The Advantages of Filtering Applications

Logo
Presented by

Ollie Sheridan, Principal Engineer Security, Gigamon, Brandon Dunlap, Moderator, (ISC)²

About this talk

Traditional methods of filtering traffic have relied upon a knowledge of the network and transport behaviours of the applications running across the network. Whilst most applications being run across the network use standard ports, many threat actors will use methods to obfuscate their communications by abusing these standards, with port spoofing being one such example. This represents a challenge when gathering traffic to ensure that this simple evasion method does not create a blind spot to your security countermeasures. Join us for this webinar to learn more about how you can: •Ensure that the Application traffic regardless of port spoofing gets to the right tool •Improve tool efficiency by discarding irrelevant Application traffic •Filter the traffic based on the application rather than the IP & Port
Related topics:

More from this channel

Upcoming talks (11)
On-demand talks (392)
Subscribers (93607)
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs