Hi [[ session.user.profile.firstName ]]

Are You Sure Your DDoS Attack Protection Will Work?

So, you’ve justified, purchased and deployed your new DDoS attack protection solution. But can you assure executive management / the board that your organization is protected from the modern-day DDoS attack? Waiting to see if your protection works while under attack is not the right approach. Testing the products, people and process before an attack occurs is the industry best practice. Join Arbor Networks, the industry leader in DDoS attack protection solutions and LIFARS, an elite cybersecurity, digital forensics, and incident response firm to learn:

- The latest trends in DDoS attacks.
- Best practices in DDoS attack defense.
- How to properly test your DDoS attack protection products, people and process using LIFARS’ DDoS Attack Assessment Service.
Recorded Oct 5 2017 27 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tom Bienkowski, Director DDoS Product Marketing, Arbor Networks + Ondrej Krehel, CEO and Founder, LIFARS, LLC
Presentation preview: Are You Sure Your DDoS Attack Protection Will Work?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Ensure Successful Application Migrations to AWS Jan 14 2020 6:00 pm UTC 60 mins
    Ray Krug, Solutions Architect, NETSCOUT and Michael Segal, AVP Strategic Marketing, NETSCOUT
    The combination of cloud, colo and virtualization is changing the data center in ways we never expected in the past. As enterprises implement new technology and look to improve connectivity, the complexity of this hybrid cloud environment adds both security and performance challenges to mission critical applications. It’s not enough to isolate a problem to a specific domain, you need to have visibility across the entire hybrid cloud infrastructure.

    In this webinar you will learn:

    •What is smart data and how to use it to intelligently and efficiently analyze traffic flows for a contextual view of service, and its' interdependencies end-to-end across the service delivery infrastructure.

    •How to accelerate deployments of services into AWS, while assuring application reliability, availability, responsiveness, and business continuity.

    •Real-world examples of how NETSCOUT’s customers have gained visibility across the environment as they build and migrate applications to AWS.
  • Ensure risk-free UC&C and contact center deployments through NETSCOUT visibility Dec 17 2019 10:00 am UTC 60 mins
    Ray Krug, Solutions Architect, NETSCOUT
    Delivering high quality UC services for your Enterprise or your Contact Centre is critical to your long-term success. Possibly the first touch your customers have with your organization, or an enabler for efficient collaboration in your organization, you need positive interactions for your business to thrive.

    Attend the webinar: Ensuring risk-free UC&C and contact centre deployments through NETSCOUT visibility solutions and learn about: 

    - Pinpointing the source of failure or quality issues for inbound and outbound calls 

    - Best practices for ongoing performance monitoring Enterprise UC and your Contact centres

    - Leveraging active and synthetic testing for UC availability

    - Ensuring successful UC deployments on premise, in the Cloud or with SaaS providers

    - Customer Success stories for improving your UC performance
  • Packet Brokers for Cost-effective Unified Visibility Across NetOps and SecOps Recorded: Dec 11 2019 51 mins
    Ray Jones, Senior Director, NETSCOUT
    In today’s threat landscape, more tools means more security, right? Not necessarily. The resulting tool sprawl places new and stressful demands on security and network operations. The challenges are especially acute when it comes to active (inline) security systems that are designed to act on live network traffic. Every change or upgrade means a potential network disruption. Trying to deal with this sprawl can be a true IT nightmare.

    Please join Ray Jones, Senior Director at NETSCOUT as we discuss how full packet visibility empowers your security systems to perform at their utmost efficiency – by processing the traffic they are designed to see. In the webinar you will learn:

    How to get unified visibility that allows multiple IT groups to access packet flows without creating disruptions

    Real world examples of how to optimize the flow of traffic from the network to your security systems and monitoring tools

    Ways you can leverage NETSCOUT’s cost-effective and flexible software-driven network packet brokers- at scale
  • Monitoring Encrypted Traffic to Ensure Efficiency and Availability Recorded: Nov 13 2019 46 mins
    Erik Hjelmstad, Senior Technical Marketing Engineer
    In order to ensure networks are efficient, we need to monitor all traffic flowing through the wire. There are many tools to help, but they all rely on being able to read and decode network traffic. When the network traffic is encrypted, these tools provide limited value.

    With the nGenius Decryption Appliance (nDA), you get full visibility into all of the traffic across your network, and the ability to send that traffic to just the tools that need to see it.

    In the Webcast, you will learn about:

    • Expanding visibility by utilizing PFS in front of nDA.
    • Limiting types of decrypted traffic to ensure known good traffic stays encrypted
    • Finding malicious attacks that would otherwise be hidden by encryption
  • Solving UC&C Performance Issues in Contact Centers Recorded: Nov 12 2019 51 mins
    Ray Krug, Solutions Architect, NETSCOUT
    Delivering high quality services in your Contact Center is critical to your long-term success. Your contact center is often the first touch your customers have with your organization, and enables positive and lucrative interactions with your business.

    Join this webinar and learn about:

    •Pinpointing the source of failure or quality issues for in-bound and outbound calls
    •Best practices for ongoing performance monitoring of Contact Centers
    •Leveraging active and synthetic testing for Contact Center availability
    •Ensuring successful Contact Center deployments on premise, in the Cloud or with SaaS providers
    •Customer Success stories for improving Contact Center performance
  • Empowering Your Network to Stop DDoS Attacks Recorded: Sep 19 2019 37 mins
    Scott Iekel-Johnson, Director of Product Management, DDoS Protection at NETSCOUT
    The goal to network protection is pretty simple. We must get ahead of the threats and protect our investments. Instead we continue to play catchup to attackers. While this goal is far from being achieved, we must abandon the idea that discreet solutions can solve multi-vectored threats. No single technology can solve this type of problem by itself. This goes for DDoS attacks like any other sophisticated threat.


    Join NETSCOUT as we discuss how smarter visibility can drives a smarter DDoS protection strategy. As we evolve our Arbor platforms for next generation of DDoS attacks, we are helping Service Providers and Enterprises change their approach to DDoS mitigation.


    In this webinar you will learn how to:

    • Detect attacks by combining smart analytics with best-in-class data

    • Defend from attacks by orchestrating multiple network protections simultaneously

    • Monitor comprehensive protection through a single interface


    With almost 20 years of expertise, the Arbor platforms have unparalleled visibility and knowledge on network-based attacks. Register for this webcast to listen how The Arbor platforms once again raise the bar on network visibility and DDoS protection.
  • Visibility into Applications Anywhere with NETSCOUT Solutions for VMware NSX-T Recorded: Sep 17 2019 40 mins
    Ray Krug, Solutions Architect, NETSCOUT
    With NSX-T, VMware is providing the ability to deliver applications and networks anywhere. NETSCOUT certified solutions for VMware NSX bridges the collaboration and knowledge gap between application, server and network operations teams as they operate in VMware NSX, cloud and legacy environments. Join this webinar to learn about:
    •The challenges and impacts facing IT as applications are hosted between private, public and multi-cloud environments.
    •How NETSCOUT automates the transformation of wire data into Smart Data to provide an early warning system into the issues and fastest path to resolution into the applications and services that you deliver to you customers and users.
    •Examples of how to reduce MTTR with true visibility into the health of application components, their inter-dependencies and interactions with the broader IT infrastructure.
  • Visibility into Applications Anywhere with NETSCOUT Solutions for VMware NSX-T Recorded: Sep 17 2019 41 mins
    Ray Krug, Solutions Architect, NETSCOUT
    With NSX-T, VMware is providing the ability to deliver applications and networks anywhere. NETSCOUT certified solutions for VMware NSX bridges the collaboration and knowledge gap between application, server and network operations teams as they operate in VMware NSX, cloud and legacy environments. Join this webinar to learn about:
    •The challenges and impacts facing IT as applications are hosted between private, public and multi-cloud environments.
    •How NETSCOUT automates the transformation of wire data into Smart Data to provide an early warning system into the issues and fastest path to resolution into the applications and services that you deliver to you customers and users.
    •Examples of how to reduce MTTR with true visibility into the health of application components, their inter-dependencies and interactions with the broader IT infrastructure.
  • NETSCOUT Threat Intelligence Report 1H 2019: Cybercrime’s Innovation Machine Recorded: Sep 5 2019 31 mins
    Hardik Modi, Senior Director, Threat Intelligence and Richard Hummel, Manager, Intelligence
    Cybercrime has entered the mainstream, and the operational model being used has become efficient and effective at invading corporate networks, accessing government agencies and spreading misinformation to the public. While sophisticated malware continues to advance, deceptive practices and social engineering continue to lead the intrusion race.

    NETSCOUT has released the latest Threat Intelligence Report which provides insight into orchestrated attacks and activities analyzed through the first half of the 2019 calendar year. Register to listen to our experts highlight the findings in the latest report. During this webcast, you will learn about: 

    Attackers increasingly taking advantage of everything to discover and weaponize new attack vectors

    DDoS attack frequency growth, especially in the 100 to 400 Gbps capacities

    Malware targeting IoT devices behind firewalls

    Geopolitical adversaries targeting one another to social engineer and misinform the masses

    Register today, space is limited.
  • The Age of Smarter Network Visibility & DDoS Protection is Now Recorded: Jul 30 2019 49 mins
    Zach Wilkinson - Product Manager, Jamal Bethea - Product Marketing Manager, Traffic Visibility Solutions at NETSCOUT
    Your network traffic deserves a purpose-built network Visibility and DDoS protection solution to address your business requirements, but it should be able to provide more. Service Provider and Enterprise businesses share similar struggles when it comes to traffic troubleshooting to maintaining your network uptime. The network is a business and left unprotected, could cause more significant harm for your employees, or even worse, your customers.

    While NETSCOUT continues to enhance our customers' ability to view, analyze, and mitigate their network traffic patterns, other security vendors continue to find the standard challenging to maintain. With enhancements to our Network Visibility and DDoS Protection solution, not only do we continue to address your Visibility and DDoS requirements; we are solving your ability to work smarter and not harder.

    In this webinar, you will learn about improving:

    •Content and subscriber analysis patterns make it easier to see how users value network connectivity so you can forecast future traffic patterns;
    •Operation support requirements such as AWS compatibility, OTT Managed Objects definitions and Webhook notifications; and
    •DDoS attack mitigation capabilities with improved speed to detection and protection with enhanced packet inspection and smarter traffic mitigation design.
  • Enforcing Threat Intelligence at The Network Perimeter Recorded: Jul 16 2019 41 mins
    Tom Bienkowski, Director, Product Marketing, NETSCOUT Chris Rodriguez, Research Manager, Cybersecurity Products, IDC
    Digital transformation (DX) brings both new opportunities and differentiation; along with increases in the cybersecurity attack surface and risk to organizations.

    As bad actors continue to change their techniques, tactics and procedures (TTPs), continuous cyber threat intelligence plays a vital role in protection. But cyber threat intelligence by itself is useless unless it can be made actionable.

    Join NETSCOUT and IDC analyst Chris Rodriguez in this webinar to learn how organizations can enforce continuous threat intelligence at the network perimeter using stateless technology to not only complement stateful components of the cyber security stack (e.g. NGFWs), but also provide the benefit of bi-directional protection.
  • NETSCOUT Worldwide Infrastructure Security Update Recorded: Mar 21 2019 30 mins
    Gary Sockrider, Director – Security Technologist, NETSCOUT
    NETSCOUT’s 14th Annual Worldwide Infrastructure Security Report (WISR) offers a unique view into the most critical security challenges facing today's network operators. The report covers a wide variety of topics, from attack vectors to DNS pitfalls, to key organizational issues such as incident response training and staffing challenges.

    This year, the survey is further enhanced by regional break downs of the Enterprise respondents, thanks to our partners at Intelliclear. Attack types, targets, techniques, motivations, impacts, and costs are all broken out for US and Canada, Brazil, UK, Germany, France, and Japan.

    Join this webcast to learn:

    The challenges ahead for those involved in day-to-day network and security operations.

    How your network infrastructure may be impacted by the rapidly changing threat landscape.

    What your peers are doing to address the threats, as well as persistent staffing challenges.

    Register today, space is limited.
  • Optimizing Traffic Capacity in an Age of Terabit DDoS Attacks Recorded: Feb 12 2019 48 mins
    JP Blaho, Senior Manager, Product Management, NETSCOUT Arbor
    Consumer reliance on the Internet as well as business dependencies continue to expand through Cloud-based applications and services. This demand places an increased burden on Service Provider networks. Additionally, the growth in volumetric-based DDoS attacks is making it difficult for Service Providers to discern what is good traffic versus bad.

    In this session, NETSCOUT Arbor will walk you through a series of use cases to show how Service Providers are optimizing their current DDoS protection capacity while incorporating predictability in their growth strategy.
  • NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018 Recorded: Aug 23 2018 59 mins
    Hardik Modi, Sr Director – Threat Intelligence and Richard Hummel, Threat Intelligence Manager, NETSCOUT
    The symbiotic nature of the digitally transformed world also adds vulnerability, as malicious actors, nation states, criminal organizations, or even individuals can capitalize on the interdependencies that wind through our pervasively connected world.

    The availability of innovative DDoS attack tools and techniques has lowered the barrier of entry, which means an increase in the number of attackers launching DDoS attacks. Attack targets have also diversified. It used to be that finance, gaming, and e-commerce verticals were likely targets. Today, any organization, for any real or perceived offense or affiliation, can become a target of a DDoS attack. This while APT group and crimeware activity continues to grow, as actors in this space develop and unleash increasingly sophisticated attacks worldwide.

    Attend this webcast to learn:

    •Understand what is happening on the DDoS Landscape – the largest attacks and what is driving them
    •How Nation-State activity is going ‘internet-scale’
    •Botnets, crimeware, intrusions – how these facets of the threat landscape tie in together
  • Testimonial: Nic.br works with NETSCOUT Arbor to protect availability Recorded: Apr 25 2018 5 mins
    Interview
    NIC.br needed to improve the protection of its infrastructure by keeping its systems always available for use by its own teams and customers. The decision to strengthen their defenses against denial of service attacks was a strategic decision in response to the fact that these attacks have been increasing in both frequency and complexity.

    A particularly worrying reality for Brazil among the most targeted countries in the world for these attacks, ranking fifth in the ranking of those who suffer most from DDoS attacks, according to data from the 13th Annual Report on Global Network Infrastructure Security (WISR - Worldwide Infrastructure Security Report) from NETSCOUT Arbor.
  • The Growing Risk of DDoS Attacks Recorded: Feb 21 2018 54 mins
    Robert Ayoub Research Director- Security IDC and Tom Bienkowski Director of DDoS Product Marketing Arbor Networks
    If asked, “What’s our risk of a DDoS attack?”… Would you be able to answer with confidence? With all the attention given to ransomware, it’s easy to forget about availability protection. But the data is clear. DDoS attacks are increasing in frequency and complexity. And if not adequately prepared, the impact of a DDoS attack can be quite significant. To help you more accurately assess your risk of DDoS attacks, join Rob Ayoub, IDC Research Director and Tom Bienkowski, Arbor Networks Director of Product Marketing to learn about the latest trends in DDoS attacks and more importantly best practices in protection.
  • 13th Annual Worldwide Infrastructure Security Update Recorded: Jan 25 2018 48 mins
    Gary Sockrider, Principal Security Technologist, Arbor Networks
    Hear about the mounting challenges ahead for those involved in day-to-day security operations.
    Arbor Networks' 13th Annual Worldwide Infrastructure Security Report (WISR) offers a rare view into the most critical security challenges facing today’s network operators.This session will review the highlights from the report to help network operators understand the breadth of the threats that they face, gain insight into what their peers are doing to address these threats, and comprehend both new and continuing trends.
  • Case Study: Transform Threat Investigation With a Stretched Security Team Recorded: Oct 12 2017 43 mins
    Arabella Hallawell, Sr. Director Advanced Threat Product Marketing + Deb Briggs, CSO, NETSCOUT
    Chief Information Security Officer Reveals How With Arbor Spectrum.

    Attackers continuously have new tools, tactics and practices in their weapons arsenal. Human defenders must shift their strategies to more proactively uncover meaningful threats, and find ways that dramatically accelerate threat investigation.

    Join us to hear:
    - NETSCOUT’s Chief Security Officer discuss how the Arbor Spectrum threat analytics platform was used to help her team take detection and investigation to a new level.
    - In depth examples of how security teams can begin or enhance their detection and investigation of attack campaigns.
  • Are You Sure Your DDoS Attack Protection Will Work? Recorded: Oct 5 2017 27 mins
    Tom Bienkowski, Director DDoS Product Marketing, Arbor Networks + Ondrej Krehel, CEO and Founder, LIFARS, LLC
    So, you’ve justified, purchased and deployed your new DDoS attack protection solution. But can you assure executive management / the board that your organization is protected from the modern-day DDoS attack? Waiting to see if your protection works while under attack is not the right approach. Testing the products, people and process before an attack occurs is the industry best practice. Join Arbor Networks, the industry leader in DDoS attack protection solutions and LIFARS, an elite cybersecurity, digital forensics, and incident response firm to learn:

    - The latest trends in DDoS attacks.
    - Best practices in DDoS attack defense.
    - How to properly test your DDoS attack protection products, people and process using LIFARS’ DDoS Attack Assessment Service.
  • Quantifying DDoS Cyber Risk with the FAIR Methodology Recorded: Oct 5 2017 61 mins
    Tom Bienkowski Dir. DDoS Product Marketing Arbor Networks + Jim Hietala VP Business Development and Security The Open Group
    Here’s a question for you…Is the DDoS attack protection you (may) have put in place years ago, still adequate to protect you from the modern-day DDoS attack? If not (or you’re not sure), then you are at risk. More importantly, how do you explain the risk and build the business case for protection to Executive Management / Board? Join Arbor Networks, the world leader in DDoS attack protection and Jim Hietala from The Open Group to learn:

    - The latest trends in DDoS attacks and best practices in defense.
    - How to use FAIR (Factor Analysis of Information Risk), to take a quantitative, financial approach to analyze the risk of DDoS attacks.
    - How, using different Arbor Networks DDoS attack protection solutions, you can reduce your risk and loss exposure.
    - Tips on how to present your risk analysis and business case for DDoS attack protection - in terms your Executive Management/Board will understand.
Webcasts for Network and Security Pros
Current DDoS and Cyber Threat strategies, best practices and latest trends.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Are You Sure Your DDoS Attack Protection Will Work?
  • Live at: Oct 5 2017 6:30 pm
  • Presented by: Tom Bienkowski, Director DDoS Product Marketing, Arbor Networks + Ondrej Krehel, CEO and Founder, LIFARS, LLC
  • From:
Your email has been sent.
or close