391 posts categorized "Tony Fortunato" Feed

LMTV LIVE | How to Improve Compliance Activities for IT (with Keith Bromley and Timothy Jones)

Upcoming LMTV Event on How to Improve Compliance Activities for IT

 

There is a new LMTV event happening on April 11, 2018. Keith Bromley from Keysight Technologies (formerly Ixia) and Wayne Dixon from ForeScout will be talking about how to use network visibility to improve regulatory compliance. While regulatory compliance is an important activity for medium to large businesses, easy and cost-effective solutions can be difficult to find.

Network visibility is an often overlooked, but critically important activity, that can help lower costs and make life easier for IT personnel working on compliance requirements. Solutions like network packet brokers (NPBs) allow you mask sensitive data, perform packet slicing, implement lawful intercept, and discover rogue IT. Purpose-built compliance solutions can also use data filtered by NPBs to perform activities better and also allow IT to demonstrate their regulatory compliance in an easy manner.

Continue reading "LMTV LIVE | How to Improve Compliance Activities for IT (with Keith Bromley and Timothy Jones)" »


LMTV LIVE | Meet the Ekahau Geeks (with Tony Fortunato and Tim O'Neil)

 

Join Tony Fortunato and Tim O'Neill Wednesday April 4 at 9:30 Eastern as they interview the geeks from Ekahau (https://www.ekahau.com).

Jerry Olla, Jussi Kiviniemi and Joel Crane will be discussing WiFi tools and common Wifi issues that they see out there. Why is Wi-Fi often so bad? What can we do about it? What does bad, and good Wi-Fi look like?

We will also see live demos of their brand-new Wi-Fi design and troubleshooting hardware and software tools.

As Tim O’Neil says, “WiFi is now an essential part of your corporate network infrastructure! Learn from experts on how to monitor, manage and secure.”

Ekahau upcoming event 
Cisco-Geekfest-2018-logo_400x400-146x146

2018 Cisco Geekfest

May 8th - 10th, 2018
Chicago, IL 

Some Easy Ways To Improve Network Troubleshooting (by Keith Bromley)

Some Easy Ways To Improve Network Troubleshooting

Author:  Keith Bromley, Senior Solutions Marketing Manager, Keysight Technologies 

According to the Enterprise Management Associates report, Network Management Megatrends 2016, IT teams already spend around 36% of their daily efforts on reactive troubleshooting efforts. This is for good reason. Network and application troubleshooting can be one of the most high-profile and aggravating activities there is for IT personnel. Pressure increases exponentially on IT personnel as problem resolution times increase, since this directly correlates to network and application slowness and downtime.

This blog post, a video podcast, and an ebook provide suggestions on how you can improve your troubleshooting activities. The first thing you will want to do to reduce your troubleshooting time is to implement a visibility architecture. A visibility architecture is an end-to-end infrastructure which enables physical and virtual network, application, and security. Improved visibility is what allows you to optimize your network data capture and analysis techniques. A visibility architecture typically yields immediate benefits such as the following:  eliminating blind spots, improving data flow to security tools, and maximizing network and tool availability

Specifically, there are three layers to a visibility architecture. The first layer is data access. This is where you will want to insert taps into the network between the network data flow and your monitoring tools (or network packet broker) to improve the quality of monitoring data and time to data acquisition. Once the tap is installed into the network, it is a permanent and passive device that gives you data access. This means you don’t have to ask the Change Board for permission to touch the network again. You touch it once to install the tap and then you are done.

The second layer is the monitoring data manipulation layer. This is where you will want to deploy network packet brokers (NPBs) between those taps and the security and monitoring tools to optimize the data sent to the tools. After that, you can perform data filtering, deduplication, packet slicing, header stripping, and many other functions to optimize the data before it is sent to your tools. Just by implementing taps and NPBs, it is possible to reduce your mean time to repair (MTTR) by up to 80%. A significant portion of that time reduction comes by the reduction (and probable elimination) of Change Board approvals.

Continue reading "Some Easy Ways To Improve Network Troubleshooting (by Keith Bromley)" »


Wireshark Fundamentals (by Tony Fortunato)

I am noticing that i am  seeing a lot of people who are self taught when it comes to Wireshark and protocol analysis as well as those who want to get into it.

I decided to create a 2 hour Udemy (Wireshark Fundamentals) course to teach people Wireshark basics and in the last lecture Idemonstrate how to get started with protocol analysis.

The key is to demonstrate why and when to use a feature. Knowing where the features are doesn't imply you know when and why to use them.

I encourage anyone interested in protocol analysis to get familiar with cause and effect. That is where you simply do something and review those packets.

Last month had a draw for free coupons to take my class and thought it would be cool to post an entire lecture from the course.  Enjoy.

 

 

 

Continue reading other LoveMyTool posts by Tony Fortunato »


Upcoming LMTV Event on How to Improve Compliance Activities for IT

Upcoming LMTV Event on How to Improve Compliance Activities for IT

There is a new LMTV event happening on April 11, 2018. Keith Bromley from Keysight Technologies (formerly Ixia) and Wayne Dixon from ForeScout will be talking about how to use network visibility to improve regulatory compliance. While regulatory compliance is an important activity for medium to large businesses, easy and cost-effective solutions can be difficult to find.

Network visibility is an often overlooked, but critically important activity, that can help lower costs and make life easier for IT personnel working on compliance requirements. Solutions like network packet brokers (NPBs) allow you mask sensitive data, perform packet slicing, implement lawful intercept, and discover rogue IT. Purpose-built compliance solutions can also use data filtered by NPBs to perform activities better and also allow IT to demonstrate their regulatory compliance in an easy manner.

Some key thoughts we will discuss during the event:

  • A Visibility Architecture is an end-to-end infrastructure which enables physical and virtual network, application, and security visibility. Instead of just adding components as you need them at sporadic intervals (i.e. crisis points), step back and take a larger view of where you are and what you want to achieve.
  • There are at least four specific areas where NPBs can help compliance activities for network monitoring to:
  • Provide masking of sensitive data. This includes data masking for one or more digits so that security and monitoring tools downstream don’t receive clear text data.
  • Remove the data packet payload with packet trimming. When packet header information is all you need, packet slicing allows you to eliminate the propagation of unnecessary and dangerous data within the payload of the packet.
  • Perform lawful intercept of data from specified IP addresses and VLANs.
  • Create regular expression search strings using application intelligence to enable better searches for specific data
  • There are at least two additional areas where NPBs can help a security architecture to:
  • Discover rogue IT (unauthorized applications and devices), which helps avoid policy and compliance issues.
  • Enforce IT policies, like detecting off-network storage and unapproved web-based email solutions, to identify exfiltration of data potential security risks.
  • Data from NPBs can also be fed to purpose-built compliance solutions like the ForeScout CounterACT solution to support demonstration of regulatory and endpoint compliance.

Join us for the fourth of several discussions to learn how to unleash the power of network visibility.

If you can’t make it to the event, watch the podcast on-demand or check out some of these free resources.