The combination of cloud, colo and virtualization is changing the data center in ways we never expected in the past. As enterprises implement new technology and look to improve connectivity, the complexity of this hybrid cloud environment adds both security and performance challenges to mission critical applications. It’s not enough to isolate a problem to a specific domain, you need to have visibility across the entire hybrid cloud infrastructure.
In this webinar you will learn:
•What is smart data and how to use it to intelligently and efficiently analyze traffic flows for a contextual view of service, and its' interdependencies end-to-end across the service delivery infrastructure.
•How to accelerate deployments of services into AWS, while assuring application reliability, availability, responsiveness, and business continuity.
•Real-world examples of how NETSCOUT’s customers have gained visibility across the environment as they build and migrate applications to AWS.
RecordedJan 14 202061 mins
Your place is confirmed, we'll send you email reminders
Overview: This 20- minute webinar will shed light on the possible areas for improving the security of your “stateful” infrastructures and your sensitive application services in the face of cyberattacks.
This webinar offers to deepen the concept of “state exhaustion” vulnerabilities, their impact in terms of security and how to protect yourself from them.
We will also see how the physical positioning of a frontline defense within a Data Center is of real importance in a “Zero Trust” approach.
Tom Bienkowski, Director Product Marketing & Scott Iekel-Johnson, Director DDoS Product Management
As DDoS attacks continue to increase in frequency and complexity, service providers must rely upon continuous threat intelligence, automated attack detection and orchestration of multiple methods of attack mitigation to protect the availability of their services and their customers.
Join NETSCOUT in this webinar and explore:
• The latest trends in DDoS attacks – including the common use of 15+ vector attacks
• How to use NETSCOUT Threat Intelligence for more efficient DDoS attack protection
• How to intelligently orchestrate multiple methods of mitigation (e.g. Flowspec, Arbor Threat Mitigation System and other services providers) to stop multi-vector DDoS attacks
Your firewall is protecting your organization from cyberthreats. But what’s protecting your firewall? Firewalls and devices like VPN concentrators, IDS/IPS, load balancers etc., all have one thing in common. They are stateful devices. That makes them very susceptible to DDoS attacks.
Join NETSCOUT in this webinar to learn:
• Why stateful devices like firewalls are susceptible to DDoS attacks
• Why industry best practices (and firewall vendors) recommend that you deploy stateless DDoS protection in front of your firewall to protect it and other stateful devices
• How NETSCOUT Arbor Edge Defense can be used as a first and last line of network perimeter defense to protect the availability and performance of your firewall and other stateful infrastructure from DDoS attacks and other cyberthreats
Scott Ward, Prin Solns Architect & Josh Dean, Sr Ptnr Solns Architect, AWS; Rossitza Grozeva, Dir Prod Mgt, NETSCOUT
As organizations migrate workloads to the cloud, infrastructure becomes more hybrid in nature, making end-to-end visibility a necessary tool in combating threats across the global attack surface.
As a validated Networking, Migration, and Public Sector Partner, NETSCOUT Systems, Inc. collaborated with AWS to provide first-of-its-kind end-thru-end visibility across the hybrid cloud to efficiently mitigate security risks while decreasing operational overhead.
Join us to learn how integration between NETSCOUT Omnis Cyber Investigator (OCI) with a global threat intelligence feed and AWS Security Hub enables IT teams to effectively detect, validate, investigate, and respond to cyber threats - quickly and efficiently.
Tom Bienkowski, Director Product Marketing; Richard Hummel, Manager of Threat intelligence
A traditional ransomware attacks where the cybercriminal breaches a network encrypts data and demands payment for a decryption code is a tough challenge. Add a threat to expose data and the situation is even more critical. But if that was not enough, now threat actors are adding DDoS attacks to the mix to ratchet up the pressure.
Join this NETSCOUT webinar to learn what you can do to be protected and prepared when your organization is the target.
Tom Bienkowski, Director Product Marketing; Roland Dobbins, Principal Engineer; & Richard Hummel, Mgr of Threat intelligence
Cyber extortion is increasing in frequency and the payout for attackers. In addition to encrypting and stealing data, ransomware gangs are now launching DDoS attacks to triple extort their targets. In this short 12 min panel interview, learn about triple extortion techniques and best practices in defense.
Threat intelligence must go beyond merely collecting and analysing attack data. It should make a marked improvement over existing staff and processes. This information must be actionable with the risk from each threat being clear, and the actions to be taken evident.
Looking at how stateless DDoS protection works and asking from which dangers, apart from DDoS attacks, can it protect we will, using explanation based on the ATLAS® Intelligence Feed (AIF) for NETSCOUT® Arbor Edge Defense (AED), look at the information in a security feed and how this should enable you to quickly address advanced attacks, whether they are DDoS-related or part of a larger advanced threat campaign against your organisation.
R Hummel, Threat Intel Mgr NTCT; J Burgess, Tech Lead Threat Intel Adv CrowdStrike; Z Nelson, Intel & Ops Team Lead HISAC
During the discussion, Zach Nelson from H-ISAC will ask our experts about the tools leveraged to extort resources from healthcare organizations and the indicators and dynamics that illustrate that cybercrime incidents are rising. Further, our experts will explore the steps healthcare organizations can take to protect themselves from extortion attempts. Intrinsic to the dialogue will be context around the risks and similarities between DDoS extortion and ransomware attacks.
Attendees will learn:
• How eCriminals are evolving and enhancing their tools to evade security applications
• What steps can be taken to protect organizations from extortion attempts
• How increased complexity and risk have grown the overall threats deployed
• What are the differences and cross-over points between ransomware and DDoS extortion attacks
Tom Bienkowski, Director Product Marketing and Roland Dobbins, Principal Engineer
For the past several months NETSCOUT’s ATLAS Security Engineering and Response Team (ASERT) has been tracking and helping organizations defend themselves from the Lazarus Bear Armada (LBA) DDoS Extortion Campaign. Join us in this webinar to:
· Learn how the attacker continues to target and retarget different industries and critical infrastructure (e.g. as VPN concentrators) on a worldwide basis.
· Get updated information on the latest attack vectors being used in the campaign including everyday protocols such as Microsoft RDP, DNS, NTP and more.
· Take a behind-the-scenes glimpse into how ASERT gathers Threat Intelligence.
· Understand current best practices in defense
Next-generation mobile services will bring the connected world into every aspect of our business and personal lives, delivering a multitude of benefits and efficiencies – but also threats, some obvious and some insidious.
More speed, more devices, more protocols, more vendors, more complexity, and more high-value services are driving a growing realization that visibility and security solutions within the 4G/5G mobile network itself are not just important, they are essential for next-generation use-cases and services to succeed – and for 5G to deliver the ROI that network operators need.
Learn how the unique visibility of NETSCOUT and experience of Arbor can help you to assure the quality and security of next generation services.
Protect your network and services with orchestrated, automated DDoS attack response.
Learn more about Smart Security:
Richard Hummel, Manager of Threat Intelligence and Darren Anstee, CTO Office/Security
Join us for our webinar as we discuss the dramatic rise in CSP (communication service providers) DDoS attacks during the 1st half of 2020.
NETSCOUT DDoS experts will share with you how service providers bore the brunt of DDoS attacks during the pandemic and how they’re meeting this challenge head-on. Learn how CSPs are mitigating DDoS attacks, defending their network, and meeting DDoS requirements for their customers.
•4.8 million attacks representing a 15% increase year-over-year
•Tbps sized, and increase in multi-million pps DDoS attacks
•2,851% increase in 15-plus vector DDoS attacks
•Top industry targets
•DDoS mitigation best practices
Michael Segal AVP Strategic Alliances, NETSCOUT and Ray Krug Director Product Marketing, NETSCOUT
Enterprises rely on the IT organization to continuously deploy new services and migrate on-premises workloads to the cloud. But moving workloads creates borders and blind spots between different technology and management domains across on-premises and cloud environments. How do IT teams handle the unexpected?
NETSCOUT is an AWS Network Advanced Technology Partner, providing the first-of-its-kind network traffic visibility. Join NETSCOUT experts Michael Segal and Ray Krug in this webinar and learn:
• Acceleration of the migration to AWS
• Getting to Day 2 cost-effectively with smart visibility
• Hybrid cloud visibility with NETSCOUT Smart Data, from Day 0 to Day 2
• Looking forward: Smart Data in 5G and the edge
• NETSCOUT and AWS collaboration
Healthcare organizations are facing many forms of cyber threats. Ransomware and DDoS Extortion attacks are just two on an upward trend in the first half of 2020. In this webinar, NETSCOUT will discuss the similarities and differences between ransomware and DDoS extortion attacks and, if you are unprepared – one big difference.
In this webinar, you will learn about:
• The 5 similarities and one key difference between ransomware and DDoS Extortion attacks.
• The increase in DDoS attack frequency and complexity in the first half 2020.
•The best practices in modern-day DDoS defense for healthcare organizations.
Kevin Ware-Lane, Security Sales Manager (UK & Ireland), NETSCOUT
The ability to react and respond in a timely manner to security incidents, failure scenarios and application performance issues means bringing data and teams together in a cohesive way.
Networks, infrastructure, applications, and security operations all surface their data through a plethora of tools often with different, non-aligned viewpoints, but cohesive visibility is paramount to keeping the business operational and effective.
In this session we will discuss the need and capabilities for:
-Extending visibility between teams and silos by building a common reference point; Visibility Without Borders. Giving teams actionable intelligence they need, with the right role-specific toolset, using the Smart Data they all share.
-Re-gaining security visibility in an encrypted World.
Guido Schaffner, Channel Sales Engineer, NETSCOUT and Alexander Maerz, Consulting Engineer DACH, NETSCOUT
Zurzeit gibt es verstärkt DDoS Angriffe auf Unternehmen kombiniert mit einer
Zahlungsaufforderung. Was steckt dahinter? Wie sollte man reagieren?
Wie kann ich mich – auch kurzfristig – vor möglichen angedrohten oder realen Angriffen wirkungsvoll schützen?
Guido Schaffner, Channel Sales Engineer, NETSCOUT and Alexander Maerz, Consulting Engineer DACH, NETSCOUT
Wir wollen in dem Webinar einen Überblick über einen DDoS Schutz für alle Unternehmen geben.
Dabei werden die unterschiedlichen Schutz-Möglichkeiten vorgestellt. Wiekann man sich auf Angriffe vorbereiten? Welche der vielfältigen Lösungen passt zu meinem Risiko?
Tom Bienkowski, Director Product Marketing, Roland Dobbins, Principal Engineer
Update to Sept 2020 Threat Advisory DDoS Extortion Campaign. Includes review of attack methodology. Attacks have expanded globally from the initial industries of regional banks, stock exchanges, travel agencies, currency exchanges, and, in some cases, their upstream internet transit providers to now inlcude healthcare providers, broadband access ISPs, insurance providers, personal care product manufacturers, regional energy providers, and IT-related vendors.
Ensure Successful Application Migrations to AWSRay Krug, Solutions Architect, NETSCOUT and Michael Segal, Strategic Alliances, NETSCOUT[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]61 mins