Five Ways To Optimize Your Network with Reputation Services

Pat Hill, Product Manager for DVLabs
Security attackers are constantly upgrading their techniques to make network attacks more difficult to detect with traditional measures. The security checks required to detect all of these attacks can overload your security products, but ignoring them can significantly decrease your network bandwidth. Reputation services enhance the security of traditional network security products by blocking access to areas of the Internet that compromised and delivering attacks on unsuspecting users. This provides a number of benefits to the organization including cutting down the amount of malicious traffic that must be inspected by the network device and cutting down on unnecessary traffic that is clogging bandwidth and slowing application usage. This presentation will highlight the security and network benefits of reputation services and the elements for finding the best solution.
Mar 15 2012
45 mins
Five Ways To Optimize Your Network with Reputation Services
Join us for this summit:
More from this community:

IT Service Management

Webinars and videos

  • Live and recorded (1971)
  • Upcoming (59)
  • Date
  • Rating
  • Views
  • Protiviti's IT Priorities Survey results reveal 2/3 companies are going through a major IT transformation in 2014. Join Protiviti's IT Consulting managing directors to discuss why.
  • In this session, we’ll introduce our cloud desktop offering and discuss how businesses are using this technology to drive down support costs, improve security, and create business agility. Additionally, we will discuss some best practices around planning and implementing a cloud desktop strategy.
  • 85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • Extend the reach of your Service Desk to your Mobile Support Teams.

    Join us for the fifth in our six part FrontRange UK Webcast Series "Change is in your Hands" hosted by UK Solutions Consultant Peter Coote.

    We know that service desk technicians can’t always be tied to a desk.
    As needs arise, they may be travelling, working remotely or moving around your building completing assignments and solving problems for customers, often with reduced access to the service desk.
    With FrontRange™ HEAT Mobile Field Service there’s no reason for your technicians to go off the grid when they’re on a service call.
    HEAT Mobile Field Service turns a handheld smart-phone into a mobile service desk client, allowing technicians to take the office with them wherever they go.

    Register today to hear how HEAT Mobile Field Service can:
    •Empower your technicians
    •Lower service costs
    •Improve response times

    Missed our LIVE webcast?
    Catch up with the rest of the series and more on the FrontRange BrightTALK Channel.
  • Best practice frameworks are in many ways comparable to the images and advice found in the columns of fashion magazines. IT Service Management, Program Management, and Software Development best practice frameworks portray flawless environments where projects and teams work in harmony; whereas fashion magazines portray flawless individuals dressed in perfectly tailored, top quality clothing that is impeccably put together. This is purposeful - Meant to inspire through providing suggestions and guidance on how we can improve our own situations.

    Join Amy and Drew through an interactive session that shows how mixing and matching frameworks for your organization is much like selecting a wardrobe. In this session, we will use ITIL, PMI, and Scrum as our best practice frameworks and demonstrate how organizations can mix, match, and tailor to create a style that is uniquely theirs.

    More about our Presenters:
    Amy Dykstra and Drew Walden of Cask, LLC bring more than 20 years of experience in the development, implementation, and application of systematic management frameworks supporting whole organizations, portfolios, programs, and individual projects and services. Within this context, they have developed and re-engineered business processes to align operations with business objectives and enabled organizations to acquire and employ the necessary resources and skills within agreed parameters of cost, time, and quality. Their combined portfolios of clients and experiences provide a unique take on the selection and implementation of various best practice frameworks.
  • Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • We may not have flying cars yet but the self-driving car is actually beginning its infancy. With all the technology swirling around us and in our pockets and purses surely the paradigm of the Service Desk has changed as well. Yes and No. Today’s users are bright and more tech-savvy in terms of using technology than ever before. As long as it works. But when something doesn't quite work, they want to solve it themselves using the easiest means at their disposal, Google, Twitter, Facebook, Instagram, Snapchat, etc. This might work well from their perspective but not from ours.

    Join George Spalding, Executive Vice President, Pink Elephant, as he focuses on the evolution of the Service Desk and what’s in store for the next 5 years.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • This webinar will provide you with two complementary perspectives on Business Relationship Management that will help you achieve true romance rather than ending up in unrequited love!
    Based on recent and ongoing interest in Business Relationship Management, there can be no doubt that BRM is a hot topic. Organizations realize that a better relationship between business and IT will result in more business value from the IT provider’s products and services.
    But how do you achieve this from a provider’s perspective? What kind of knowledge, skills, behaviors and processes do you need? And because the relationship is by definition with the business, what do you expect from your partners on ‘the other side of the fence’? How can you help them to fulfil their side of the bargain?
    After listening to Aleksandr and Mark share their two perspectives, there’ll be ample opportunity for you to join in and contribute to the dialogue - you are most welcome!
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer. This week tune in and learn how your employees can hold multi-point HD video meetings around the world, anytime and anywhere with RingCentral Meetings.
  • Channel
  • Channel profile
Up Down
  • HP TippingPoint and Lastline team to offer advanced protection. May 22 2014 8:00 pm UTC 90 mins
    Cyber criminals have become more sophisticated and more determined than ever. Protecting your business from advanced malware requires new techniques tuned to these emerging threats. Now, HP TippingPoint Security Management System works with Lastline to provide an advanced layer of protection against the most sophisticated attacks.

    Attend the webinar to learn:
    • How Lastline uses the HP TippingPoint Advanced Threat application programming interface (API) to integrate their global threat intelligence and advanced malware detection capabilities with HP TippingPoint
    • How the industry-leading security intelligence of HP TippingPoint and Lastline’s innovative products combine to help you stay ahead of the bad guys
  • HP TippingPoint enhances perimeter protection to defend against advanced threats Recorded: Apr 24 2014 27 mins
    Every time you add new software or devices to your network, you create new opportunity for hackers. To keep your business safe, you need a collaborative security strategy that defends against advanced threats like malware and botnet attacks. Staying ahead of persistent adversaries is critical—simple detect-and-block tactics will no longer keep you protected.



    Attend this webinar to learn:
    · How HP TippingPoint Security Management System works with Damballa to provide an advanced layer of protection

    · How Damballa uses the HP TippingPoint Advanced Threat application programming interface (API) to alert HP TippingPoint to infected devices in your network

    · How HP TippingPoint block identified threats at wire speed
  • Security Without Compromise: One Approach for the Financial Services Industry Recorded: Apr 15 2014 34 mins
    Learn from ING how one of the largest financial services corporations implemented ReputationDV (RepDV) from HP TippingPoint to proactively secure their network without compromising performance. RepDV, a security intelligence tool, monitors inbound and outbound communications to identify and block undesirable hosts. Updated every two hours, this robust security intelligence feed searches through hundreds of thousands of known malicious IPv4, IPv6, and DNS names and assigns a threat score of 1 to 100. Rated based on the analysis of the source, category, or threat, this score helps block traffic that poses a potential security risk. ING has had amazing success with HP TippingPoint RepDV:
    - 2 million connections blocked in 15 months
    - 75% decrease in total malware related incidents
    - 0 false positives
    ING will cover how deploying HP TippingPoint security intelligence helped simplify their network security strategy while increasing reliability and effectiveness.
  • Beyond best practices – Lessons from the HP Cyber risk report Recorded: Mar 25 2014 37 mins
    The complexity and difficulty of securing enterprises only grows with the passage of time. However, with the right information, organizations can significantly reduce their attack surface, substantially mitigate risks, and prevent the losses and damages associated with successful attacks. To that end, we examined the areas that significantly contributed to the growing attack surface in 2013. Come learn what those are and what – beyond standard best practices – you can do today.
  • Why You Need a Next Generation Firewall Recorded: Mar 3 2014 3 mins
    Next-generation (NG) firewalls, with features such as deep packet inspection, intrusion detection, application identification, and granular control, are important weapons in the battle against hacking and malware. Mobile applications have taken the overall scheme of corporate IT, and NG firewalls enable organizations to incorporate full-stack inspection to support intrusion prevention. This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations.
  • Why you need to reconsider the OLD approach to Network Security Recorded: Feb 20 2014 42 mins
    Think your current approach to network security is lacking the next generation approach? You might be right! Join us for this webinar where Chris Rodriquez, Senior Analyst at Frost and Sullivan, will share current best practices in network security. He’ll cover approaches to network security hardware and software that will help your organization plan for the evolving threat landscape. Marco Ginocchio, Director of Regional Product Management from HP, will discuss how some of the next generation approaches to network security are being actualized in HP TippingPoint products.
  • Threat & Risk Management: Custom Digital Vaccine Creation Recorded: Feb 20 2014 48 mins
    HP TippingPoint DVLabs is on your side with over 8,600 filters right out of the box. These filters are focused on vulnerability and blocking all potential exploits on your network. But what if you need custom filter for your network? Watch Steve Povolny, manager of the Digital Vaccine team at HP TippingPoint, share best practices on how to follow the research, develop the filter, and test the performance with DV Toolkit. HP TippingPoint DVLabs allows organizations to tailor their network security strategies to even the score over the adversary.
  • Forrester's Take on the Next-Generation Firewall Market Recorded: Feb 10 2014 4 mins
    Watch this video to hear what John Kindervag from Forrester Research has to say about next-generation security.
  • Develop knowledge-based security using Zero Trust Recorded: Jan 22 2014 33 mins
    Threats are constantly mutating. Bad actors are everywhere. You could be attacked at any time from any direction. No longer are cyber attacks limited to external "hackers." All of these things makes the security professionals job much harder. To properly protect your organizations digital assets, you must transform your organization so that you can protect against all types of threats. By leveraging the concepts of Forrester's Zero Trust Network, you can build a secure network that you know is robust, agile, and able to meet the challenges of mutating threats. We call this "Knowledge-based Security". By leveraging the information, visibility, and proactive protections provided by Zero Trust, you can have the knowledge that you are providing your organization with state of the art protection.

    Additionally, you’ll hear from HP’s Senior Director of Network Security Product Management, Anthony Woolf, about how HP is providing zero-trust related capabilities through the HP TippingPoint IPS and NGFW devices.
  • How to Capture, Label, and Detect through a DNS Markov Model Recorded: Jan 16 2014 37 mins
    Quantifying which DNS hosts are unknown or infected is a complex undertaking. Building a Markov Model allows organizations to create data driven decisions based on calculated benchmarks to eliminate the guessing and diagnose infected hosts. Attend this webinar and see firsthand how the DVLabs organization custom builds a DNS Markov Model that allows for easier detection that will help you understand what is infected and what isn’t.
  • 2013 4th Annual Cost of Cyber Crime Study Results: Asia Recorded: Oct 31 2013 60 mins
    2013 Cost of Cyber Crime Study: Australia & Japan

    Join us for the 2013 results presentation of the second annual Cost of Cyber Crime study for Australia and Japan. Conducted by Ponemon Institute and sponsored by HP Enterprise Security, a total of 64 Australian and Japanese organizations participated. According to the findings, cyber attacks increased 12 percent in Australia and 32 percent in Japan. The costs associated with this increase in Australia were $772,903 and ¥265 million in Japan. “Findings from the report also show that each week Australian and Japanese organizations experienced on average 1.4 successful attacks per company”
  • 2013 4th Annual Cost of Cyber Crime Study Results: Europe Recorded: Oct 30 2013 62 mins
    2013 Cost of Cyber Crime Study: UK, Germany & France

    Join us for the 2013 results presentation of the second annual Cost of Cyber Crime study for the United Kingdom and Germany. For the first time, the research was conducted in France. Conducted by Ponemon Institute and sponsored by HP Enterprise Security, a total of 110 UK, German and French organizations participated. According to the findings, cyber attacks increased 16 percent in the UK and 21 percent in Germany. The costs associated with this increase in the UK and Germany were £904,886 and €830,169, respectively. For the first time, it was determined that the average cost of a cyber attack in France was €3.89 million. Findings from the report also show that each week UK and German organizations experienced on average 1.3 successful attacks per company. French organizations experienced an average of 1 cyber attack per company.
  • 2013 4th Annual Cost of Cyber Crime Study Results: Americas Recorded: Oct 29 2013 61 mins
    Join us for the 2013 results presentation of the 4th Annual Cost of Cyber Crime Study, conducted by Ponemon Institute and sponsored by HP Enterprise Security. This study, based on a benchmark sample of U.S. organizations, shows that cyber attacks not only increased 12 percent last year, the costs associated with those attacks increased by an average of 26 percent or $2.6 million per organization. Findings from the report also show that each week, an organization can expect two of the many cyber attacks launched against it to succeed.

    Join us for this important webinar and learn how:
    • All industries and all sizes of organizations fall victim to cyber crime, but to different degrees.
    • Denial of service, malicious insiders and web-based attacks comprise the most costly crimes.
    • Attacks can be mitigated by SIEM, enterprise governance, application security testing and other prevention-focused strategies and technologies.
  • Analyst Webcast: Not your Father's IPS: SANS Survey on Network Security Results Recorded: Oct 29 2013 54 mins
    Changing threats, business processes and technology call for a new look at network security and how it interacts with our intrusion prevention systems. But just what are the next-generation intrusion prevention systems we need to meet those threats, and what do your peers think should be in them?

    Join us for this Webcast, in which we unveil the results of our network security survey, to learn:

    •How you compare with your peers in management support for network security
    •Where you stand in IPS deployment vs. your peers
    •What features your peers would like to see in next generation IPS
    •Which elements, such as firewalls, routers, switches and clients they would like to see as part of a next generation fabric-based IPS.
    Register for this webcast and be among the first to receive access to a complimentary whitepaper on the same subject developed by Rob Vandenbrink.
  • Threat Central – Cloud based Threat Intelligence Sharing Recorded: Oct 9 2013 24 mins
    In the new generation of cyber defense, security intelligence becomes a key element. Recent technology advances provide the foundation for a new type of threat intelligence sharing platform to organize, collaborate, and manage risk more effectively. This sharing platform makes your security program more effective with actionable protection.
  • The lost art of vulnerability research Recorded: Oct 2 2013 51 mins
    What grade would you give your company on using vulnerability research to protect your organization from new security threats?
    If not an A+, learn best practices from Frost and Sullivan’s Chris Rodriguez, senior industry analyst on network security.

    In this webinar, we’ll discuss current threats that have been mitigated by leading vulnerability research and share how timely vulnerability research can help your organization prepare.
  • Cutting Through the Hype: What Is True “Next Generation” Security Recorded: Aug 13 2013 47 mins
    Organizations are struggling with new and more sophisticated threats, borderless networks, increased bandwidth requirements and more applications spread throughout the entire data center. A wealth of vendors are claiming to offer “next generation” security capabilities to address every security need under the sun. Cut through the nomenclature to learn what “next generation” really means and how it can actually help you meet today’s challenges head on and ignore all the hype.
  • Top 10 Tips to be Compliant and Secure Together Recorded: Jan 17 2013 45 mins
    Compliance and security are better together and there are tools and resources that can be combined to achieve both. Learn the top 10 tips - such as continuous monitoring, assessing the controls, and cost-effective audit logs - to understand and implement best practices of compliance and security together.
  • Modular Security For Today’s Cyber Threats and Cloud-Based Data Centers Recorded: Jan 17 2013 49 mins
    Network security is not just about eliminating bad traffic, it is also about making sure applications and critical data are always available to the right audience at the right time. The right network security architecture can provide security for physical assets, but also extend protection for virtual and cloud computing infrastructures without impacting performance. In fact, unlike in the past, a network security product should never be considered a bottleneck due to deep packet inspection, but should actually be capable of improving bandwidth and performance.

    About the Presenter:
    Sanjay Raja, Director of Product Marketing for HP TippingPoint, is responsible for marketing of HP TippingPoint’s Network and Cloud Security solutions. He has over 12 years of experience in various Product Marketing, Product Management, and Alliances roles primarily in IT Security. He has been in the IT industry for the last 18 years with experience in Security, Networking, Servers and Storage and Network and Application Performance Testing. In addition he has authored several papers and presented at various industry events on security, compliance and testing. Prior to HP he has worked at Cabletron Systems, 3Com, Nexsi Systems, Spirent Communications, Top Layer Networks, Symantec and most recently Crossbeam Systems. Sanjay currently holds a B.S.EE and MBA from Worcester Polytechnic Institute.
  • Social Networking: Risky for the Enterprise? Recorded: Sep 6 2012 49 mins
    Social networking for most of us is becoming wrapped into our DNA. This is especially important for the next generation workforce. Additionally, the employees today and those of tomorrow will expect the capability to blog and social network with corporate assets and corporate bandwidth. Additionally, these technologies are being widely used for corporate marketing and communication. That is why it's important to look at all aspects of securing your infrastructure and more importantly, the people that drive your organization today. This involves educating people, corporate process and the right security technologies. The following session will cover the benefits and the security risks inherit with social networking across all business verticals. Additionally, the author will provide a use case analysis of information that is gathered via web beacons that harvest information unknowing to the user.
Delivering Advanced Network Defense to the Enterprise
This channel covers the latest topics in network security, virtualization security, and threat research from HP TippingPoint and HP DVLabs to help security professionals protect their network against ever-evolving threats
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Five Ways To Optimize Your Network with Reputation Services
  • Live at: Mar 15 2012 6:00 pm
  • Presented by: Pat Hill, Product Manager for DVLabs
  • From:
Your email has been sent.
or close
You must be logged in to email this