InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Detecting Tor in Your Network

Presented by

Ollie Sheridan, Gigamon Principal Engineer; Brandon Dunlap, Moderator

About this talk

Tor, "The Onion Router", is a protocol for anonymously browsing the Internet as well as ".onion" sites that are only accessible via the Tor Network (and is largely seen as bad news for a network). While the origins of Tor were noble, bad actors and criminals have used and abused the Tor network as a means to undertake illegal activities, safe in the knowledge that catching them in the act is, at very best, extremely difficult. Join Gigamon and (ISC)2 as we explore: • The history and origins of Tor • How the Tor network is constructed • How Tor can be detected on your network • Ideas and strategies to capturing the network traffic required to know of Tor's presence • Securing your network against Tor usage
Gigamon EMEA

Gigamon EMEA

7055 subscribers154 talks
Realize the full transformational promise of the cloud.
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.
Related topics