ixia) and Bill Coon from Riverbed will be talking about how to use network visibility to improve troubleshooting. According to an Enterprise Management Associates report (Network Management Megatrends 2016), IT teams already spend around 36% of their daily efforts on reactive troubleshooting efforts. In addition, pressure can increase exponentially on IT personnel as problem resolution time increases, since it directly correlates to network and application slowness and downtime. 

Continue reading "LMTV LIVE | How to Improve Network Troubleshooting (with Keith Bromley and Bill Coon)" »