18 posts categorized "Visibility" Feed

SharkFest US ’18 - The 20th anniversary of Wireshark! A recap by the ProfiTAP Team!  (by Rick Van Werven)

SharkFest US ’18 recap from the eyes of a Very Happy Sponsor!  

Another SharkFest has ended and, long story short, it was a great success!

The 11th annual SharkFest 2018 Wireshark Developer and User Conference took place at the Computer History Museum in Mountain View, CA, between June 25 - 28.

This year it also celebrated 20 years of Wireshark, the most popular open source packet analyzer that is used world wide by millions (probably Billions) of network, performance and security analysts and data technologists.

 Congratulations Gerald Combs,  the Wireshark Developers and Wireshark World Team!

Gerald Combs - Founder of Wireshark with long time Sharkfest instructor and

WWW.Lovemytool.com author Chris Greer

Gerald and chris

IMG_2850

Happy Birthday Wireshark from the Profitap team -

SharkfestÁngel Luis Flórez Parra (left) and Geoffrey Kempenich (Right) of ProfiTAP with Wired "shark"

 SharkFest is a great event for Profitap and other vendors to attend as a sponsor, because of the unique chance to get feedback from the Top Technologists, Wireshark developers and Real World users.

This year ProfiTAP focused on solutions that when combined with Wireshark can forge Packet Analysis Heroes.  Network Heroes Favorite Capture Tool Solution at SharkFest’18 US

Network Heroes Banner

Read and see more of Sharkfest 2018 - The 20th anniversary of Wireshark!

 

Continue reading "SharkFest US ’18 - The 20th anniversary of Wireshark! A recap by the ProfiTAP Team!  (by Rick Van Werven)" »


Diffusing The IT Blame Game With Network Visibility (by Keith Bromley)

Diffusing The IT Blame Game With Network Visibility

How well does your company communicate internally? Specifically, how well do your IT departments communicate with each other?  Enterprises typically contain four or more IT sub departments (Security, Network Operations, Virtual DC, Capacity Planning, Service Desk, Compliance, etc.) and it’s quite common for them to be at odds with each other, even in good times. For instance, there’s often contention over capital budgets, sharing resources, and headcount.

But let’s be generous. Let’s say that in normal operations things are usually good between departments. What happens if there’s a breach though, even a minor one? Then things can change quickly. Especially if there are problems with acquiring accurate monitoring data for security and troubleshooting areas. Finger pointing can quickly result.

So, what can you do? We recently discussed this on an LMTV podcast How To Diffuse The IT Blame Game. One of the answers is to create complete network visibility for network security and network monitoring and troubleshooting activities.

For instance, here are three common sources of issues for most IT organizations:

  • There is a lack of proper access to network data
  • Analytic and security tools can be modified, moved, or just plain disappear without permission
  • Capture and analysis of monitoring data can create business risk and problems for other departments

Continue reading "Diffusing The IT Blame Game With Network Visibility (by Keith Bromley)" »


LMTV LIVE | How To Diffuse The IT Blame Game (with Keith Bromley and Scott Peerbolte)

 

 

LIVE EVENT START TIME : 9:30 AM PST, Wednesday, June 27th, 2018

6a00e008d95770883401b8d2e041f0970c-800wiThis week we will be talking with Keith Bromley (from Keysight Technologies, formerly Ixia) and Scott Peerbolte (of Corvil) about how you can help break down silos and reduce the blame game that are common for most IT departments. 

For instance, how well do your IT departments communicate with each other?  

Enterprises typically contain four or more IT sub-departments (Security, Network Operations, Virtual DC, Capacity Planning, Service Desk, Compliance, etc.) and it’s quite common for them to be at odds with each other, even in good times. For instance, there’s often contention over capital budgets, sharing resources, and headcount. But let’s be generous. Let’s say that in normal operations things are usually good between departments. What happens if there’s a breach though, even a minor one? Then things can change quickly. Especially if there are problems with acquiring accurate monitoring data for security and troubleshooting areas. Finger pointing can quickly result. 

So, what can you do? One answer is to create complete network visibility (at a moment’s notice) for network security and network monitoring/troubleshooting activities. Join us on this podcast to learn how.

Some key thoughts we will discuss during the event:

 

Continue reading "LMTV LIVE | How To Diffuse The IT Blame Game (with Keith Bromley and Scott Peerbolte)" »


LMTV LIVE | Introducing Cubro the Network Visibility Company

 
 

Cubro_170x200Who is Cubro and WHY should every Network Technologist want to know?

Todays complex network technologists find it challenging and overwhelming to manage their networks in the effort to minimize issues, Legal and Technical, so one must have Total Visibility to be able to recognize performance issues, aberrant behavior, data leaks plus being able to prove that they are protecting their network and data!. Today’s data requirements for  carriers, data centers, defense organizations and enterprises is that they MUST be able to see all their data and applications in real time in order to secure and manage their growing networks and traffic demands while improving productivity and keeping watch for attacks and leaks.

The key to this success is Total Network Visibility with Line Rate, Real Time network segment with focus view capabilities.

Continue reading "LMTV LIVE | Introducing Cubro the Network Visibility Company" »


Use Network Packet Brokers to make data center security infrastructure more efficient and cost effective (by Yoram Ehrlich)

Use Network Packet Brokers to make data center security infrastructure more efficient and cost effective

Today’s enterprise networks and service providers are in a conundrum: as network technologies advance, managing network security has become harder and costlier. Sure, they could continuously introduce new monitoring tools - but this adds configuration hours and management complexities to an already intricate scenario. They could also replace slow-running tools with higher-speed devices - but they’ll incur additional costs. Or, for better results, they can adopt a holistic network monitoring infrastructure that enables migration to a higher network speed while increasing the effectiveness of existing security and monitoring tools.

Today’s security landscape demands strong, holistic-visibility architecture

Security breaches are moving up to ever higher (and frightening) levels and remain a thorn in organizations’ sides. Verizon’s 2018 Data Breach Investigations Report (DBIR) indicated that in 2017, more than 53,000 security incidents were reported and 2,216 breaches confirmed. The number of actual attacks remains unknown but undoubtedly is considerably higher.

Unfortunately, the issue of network security cannot be solved with a one-time purchase, and no security product is “perfect.” Today’s organizations’ best bet is a Network Visibility architecture-based security solution that reveals hidden network dangers and inefficiencies, identifies network hiccups and outages, increases network security, and addresses potential compliance issues — all before they impact the business.

Look for these four critical components when choosing a holistic approach: high efficiency and flexible access to the network, monitoring middleware functionalities (filtering, packet grooming, etc.), advanced monitoring functions (application intelligence, NetFlow support), and monitoring tools connectivity.

...and a more efficient and cost-effective security infrastructure

Continue reading "Use Network Packet Brokers to make data center security infrastructure more efficient and cost effective (by Yoram Ehrlich)" »