The Advantages of Filtering Applications

Logo
Presented by

Ollie Sheridan, Principal Engineer Security, Gigamon, Brandon Dunlap, Moderator, (ISC)²

About this talk

Traditional methods of filtering traffic have relied upon a knowledge of the network and transport behaviours of the applications running across the network. Whilst most applications being run across the network use standard ports, many threat actors will use methods to obfuscate their communications by abusing these standards, with port spoofing being one such example. This represents a challenge when gathering traffic to ensure that this simple evasion method does not create a blind spot to your security countermeasures. Join us for this webinar to learn more about how you can: •Ensure that the Application traffic regardless of port spoofing gets to the right tool •Improve tool efficiency by discarding irrelevant Application traffic •Filter the traffic based on the application rather than the IP & Port
Related topics:

More from this channel

Upcoming talks (8)
On-demand talks (158)
Subscribers (5093)
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.