16 posts categorized "Visibility" Feed

LMTV LIVE | How To Diffuse The IT Blame Game (with Keith Bromley and Scott Peerbolte)

 

 

LIVE EVENT START TIME : 9:30 AM PST, Wednesday, June 27th, 2018

6a00e008d95770883401b8d2e041f0970c-800wiThis week we will be talking with Keith Bromley (from Keysight Technologies, formerly Ixia) and Scott Peerbolte (of Corvil) about how you can help break down silos and reduce the blame game that are common for most IT departments. 

For instance, how well do your IT departments communicate with each other?  

Enterprises typically contain four or more IT sub-departments (Security, Network Operations, Virtual DC, Capacity Planning, Service Desk, Compliance, etc.) and it’s quite common for them to be at odds with each other, even in good times. For instance, there’s often contention over capital budgets, sharing resources, and headcount. But let’s be generous. Let’s say that in normal operations things are usually good between departments. What happens if there’s a breach though, even a minor one? Then things can change quickly. Especially if there are problems with acquiring accurate monitoring data for security and troubleshooting areas. Finger pointing can quickly result. 

So, what can you do? One answer is to create complete network visibility (at a moment’s notice) for network security and network monitoring/troubleshooting activities. Join us on this podcast to learn how.

Some key thoughts we will discuss during the event:

 

Continue reading "LMTV LIVE | How To Diffuse The IT Blame Game (with Keith Bromley and Scott Peerbolte)" »


LMTV LIVE | Introducing Cubro the Network Visibility Company

 
 

Cubro_170x200Who is Cubro and WHY should every Network Technologist want to know?

Todays complex network technologists find it challenging and overwhelming to manage their networks in the effort to minimize issues, Legal and Technical, so one must have Total Visibility to be able to recognize performance issues, aberrant behavior, data leaks plus being able to prove that they are protecting their network and data!. Today’s data requirements for  carriers, data centers, defense organizations and enterprises is that they MUST be able to see all their data and applications in real time in order to secure and manage their growing networks and traffic demands while improving productivity and keeping watch for attacks and leaks.

The key to this success is Total Network Visibility with Line Rate, Real Time network segment with focus view capabilities.

Continue reading "LMTV LIVE | Introducing Cubro the Network Visibility Company" »


Use Network Packet Brokers to make data center security infrastructure more efficient and cost effective (by Yoram Ehrlich)

Use Network Packet Brokers to make data center security infrastructure more efficient and cost effective

Today’s enterprise networks and service providers are in a conundrum: as network technologies advance, managing network security has become harder and costlier. Sure, they could continuously introduce new monitoring tools - but this adds configuration hours and management complexities to an already intricate scenario. They could also replace slow-running tools with higher-speed devices - but they’ll incur additional costs. Or, for better results, they can adopt a holistic network monitoring infrastructure that enables migration to a higher network speed while increasing the effectiveness of existing security and monitoring tools.

Today’s security landscape demands strong, holistic-visibility architecture

Security breaches are moving up to ever higher (and frightening) levels and remain a thorn in organizations’ sides. Verizon’s 2018 Data Breach Investigations Report (DBIR) indicated that in 2017, more than 53,000 security incidents were reported and 2,216 breaches confirmed. The number of actual attacks remains unknown but undoubtedly is considerably higher.

Unfortunately, the issue of network security cannot be solved with a one-time purchase, and no security product is “perfect.” Today’s organizations’ best bet is a Network Visibility architecture-based security solution that reveals hidden network dangers and inefficiencies, identifies network hiccups and outages, increases network security, and addresses potential compliance issues — all before they impact the business.

Look for these four critical components when choosing a holistic approach: high efficiency and flexible access to the network, monitoring middleware functionalities (filtering, packet grooming, etc.), advanced monitoring functions (application intelligence, NetFlow support), and monitoring tools connectivity.

...and a more efficient and cost-effective security infrastructure

Continue reading "Use Network Packet Brokers to make data center security infrastructure more efficient and cost effective (by Yoram Ehrlich)" »


LMTV LIVE | Improve Network Security with Visibility (with Keith Bromley and Martin Holste)

 

LIVE Event Start Time: 9:30 AM PST, March 7, 2018

NetworkVis_Ad_TroubleshootIT_170x200Keith Bromley from Keysight Technologies (formerly Ixia) and Martin Holste from FireEye will be talking about how to use network visibility to improve network security.

Network security is one of, if not THE, most important topics for anyone in IT. This is true from the security engineer all the way to the CISO, CIO, and even the CEO. Everyone wants to improve security. The question though is, “What can you really do to improve it?” One solid answer is to strengthen your deployment of inline security tools. This is critical to an architecture where you are trying to maximize your defenses. Network visibility is what enables you to quickly isolate security threats.

Some key thoughts we will discuss during the event:

  • A Visibility Architecture is an end-to-end infrastructure which enables physical and virtual network, application, and security visibility
  • There are several possible ways to optimize your security architecture:
    • Insert external bypass switches between the network and security tools to improve network availability and reliability
    • Deploy the right kind security tools, like an IPS, to inspect incoming data and improve threat detection and isolation
    • Perform serial tool chaining for suspect data to improve the data inspection process Insert network packet brokers to improve security device availability by using either n+1 or High Availability technology
  • Security tools, like those from FireEye, can provide inline capabilities to help you improve your network operations. This lets you see and capture threats before they enter your network.
  • A visibility architecture typically yields immediate benefits such as the following: eliminating blind spots, improving data flow to security tools, and maximizing network and tool availability

Join us for the third of several discussions to learn how to unleash the power of network visibility.

Continue reading "LMTV LIVE | Improve Network Security with Visibility (with Keith Bromley and Martin Holste)" »


LMTV LIVE | How to Improve Network Troubleshooting (with Keith Bromley and Bill Coon)

With Paul Offord of Advance7 hosting, Keith Bromley from Keysight Technologies (formerly Ixia) and Bill Coon from Riverbed will be talking about how to use network visibility to improve troubleshooting.

According to an Enterprise Management Associates report (Network Management Megatrends 2016), IT teams already spend around 36% of their daily efforts on reactive troubleshooting efforts. In addition, pressure can increase exponentially on IT personnel as problem resolution time increases, since it directly correlates to network and application slowness and downtime. There is a new LMTV event happening on February 21, 2018. Keith Bromley from Keysight Technologies (formerly Ixia) and Bill Coon from Riverbed will be talking about how to use network visibility to improve troubleshooting. According to an Enterprise Management Associates report (Network Management Megatrends 2016), IT teams already spend around 36% of their daily efforts on reactive troubleshooting efforts. In addition, pressure can increase exponentially on IT personnel as problem resolution time increases, since it directly correlates to network and application slowness and downtime. 

Continue reading "LMTV LIVE | How to Improve Network Troubleshooting (with Keith Bromley and Bill Coon)" »