Hi [[ session.user.profile.firstName ]]

Infosecurity 2016: Which are the Critical Vulnerabilities in the IoT?

- BrightTALK at Infosecurity Europe 2016 -

BrightTALK got the chance to talk all things cyber with President and Co-Founder of Extrahop Networks Raja Mukerji.

Raja covered aspects of cyber security including how to protect the extensive networks supporting the IoT; the relevancy of encryption in today's security landscape; increasing network visibility and how to best protect the most crucial and vulnerable aspects of national critical infrastructure.
Recorded Jun 14 2016 6 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Raja Mukerji, President & Co-Founder, Extrahop Networks & Josh Downs, Community Manager, BrightTALK
Presentation preview: Infosecurity 2016: Which are the Critical Vulnerabilities in the IoT?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Maintain Visibility in Hybrid Multi-Cloud Environments Recorded: Dec 14 2017 50 mins
    Brad Casemore - Research Director for Datacenter Networks, IDC and Eric Thomas - Director of Cloud Solutions, ExtraHop
    In the early days of aviation, flight instrumentation made it safer to fly in bad weather. Today, cloud computing is taking off and revolutionizing how applications are built and delivered. But while these technologies offer new possibilities, they also can obscure visibility and make it much more difficult for IT Operations teams to detect security threats and diagnose the root cause of performance issues.

    There is hope: the network remains the common denominator for all applications and provides a source of real-time insight across hybrid, multi-cloud environments.

    In this webinar, IDC Research Director Brad Casemore and ExtraHop’s Director of Solutions Architecture, Eric Thomas, discuss how organizations can tap into network communications and maintain visibility for security and performance.
  • Cybersecurity & Healthcare: How prepared are you? Recorded: Dec 12 2017 53 mins
    Ernie Hood, Senior Research Director with the Advisory Board and former Vice President and CIO at Group Health
    Securing your healthcare organization goes beyond investing in technology to secure your devices, data, and applications. In today's complex digital healthcare environment, your healthcare workflows broaden your risk exposure by interacting with multiple apps, devices, and users spread across multiple geographies. Securing these interactions and all of the components within these workflows requires investing in a comprehensive cybersecurity ecosystem that is more focused on business objectives and less focused on securing individual applications and devices.

    This webinar will discuss the pieces of a cybersecurity ecosystem model, and how this type of model requires policies, processes, and technologies that allow your healthcare organization to take a more proactive approach to risk management and security.
  • Extend Network Visibility and Real-Time Analytics to Remote Locations Recorded: Nov 8 2017 30 mins
    Scot Brooks, PCC - Network Engineer, Juan Garza, APCON - RSM, Ryan Davis, ExtraHop - Sr. Product Marketing Manager
    Join us on November 8th, as ExtraHop, APCON, and Portland Community College (PCC) discuss the challenges PCC faced when trying to expand visibility and aggregate network traffic from multiple remote sites. The group will discuss how PCC was troubleshooting and managing their network in the past and how they’re now able to have visibility across multiple remote sites, access to instant dashboards, and the ability to go back in time to look at historical metrics -- all while staying within a tight budget.
  • How to Leverage Strategic Security Data: Better Results, Less Work Recorded: Nov 2 2017 62 mins
    Matt Cauthorn - VP of Security - Extrahop Networks, and Eric Ogren, Senior Analyst - Security - 451 Research
    Even the most advanced cybersecurity efforts are incomplete, as evidenced by the increasing number of major corporate data breaches that make headlines each year. Security professionals are forced to rely on SIEM platforms and other tools that, while valuable, are inherently limited and cannot be expected to deliver the complete results necessary for good security. Current efforts are barely keeping up with attackers. More tools, even better tools, are not the answer.

    This webinar will discuss a new discipline for understanding the role each data source fulfills in the cybersecurity toolset, and how to take a strategic approach to extracting the most relevant, valuable insights from each data source for a more complete security posture that requires less manual effort to achieve.
  • ExtraHop 7.0: Know the Shape of Your Enterprise Recorded: Oct 17 2017 53 mins
    Isaac Roybal, Director of Product Marketing
    Many teams throughout the enterprise—security, network, IT operations—lack the insights needed to make confident, data-driven decisions. People cannot access the data they need quickly, resulting in waste, slow response times, and expensive incidents.

    With the announcement of version 7.0, ExtraHop provides real-time and empirical data all teams can benefit from through complete visibility, faster incident resolution, and stronger security.

    In this webinar, we will cover the new ways we are helping our customers reveal the shape and context of their digital enterprise by demonstrating:
    • Live activity maps that allow for unprecedented visual environment exploration
    • Scheduled reports that share real-time views of the information that matters most to each user
  • “The Five Ls” for Troubleshooting Citrix Performance Issues Recorded: Sep 7 2017 29 mins
    Shaun Henderson, Regional Sales Manager, ExtraHop & Liam Jackson, Field Sales Manager, Phoenix Datacom Ltd
    Many organisations are looking for assistance to troubleshoot and tune their growing desktop and application virtualisation deployments.

    Join this webinar to discover how you can track five key metrics that characterize the performance of your Citrix environment. We call these metrics “The Five Ls”: Launches, Logon Time, Load Times, Latency, ChanneLs.

    ExtraHop and Phoenix Datacom will talk through real life examples of how the ExtraHop platform provides visualisations for these metrics as well as the details needed to dig deeper into the root cause making Citrix performance issues a thing of the past.
  • [Panel] Software-Defined in the Digital Transformation Era Recorded: Aug 17 2017 60 mins
    Arturo Suarez, Canonical; Idjiwa Adjido, Extrahop; Johna Till Johnson, Nemeretes; Haidee McMahon, Intel; Bob Crooks
    The ICT sector is moving us inexorably towards a software-enabled digital world, but many still fail to understand the power of this trend, how it is going to impact/benefit the ICT Industries and infrastructures delivering them.

    Among topics discussed will be:
    - Present and future impact of Software Defined technologies on IT (challenges and opportunities)
    - How Software-Defined is enabling the digital transformation
    - Best practices and recommendation on adopting software-defined technologies with the future in mind.

    This Webinar is aimed at IT professionals and CIOs/CDOs/CTOs seeking to understand more about how software-defined impacts the present and future of enterprises.
  • Integrating Network Analytics Into Your Security Architecture Recorded: Aug 2 2017 59 mins
    Jon Oltsik, Senior Principal Analyst at ESG Jeff Costlow, Director of Security at ExtraHop Networks
    Over the next several years, ESG sees organizations adopting a security operations and analytics platform architecture (SOAPA) that ties together best-of-breed cybersecurity tools. Wire data—full L2-L7 analytics—from network security analytics platforms will play a key role in these SOAPA portfolios because of its real-time nature and because every threat must necessarily traverse the network. This webinar will explain the SOAPA approach and how wire data fits, and will include use cases for integration and orchestration of wire data with other security tools such as SIEM platforms.
  • Panel: Real-Time Cyber Threat Remediation Using Network Analysis Recorded: Jun 14 2017 59 mins
    Josh Downs, BrightTALK [moderator]; John Smith, ExtraHop Networks & Tim Sadler, CheckRecipient
    According to the latest Verizon Data Breach Investigations Report, 93% of compromises occur within minutes. Traditional security tools do not have the "shutter speed" to detect and remediate these threats fast enough. By analyzing network behavior on the wire as it happens, correlating it with threat intelligence, and then orchestrating remediation actions, organisations gain the capabilities needed to conduct "hand-to-hand" combat against cyber adversaries.
  • Cut the Work From Your Workflow: An Analytics-First Approach Recorded: May 25 2017 57 mins
    ExtraHop Team
    The digital business is growing at a rate IT can’t match without over-worked staff and costly data storage. Over the next few years, more reliance on cloud hosting and SDN will send your stress levels up and your IT visibility down… unless you take advantage of a smarter workflow designed to scale IT with real-time insight on-prem and in the cloud. Backed by machine learning for “always-on” anomaly detection, the ExtraHop platform redefines analytics for a more productive—and proactive—you.
  • How to avoid the Citrix blame game Recorded: Apr 6 2017 32 mins
    Phil Swainson, Head of Technical Services, KedronUK and Peter Connolly, Systems Engineer, ExtraHop
    When applications and desktops are delivered over Citrix, the Citrix administration team becomes the front-line for responding to complaints about slow performance. But more than 60% of the time, the root cause of the problem lies outside of the Citrix environment.

    In this webinar, you’ll learn how wire data analytics can enable Citrix administrators to not only see end-user experience for ICA sessions, but also dig into application and infrastructure performance to uncover the real reason for slowdowns.

    Hope to see you there!

    Key words: Virtualization, Citrix, Application, AppDev, Infrastructure, Cloud Computing
  • ExtraHop + ServiceNow = Seamless IT Service Management Recorded: Mar 23 2017 3 mins
    ExtraHop Networks
    See how ExtraHop and ServiceNow combine for deeper insight, greater security, and automated remediation!
  • Panel Discussion: Cyber Security Strategies and Trends in 2017 Recorded: Feb 21 2017 48 mins
    Jeff Costlow, ExtraHop Networks; Francois Raynaud, DevSecCon; Rami Mizrahi, TopSpin Security & Josh Downs, BrightTALK
    These days it's not a matter of if you'll be breached, but when. Security teams in the modern enterprise must accept that as well as efforts to protect their perimeter, they must also focus on understanding their east-west traffic.

    This panel discussion will look at the trends and technologies influencing cyber security strategy in 2017, in particular those that deal with effectively monitoring your network to ensure your organisation handles vulnerabilities and stays breach free.


    - Josh Downs, Community Manager - Information Security, BrightTALK (moderator)

    - Jeff Costlow, Director of Security, ExtraHop Networks

    - Rami Mizrahi, VP of R&D, TopSpin Security

    - Francois Raynaud, Founder, DevSecCon

    Tune into this panel conversation if you're a network or security professional looking to hear the latest trends and security best-practices to defend against a constantly evolving opponent.
  • Stop Malicious Activity by Analyzing Network Behavior Recorded: Jan 10 2017 33 mins
    Chris Matthieu, Director of IoT Engineering, Citrix, John Smith, Principal Solutions Architect, ExtraHop Networks
    In the ever-evolving world of persistent threats to your environment the only way to keep up with malicious actors is by utilizing behavior based profiling. In this webinar, we will show how you can rethink the network to detect and remediate threats in real time. When wire data visibility from ExtraHop meets automated response from Citrix Octoblu you're able to protect your environment without having to spend all your time wading through alerts.

    This webinar is perfect for any network or security professionals who are keen to maintain optimum visibility accross their entire network, allowing them to neutralise threats and reduce vulnerabilities.

    About the presenters:

    John Smith is Solutions Architect at ExtraHop and author of the wiredata.net blog. He is a Citrix Technology Professional and 16-year IT veteran specializing in application delivery, event correlation, security, web applications, and application virtualization. John’s background gives him an invaluable perspective on the challenges facing IT, and creating new approaches to deal with them. Follow him on Twitter: @jmsazboy

    Chris was the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flows, processes and sensor data, and analyze/react to real-time events and messages as well as big data trends and anomalies.
    Follow him on Twitter: @ChrisMatthieu
  • How to Cut Your Network Troubleshooting Time in Half Recorded: Dec 14 2016 36 mins
    Nick Brackney & Jim Sullivan
    Are you stuck sifting through large volumes of data on your network to find answers? There's a better way.

    See how ExtraHop can help you solve problems faster by making sense of the data in motion through your network and delivering visibility across the application delivery chain.

    This webinar is perfect for any network or security professionals who are keen to maintain optimum visibility across their entire network, allowing them to get a full view of the traffic on their network, neutralise threats, reduce vulnerabilities and improve their network infrastructure.
  • Data Center Migration: The Difference Between Anxiety and Success Recorded: Dec 9 2016 22 mins
    Nick Brackney - Product Marketing Manager
    It is critical for organizations to onboard new technologies and improve processes to remain competitive. Yet, safely navigating a migration or consolidation project can be challenging.
    The ExtraHop platform takes the guesswork out of application and data center migration by providing complete visibility and performance metrics that make clear the risks, but also support the success, of projects at any scale. By knowing before going, you can avoid unnecessary downtime and be sure that your user experiences remain consistent.
    In this webinar, ExtraHop' Nick Brackney explains how the ExtraHop platform helps to ensure successful migrations and consolidations.
  • IoT Challenges: How to Find the Answers on Your Network Recorded: Nov 23 2016 20 mins
    Shaun Henderson & Peter Connolly, ExtraHop Networks
    Whether they are ready for it or not, IT Operations teams have the Internet of Things (IoT), including BYOD devices such as smart watches, added to their growing list of responsibilities.

    With employees bringing in potentially compromised devices holding malicious malware, it's time for enterprise IT to understand the environment and not just tick the security compliance box.

    On the other hand, IoT poses an opportunity for IT organizations to add significant value to the business by providing real-time operational intelligence and enterprise architecture. A new network monitoring approach called wire data analytics analyzes communications on the network to extract valuable IoT security, performance, and even operations data—and requires no agents!

    This webinar is ideal for any networking, architecture or security professional looking to improve visibility across their network, to reduce threats and vulnerabilities and especially those with a focus on the Internet of Things (IoT).
  • The Why and How of Monitoring DICOM Performance Recorded: Oct 25 2016 19 mins
    ExtraHop Networks
    Radiology departments and medical imaging units are among the fastest-growing, most profitable services provided by healthcare organizations. DICOM (Digital Imaging and Communications in Medicine), is a binary, upper-level protocol used to store and transmit medical images. When DICOM deployments malfunction, or work slowly, patient experience suffers, and cashflow drops.

    Monitoring DICOM with an eye for performance optimization is increasingly critical for successful healthcare providers. This webinar discusses how ExtraHop can provide the visibility needed to maintain peak DICOM performance in deployments of any size.
  • ESG's 7 Core Criteria for Comparing and Evaluating ITOA Platforms Recorded: Oct 21 2016 25 mins
    Shaun Henderson & Owen Cole, ExtraHop Networks
    As IT environments grow more sophisticated by the day, complexity rises and many CIOs and IT directors lose visibility of their assets and clarity into each asset's performance. The unfortunate result creates IT 'black boxes,' which bring detrimental hazards to enterprise customers when changes are required or things go wrong within interdependent environments. This problem extends beyond the walls of the data center and spans all offices and mobile workers.

    According to ESG analysts' Dan Conde and Nik Rouda - "Modern monitoring must be real-time, at scale, and capable of providing visibility wherever IT assets reside. IT Operations Analytics is at the forefront of this monitoring evolution, but understanding how these often diverse technologies fit together and what benefits they deliver to IT can be complex."

    Join us for a discussion on Conde & Rouda's seven core criteria for enterprise buyers currently evaluating ITOA and monitoring platforms.
Helping IT teams gain real-time insights that solve IT issues
ExtraHop makes real-time data-driven IT operations possible. By harnessing the power of wire data in real time, network, application, security, and business teams make faster, more accurate decisions that optimize performance and minimize risk. Hundreds of organizations, including Fortune 500 companies such as Sony, Lockheed Martin, Microsoft, Adobe, and Google, start with ExtraHop to discover, observe, analyze, and intelligently act on all data in flight on-premises and in the cloud. To experience the power of ExtraHop, explore our interactive online demo: www.extrahop.com/demo

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Infosecurity 2016: Which are the Critical Vulnerabilities in the IoT?
  • Live at: Jun 14 2016 1:10 pm
  • Presented by: Raja Mukerji, President & Co-Founder, Extrahop Networks & Josh Downs, Community Manager, BrightTALK
  • From:
Your email has been sent.
or close