For the last 15 years, IPv6 has been specified and tested, and is now embedded in many of our operating systems and devices. The presentation will discuss the current IPv6threat and mitigation landscape, covering a long history of compromises while also discussing methods that allow new security frameworks and innovative defenses that are not available in the current IPv4 Internet.Read more >
The developed world's global Internet registries have officially depleted their supply of free IPv4 addresses. IPv6 is not just the future—it’s already here (65% of Verizon’s traffic is over IPv6!). Some organizations even have their IPv6 allocations already. But since a single site assignment in IPv6 contains 1 trillion, trillion, addresses (or 279 trillion Internets!), designing an effective plan can be both intimidating and unnecessarily time consuming. With that many addresses, where do you start? Join us for this webinar as Tom Coffeen, Infoblox IPv6 evangelist and O'Reilly author of IPv6 Address Planning, discusses how to design, deploy, and successfully adopt an effective IPv6 addressing plan. Both IPv4 exhaustion and IPv6 adoption are real and happening now. Take the first step to realizing an effective IPv6 address plan and adoption strategy, and watch this webinar today.Read more >
This webinar takes a look at the drivers for deploying IPv6 and how if will affect your network. We then go on to examine the security considerations of the fact that IPv6 support is now ubiquitous on enterprise network equipment. IPv6 has been a long time coming but it's now something that's supported on the majority of enterprise equipment - your data centre is filled with IPv6-ready devices. Are they already talking IPv6 without your knowledge?Read more >
Real world comparison of IPv4 and IPv6 between international sites.
This webinar will give you a hands-on overview of how to validate and test your IPv6 network. Presenter is Marcus Jonsson, VP Product Management and co-founder at Netrounds.
You will learn how to measure network performance end-to-end for either IPv4 or IPv6, or for both at the same time using a so called dual stack. This will allow you to benchmark IPv4 vs IPv6 in terms of stability and quality as well as troubleshoot remotely and efficiently.
Learn how new upgrades to Tenable’s SecurityCenter CV™ identify vulnerabilities in devices that could be located in any of 18,446,744,073,709,551,614 (18 quintillion!) IPv6 addresses, the /64 space recommended for a “typical” organization.
Register for Tenable’s webcast on Dec 4 at 2PM EST to hear about the Newest version of SecurityCenter Continuous View™ (SC CV). This is the first solution designed to manage risk across IPv6 networks, the next generation of Internet address spaces.
- Ron Gula, Tenable Co-founder and CEO
- Jack Daniel, Tenable technical product manager
- Allan Carey, Tenable product marketing manager
With the Internet Society (ISOC)-sponsored global launch of IPv6 fast approaching on June 6, 2012, Mark Townsley takes a look back at the progress to date in IPv6 deployment to identify some gaps that still exist in experiencing and living the next generation Internet.Read more >
Why IPv6 now? What are the trends that IDC is seeing that are contributing to the growth of IPv6? We will also cover how application delivery solutions are an essential requirement for customers transitioning to IPv6.Read more >
Defining Your DDI Future
A DNS, DHCP, and IP address management solution (DDI) is essential for network availability and functionality. As networking demands increase and expand, it’s important to move beyond zero-dollar products, spreadsheets, and first-generation IP-centric systems to a modern solution for highly available, reliable, and resilient core services that can meet those future demands. But not all DDI solutions are created equal.
Join this webinar and learn:
- Why DDI is used
- 10 questions you should ask to evaluate a DDI solution
- How Infoblox uses DDI to integrate and deliver enterprise-grade network solutions and connectivity
We discussed The Metasploit Database. No matter where you are you should have an understanding of your current network environment. One of the best ways to capture, filter, and share network information is with the Metasploit Database. Keynote Speaker(s): Mr. Tyrone E. Wilson – Founder and President of Cover6 Solutions has over 20 years of experience focusing on Information Systems and Network Security. Wilson has extensive expertise in multiple areas of the cyber field including, but not limited to, network defense, cyber threat analysis, penetration testing/vulnerability assessments, and #IPv6. Wilson has a passion for spreading knowledge to all about everything he’s acquired through his years of experience. Disclaimer: Only scan/test network environments in which you have explicit permission to do so. A sample permission memo can be found at Whttp://www.counterhack.net/permission_memo.htmlRead more >
We discuss defensive tools/techniques to understand SOC Analyst fundamentals and why SOC Analysts are so highly sought after with the increasing hacking incidents. When most people hear "hacking", they think of offensive tools and software, but defensive tools play a big part in incident prevention, handling, response/recovery and forensics. This webinar is suitable for both beginners and seasoned professionals.
Tyrone E. Wilson - Founder, and CEO of Cover6 Solutions 19 years of experience focusing on Information Systems and Network Security. Wilson has extensive expertise in multiple areas of the cyber field including, but not limited to, network defense, cyber threat analysis, penetration testing/vulnerability assessments, and IPv6. Wilson has a passion and a mission for spreading knowledge to all that he can reach about everything that he’s acquired through his years of experience.
Candan Bolukbas is digital polymath and Certified Ethical Hacker. Candan fully appreciates the growing threat to digital communications and data accumulation which affects all of us. He is co-founder and chief technology officer for NormShield, Inc., a McLean-based “security-as-a-service solutions” company. Candan and NormShield’s primary focus is on cyber threat intelligence, vulnerability management and perimeter monitoring.