Тёмный

WEBINAR: Scaling Network-Based Threat Detection for East-West Traffic 

Stamus Networks
Подписаться 354
Просмотров 198
50% 1

NOTE: this webinar was recorded live on 20-June-2024
In this joint webinar with Stamus Networks, Garland Technologies, and NetQuest, the presenters explore the necessity of east-west network traffic monitoring for threat detection and response and how to cost-effectively build the architecture to gain comprehensive visibility.
This webinar is presented by:
* Phil Owens, VP Customer Solutions at Stamus Networks
* Chris Bihary - CEO and Co-founder of Garland Technology
* Steven Shalita - VP Market Strategy and Business Development at NetQuest
Webinar Description
--------------------------------
Network security has historically focused on the perimeter and ‘North-South’ network traffic activities. However, as countless breaches have revealed, attackers are successfully breaching the perimeter and gaining access to vulnerable systems undetected. Once inside your network, attackers are moving freely - uncovering weaknesses, expanding their footprint, and gaining access to sensitive data, all while remaining undetected.
Given the persistent and pervasive nature of cyberthreats, gaining visibility beyond the perimeter has become essential. And leveraging the power of network-derived intelligence and advanced Network Detection and Response (NDR) analytics is a critical strategy to identify and mitigate these attacks.
Why? As attackers move across the network in search of valuable assets and sensitive data, they leave behind a trail of lateral movement that you can use to identify the attack earlier in the kill chain. With the right tools in place, defenders can detect and identify weak attack signals hidden in internal east-west traffic that enable you to identify and mitigate an attack, significantly reducing dwell time.
In this webinar, we explore a proven end-to-end deployment blueprint and powerful NDR capabilities to cost-effectively establish visibility into East-West traffic.
Topics we explore include:
* How attackers are exploiting east-west pathways to bypass traditional defenses and the risks of east-west traffic movement including insider threats, unauthorized access, data exfiltration, and malware and ransomware spread
* The value of real-time network intelligence to identify breaches and attacks to uncover Declarations of Compromise (DoCs) sooner and why network-based intelligence is more valuable than flow logs to identify attacker activities and exploitations
* Why east-west visibility is essential even when implementing segmentation and zero-trust architectures since lateral movements can become ‘trusted’ and conceal an attacker’s tactics, techniques, and procedures (TTPs)
* An architectural blueprint for establishing visibility into east-west traffic while overcoming the challenges of high-speed interconnection links, encrypted traffic, and high volumes of east-west communications
Watch this video to learn how you can harness the power to see everything moving across your network!

Наука

Опубликовано:

 

23 июн 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии    
Далее
How the Internet Works in 5 Minutes
4:49
Просмотров 4,3 млн
Credit card cloning is too easy!
9:07
Просмотров 3,1 млн
شربت كل الماء؟ 🤣
00:31
Просмотров 15 млн
The beauty of data visualization - David McCandless
18:18
Programmer-short original film
5:10
Просмотров 665 тыс.
How does a blockchain work - Simply Explained
6:00
Просмотров 10 млн
WEBINAR: Network Threat Hunting with Suricata and SELKS
1:05:48
Aura 879dsp новинка и хит
0:48
Просмотров 142 тыс.
Prices & Poco M4 Pro 5G
1:00
Просмотров 263 тыс.