Hi [[ session.user.profile.firstName ]]

Eliminating instrumentation complexity in the high-density data center

Enterprise, including particular Financial Services networks, poses unique challenges to monitor and manage. While performance remains a top priority to maintain competitiveness, regulatory compliance, security assurance and risk mitigation must also be addressed. Market data messages (such as FIX protocol) and, in some cases, proprietary protocols, can add to the complexity, as these may require intelligent traffic capture that performs filtering beyond Layer 4.

At the same time, many organizations are consolidating, co-locating and homogenizing facilities, while upgrading to support increasing usage, energy regulations, and speeds of 100Gbps and 40Gbps. The result is higher density in the data center. Maintaining high performance and security on a large scale requires that the monitoring tools have comprehensive visibility across the data center and are able to keep pace with network changes.

Join VSS Monitoring to discover how high-density visibility solutions paired with specialized traffic capture capabilities—including packet optimization and DPI—can reduce per-port costs, scale performance and security monitoring tools, and eliminate deployment complexity.

Topics covered will include:
•Large data center monitoring challenges for enterprises
•Addressing tool port contention and specialized applications
•Increasing tool coverage without increasing rack footprint
•Leveraging 10G and 1G tools across 100G and 40G networks
Recorded Oct 8 2014 53 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Gordon Beith – Director, Product Management, VSS Monitoring
Presentation preview: Eliminating instrumentation complexity in the high-density data center

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [Video Interview] Andrew Gould on Early Cyber Prevention Techniques May 3 2017 1:00 pm UTC 30 mins
    Josh Downs, BrightTALK & Andrew Gould, Head of the MET's Falcon Cybercrime Unit
    - BrightTALK at CRESTCON & IISP Congress -

    BrightTALK caught up with The MET's Andrew Gould for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The rise of Ransomware and what we can be doing to protect ourselves

    - The steps that businesses should be taking to prepare for GDPR

    - Financial cyber security and what the banks can be doing better to defend against malicious hackers

    - Cyber security relations and the future of law enforcement post-Brexit
  • Is Your Security Keeping Pace with Your Cloud Initiatives? May 2 2017 3:00 pm UTC 60 mins
    Jonathan Glass, Turner Broadcasting System, Chris Geiser, Garrigan Lyman Group, and Allison Armstrong, Alert Logic
    You’ve decided to move to the cloud. It’s faster, more scalable, and more agile. Security is a priority, but you don’t want it to slow you down. The foundational infrastructure delivered by cloud providers is secure, but protecting the applications, workloads, and data you run on top of it is your responsibility—and it’s a big one.

    Watch ‘Is Your Security Keeping Pace with Your Cloud Initiatives?’, for a lively discussion on how to evolve your security strategy to account for innovation at cloud speeds. Our panel of experts will discuss:

    - Why conventional security approaches falter in highly dynamic and elastic environments
    - Key steps to eliminate choke points, keep pace with elastic workloads, and how to deploy security controls in minutes
    - How to keep your internal and external customer’s applications and workloads secure while meeting compliance requirements
    - Why a Security-as-a-Service can help you strike the optimum balance between risk, cost and cloud speed.

    Join Jonathan Glass, Cloud Security Architect, Turner Broadcasting System, Chris Geiser, CTO of the Garrigan Lyman Group, and Allison Armstrong, VP of Technology and Product Marketing at Alert Logic, for a discussion on ‘Is Your Security Keeping Pace with Your Cloud Initiatives?’, and learn how it can. Register now!
  • [Video Interview] Tarah Wheeler on the Ethics of Hacking Back and AI in Security May 2 2017 1:00 pm UTC 30 mins
    Josh Downs, BrightTALK & Tarah Wheeler, Principal Security Advocate, Symantec
    - BrightTALK at CRESTCON & IISP Congress -

    BrightTALK caught up with Symantec's Tarah Wheeler for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The ethics of 'hacking back'

    - AI & Machine learning and the influence it'll have on security

    - Cyber security in the financial sector

    - Cyber warfare and the new tactics coming through

    - Vulnerabilities in the IoT and what we can do about them

    Enjoy!
  • Privileged accounts: the most powerful backdoor used by hackers Recorded: Apr 27 2017 47 mins
    Grant Burst and Chad Carter
    Privileged accounts can be some of the most serious threats your company can face. As more and more processes are digitalized and activities externalized, the number of accounts accessing critical and strategic information escalates, extending the cyber threat across continents. Meanwhile, companies and individuals are becoming increasingly aware that any data or server can be accessed with the right privileges; it is therefore imperative to know who accesses critical resources, as well as when and why they do so to avoid any leak. By monitoring the users holding the keys to the kingdom - the privileged users, we are able to know what exactly happened on a system at any given time and how. Whether malicious or negligent, incidents caused by internal or external threats can be avoided quickly if visibility over the IS is restored. Session monitoring and recording dissuades malicious or negligent users while offering real-time alerts, traceability, and post-mortem analysis. Discover how some of the most dramatic cyberattacks to date could have been prevented had there been a Privileged Access Management solution in place to protect and secure target systems.
  • How to Build An Advanced Email Security Strategy Recorded: Apr 27 2017 46 mins
    Richard Davis, Dir, Cyber Security Strategy and Adenike Cosgrove, Cyber Security Strategy - EMEA, Proofpoint
    You may know that email is a top vector for advanced threats targeting your organisation. But did you know that attackers have evolved their techniques to bypass even your most sophisticated email security tools? Your people, data, and brand reputation are at serious risk.

    Join the Proofpoint for "How to Build an Advanced Email Security Strategy." to learn about:

    • The latest email fraud techniques, including business email compromise (BEC), ransomware, and sandbox-evasion threats.

    •Key steps to building an email security strategy that can adapt to and stop attacks before they reach the inbox.

    • How to respond to and mitigate security risks faster and more reliably at a reduced cost.
  • Reduce time to detect and respond to cyber threats - without adding resources Recorded: Apr 26 2017 48 mins
    Chris Martin, LogRhythm Security Expert
    Today’s reality is that organisations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organisation will be compromised, but when.

    The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? A reduction in your mean time to detect and mean time to respond without adding staff to accomplish the job.

    In this webcast, Chris Martin, LogRhythm security expert, will explain what TLM is and demonstrate how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.

    You’ll learn:

    • The definition and details of the TLM framework
    • How TLM enables you to sort through the noise to highlight and investigate concerning incidents
    • How TLM works to streamline processes through automated workflow
    • Specific use cases TLM can address to prevent major data breaches

    Register now to learn how to enhance your threat detection and response capabilities with LogRhythm and Threat Lifecycle Management (TLM).
  • Next Generation Defense in Depth Model Recorded: Apr 25 2017 64 mins
    Tari Schreider, CCISO, Chief Cybersecurity Strategist & Author, Prescriptive Risk
    This session will focus on presenting a next generation defense in depth model and answer the question on many CISO’s minds - is it still relevant? A model of defense in depth will serve as a backdrop to introduce you to a wide range of solutions from across the cybersecurity industrial complex that just may change how you view your defense in depth approach.
  • Is Your Organisation GDPR Ready? Recorded: Apr 25 2017 49 mins
    Steve Durbin, Managing Director, ISF LTD
    Many organisations are still unclear as to how they will meet the requirements of the EU GDPR legislation which will come into effect in May 2018. Fundamentally organisations need to start preparing for this now.

    In this webinar Steve addresses some of the key questions organisations are asking such as: does the EU GDPR regulation apply to me? how should I prepare for this legislation? and what additional resources do I need?
  • Interview: CTO of Symantec on advanced cybersecurity Recorded: Apr 24 2017 22 mins
    Darren Thomson, CTO & VP of Technology, Symantec, EMEA & Andrew Bird, EA Visionary, Interview Moderator
    Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
    ----------
    BrightTALK caught up with Darren Thomson, CTO & VP of Technology, Symantec, for an in-depth conversation on the future of cybersecurity in the context of IoT, AI and Machine Learning.

    Among topics discussed:

    - Trending business vulnerabilities in 2017
    - Particularities of pentesting
    - How to prepare for GDPR in 2018
    - Implications of IoT, AI & machine learning on cyber security
    - Yahoo breach
    - Brexit and cybersecurity
    - Recommendations to CISO's developing security strategies

    About the speaker:
    Darren is an industry recognised IT innovator and strategist, with +20 years of industry experience. He is a published author. His latest work has recently been published by Wiley Co. and is entitled, “Delivering Utility Computing: Business Driven IT Optimisation”. Details can be found at www.amazon.com.
  • Human Factor Podcast : Stuart Coulson Recorded: Apr 21 2017 54 mins
    Jenny Radcliffe
    In this episode, I am delighted to talk to Stuart Coulson.

    Stuart has been involved in the information security industry for many years and has extensive experience and expertise of working with major corporations and assisting them with relevant online protection plans and security solutions.

    His current role at the Challenge sees him working with organisations to complement their existing strategies to fill the cyber skills gap.
  • Human Factor Podcast : Dr Daniel Dresner Recorded: Apr 21 2017 44 mins
    Jenny Radcliffe
    In this episode, I am delighted to chat to Dr. Daniel Dresner. Daniel’s LinkedIn profile tells us he is a consulting research analyst and lecturer. His mission is to find the threads that bind information together and mend them when they break. He contributed material to the Cyber Essentials and worked with a colleague to define the only real benchmark of cyber security. Being a proud father and grandfather motivated him to define ‘The Green Surf Code’.
  • Human Factor Podcast : Graham Cluley Recorded: Apr 21 2017 35 mins
    Jenny Radcliffe
    In this episode, I was delighted to be joined by Graham Cluley. Graham Cluley is a security blogger, researcher and public speaker. He has been a well-known figure in the computer security industry since the early 1990s when he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows.
  • Zero-Day Attacks and What To Do About It Recorded: Apr 20 2017 35 mins
    Chris Candaffio System Engineer, Symantec and Q&A with Robert Arandjelovic & Gavin Fulton
    Vulnerabilities exist in all applications—and today’s sophisticated attackers will find them. Every day an exploit remains unpatched, your risk of a data breach increases dramatically. Only a multi-layered approach that fully integrates with your IT defense stands a chance of stopping them, but where to begin?

    By registering, you’ll gain valuable insights into:

    Which techniques effectively block zero-day attacks.
    Why robust endpoint protection plays such a critical component.
    How Symantec Endpoint Protection 14’s Memory Exploit Mitigation shuts down vulnerability attacks, even against unknown threats.
  • BrightTALK at RSA 2017: Ben Bernstein on Cyber Attack Trends for 2017 Recorded: Apr 20 2017 10 mins
    Josh Downs, BrightTALK & Ben Bernstein, CEO, Twistlock
    BrightTALK caught up with Twistlock's CEO Ben Bernstein for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:
    - Trends in the cyber threat landscape
    - What companies can be doing to better improve their security posture
    - 2016's biggest breaches (including Yahoo) and why they happened
    - Preparations to take in advance of GDPR in May 2018
    - Cyber security in the financial sector
    - AI & Machine learning and the influence it'll have on the security industry

    About the Speaker:
    Ben Bernstein co-founded Twistlock, Inc. in 2015, and serves as its Chief Executive Officer. Ben has 14+ years of experience in enterprise security and operating systems. He is a Microsoft veteran with extensive experiences in both software development and product management. Ben is a veteran of the Israeli Intelligence Corps. He has a B.A cum laude in Computer Science from the Technion in Israel and an MBA with a scholarship of excellence from the Interdisciplinary Center in Israel. Ben hates writing about himself in third body.
  • How to respond to cyber security incidents faster, smarter, better Recorded: Apr 18 2017 57 mins
    Chris Neely, Director of Technical Sales, EMEA, IBM Resilient
    How to respond to cyber security incidents faster, smarter, better: an introduction to the Resilient Incident Response Platform

    The Resilient incident response platform (IRP) empowers cyber security teams to orchestrate their incident response processes, and respond to and resolve incidents faster, more effectively, and more intelligently. The Resilient IRP is the leading platform for orchestrating and automating incident response processes.

    This demonstration will showcase the Resilient IRP’s ability to enable complete IR orchestration and automation - aligning security teams' people, process, and technologies into a single hub for incident response.By understanding the capabilities of the solution, attendees can learn how to:

    • Achieve greater intelligence and efficiency by integrating your existing security technologies, including SIEMs, EDR, threat intelligence, and more.

    • Adapt to real-time incident conditions with Resilient Dynamic Playbooks –ensuring a fast and complete response to all incident types.

    • Build, configure, and maintain your own IR action plans within hours or days
  • DIY PKI Recorded: Apr 17 2017 56 mins
    Rae Barton, PKI expert at Gemalto
    Public Key Infrastructure (PKI) is a well-known security protocol used by some of the world’s largest governments and top enterprises, but it’s a technology that also affords many possibilities in new and growing industries. Even small to medium sized businesses can greatly benefit from PKI. However, PKI is also often mistakenly perceived as being difficult to deploy. Gemalto is addressing this common misconception. The next webinar in our PKI series, DIY PKI, will walk attendees through the entire process of setting up a PKI environment and how to manage it. We have developed a five step process to make it easy for security professionals to get their PKI system up and running with minimal time spent. The five step implementation method will give you an idea of how to set up a two tier Microsoft PKI infrastructure with Gemalto SafeNet Authentication Manager and SafeNet Luna HSM to perform smart card log on for small to medium sized enterprises.

    Attendees of the DIY PKI webinar will learn:

    -Challenges of PKI deployment
    -Overall PKI integration ecosystem
    -Common use cases deployed in enterprises: Smart card logon – What happens in the backgrounnd, email encryption/signing

    Step by step implementation steps
    oInstall and configure a Hardware Security Module (HSM)
    oInstall the root CA and configure it with the HSM
    oInstall and configure the issuing CA
    oConfigure the permissions of users and create certificate templates
    oInstall and configure an authentication manager



    For the purpose of this webinar and using Gemalto’s five step propriety approach, we will use our SafeNet line of technologies to demonstrate the implementation of the PKI solution.
  • BrightTALK at RSA 2017: Bill Diotte on Securing IoT Networks Recorded: Apr 13 2017 8 mins
    Josh Downs, Community Manager, BrightTALK & Bill Diotte, CEO, Morcana
    BrightTALK caught up with Mocana's Bill Diotte for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:
    - The difference between securing IoT networks than tradition enterprise IT networks
    - The role of government regulation in IoT security
    - The 'mission critical' elements that need protecting in IoT networks
    - The threat actors and motives targeting IoT networks
    - The role of cyber warfare in global geo-politics

    About the Speaker:
    William (Bill) Diotte is a technology entrepreneur, CEO and Board Member with over 20 years of experience in working with tech-driven companies from startup stage to Fortune 500. Prior to joining Mocana as Chief Executive, he was the co-founder and CEO of software defined networking pioneer BroadHop Inc., acquired by Cisco. Starting off his career as a manufacturing engineer, he became an executive and managing director with both Gemini and SRI Consulting serving high tech companies in the software and telecom markets. Bill has also served as a Board Member to LiveAction, Inc., and is an investor and advisor to several companies in the software infrastructure and security space.
  • Prevent Major Data Breaches with Threat Lifecycle Management Recorded: Apr 12 2017 61 mins
    Seth Goldhammer, Senior Director of Product Management
    Throughout 2017 organisations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organisation will be compromised, but when.

    A traditional prevention-centric strategy naively assumes all threats can be blocked at the perimeter, which leaves you blind to the threats that do get in. Many organisations are shifting to a more balanced strategy including detection and response. Enter Threat Lifecycle Management (TLM) - your playbook for rapidly detecting and responding to cyber-attacks.

    In this webcast, Seth Goldhammer, senior director of product management at LogRhythm, explains what TLM is, and demonstrates how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.
  • IoT Security Over Tea: Steeping Out the Hype Recorded: Apr 11 2017 63 mins
    Gorav Arora, CTO Office Director of Technology at Gemalto
    A familiar buzz word over the past few years has been the Internet of Things (IoT). We have all heard the talk about it being the next big thing, its massive growth potential and the benefits to everyone. The IoT will generate more data, connect more devices and enable more users, and somehow these interactions will be safe and secure.

    We take a pragmatic view of IoT, cutting through the hype to uncover the core objective. Furthermore, we take a persona based approach to IoT security, and have identified four main ones: cloud service providers, consumers, device makers and third-party service providers. Each persona faces the obstacle of securing different parts of the ecosystem whether its access, the device, data and/or the user. However, it is necessary that security is provided holistically, as the weakest security link in the chain could compromise it all. In addition to security, the personas are used to demonstrate the ‘Stages of IoT’ from the digital identity of physical products to actualization of new business opportunities. No matter what persona in the IoT ecosystem you are (or are not), the webinar cuts through the hype to understand the real business opportunities and share with attendees the technology tool box (predictive analytics, security, connectivity, data collection and business intelligence) to create and improve services and leverage the generated data internally and externally.

    Join us for the webinar, “IoT Security Over Tea: Steeping out the Hype”, to learn more about:
    •A grounded perspective on IoT
    •Why IoT security matters for everyone
    •The persona analysis of IoT security
    •Key considerations as it begins to take off
    •How to protect what matters most to you
  • Human Factor Podcast : Sarah Clarke Recorded: Apr 11 2017 52 mins
    Jenny Radcliffe
    In this episode, I am delighted to be chatting to Sarah Clarke. Sarah is a well known privacy and security blogger (www.infospectives.co.uk) armed with over 15 years practical experience. After a business degree she tried out a few roles before finding IT. Since then she has worked across many sectors in IT Security, Information Security, Cybersecurity Governance, Risk, & Compliance and more recently Data Protection and Privacy.

    To see more information, click here - http://jennyradcliffe.com/episode-03-sarah-clarke/
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Eliminating instrumentation complexity in the high-density data center
  • Live at: Oct 8 2014 3:00 pm
  • Presented by: Gordon Beith – Director, Product Management, VSS Monitoring
  • From:
Your email has been sent.
or close