There is something both cathartic and caustic whenever the term “ice” is added onto something of cultural and artistic value. Let’s see, you have hip hop artists like Ice-T and Ice Cube who rapped about social injustice and the hardships of poverty. Then you have this generation’s iconoclast, Vanilla Ice (nee’ Robert Matthew Van Winkle) who let us know it was perfectly fine to “play that funky music” when you had a rough day or that humming “Ice Ice Baby” to your newly born child while rocking him to sleep didn’t constitute you as being strange.
On April 7, the “Heartbleed” bug was announced. It’s a serious flaw in the OpenSSL 1.0 – 1.0.1 code series which affects all applications using it for encryption. In short, it means that anyone who can connect to the server can remotely read the server’s memory – including the SSL certificate secret key, usernames and passwords, and anything else.
With the Heartbleed bug exploit code in the wild, anyone can take advantage of the critical time between public exposure of the exploit and when all organizations can patch (or take offline) vulnerable systems. So, for almost every organization in the world, there are three questions that come to mind. The first question is “which of my public facing servers is vulnerable?” The second question is “have I been exploited since this became public?” And the third question is “what have I lost?”
The EndaceProbe™ Network Recorder helps answer all three questions.
As Interop once again draws near, the InteropNet infrastructure stands ready and waiting to provide critical connectivity to the thousands of visitors and hundreds of exhibitors who attend the show. Each year, InteropNet is provided by a dedicated band of volunteer vendors, whose preparation starts early in February at the UBM hot stage. There, the network is designed, constructed and tested, so that it is ready to be shipped to Las Vegas in time to provide the network for Interop. Each year, the team reviews the latest technology to determine what is needed to provide a state of the art network that can showcase emergent trends in the networking space.
Last month, we talked about how to keep the Winter Olympics from clogging up your networks as employees raced to stream live events during the workday. Well, in the U.S., today and tomorrow are two of the biggest sports streaming days of the year. Although we’ve already seen some play-in games this week, when Ohio State and Dayton tip-off this afternoon in the NCAA Men’s Basketball Tournament, the annual “madness” repeats itself all over again. This is because this next slate of games will run almost continually over the coming 36 hours, mostly during regular business hours. And let’s be honest, most of us want to sneak a peek at the scores and witness some of the thrilling upsets that happen every year.
“Spot the bad guys, stop the bad guys,” are rational and valid goals when it comes to securing your network. In fact, many organisations commit the majority of their security resources and investment to defense and detection, often by deploying automated technologies and solutions. But by their very nature, such solutions focus on protecting against known vulnerabilities and threats, have little context of your own network and can’t be a complete security solution.
Okay, I admit it I am a big sports fan, and just like many of you, I enjoy watching great competitions, unlike this year’s Super Bowl. That is unless of course you’re a Seahawks fan. But every two years, we get treated to the Olympic Games. Whether they are the winter or summer games, the excitement and competition of each event include outcomes determined by fractions of a second. The Olympic judges have the benefit of precise timing equipment and instant replay to make decision on scoring each athlete. They are well aware that the accuracy of this equipment can be the difference between gold, silver or bronze, or maybe missing the podium altogether, not to mention national pride.
The Sochi Winter Olympics are officially underway, and as you may have seen, NBC will once again be providing viewers access to live streaming in a multitude of mediums. On the NBC Olympics page, computer users can enter their cable or digital television provider personal user name and password and watch live video of the events. Mobile viewers can also download the free NBC Live Extra App. The iPhone, Droid and iPad app will have live and recorded events, and on demand HD video. And for the first time, NBC Universal will stream video on Facebook as part of a partnership deal with the social media giant.
NetFlow as a network monitoring and statics technology is not new. To make it work, you need to sample the network and generate NetFlow records, which are sent to a NetFlow collector software application for analysis. NetFlow has been widely adopted and many organisations have invested time and money in learning how to use NetFlow tools to help their network operations teams understand how their network is performing and what is creating fluctuations in traffic.
By: Alistair Meakin, MarQuest
As a certified Splunk partner, and provider of network operations and security consultancy, MarQuest has extensive knowledge of the benefits Splunk brings to network operations (NetOps) and security operations (SecOps) teams. Curious about the Endace Fusion Connector for Splunk, we completed an independent evaluation of it to assess its usability and benefits. By installing, deploying and using the application, we looked for answers to the following questions:
- Is the application likely to add value to IT operations?
- How usable is the application?
The beginning of any new year is the perfect time to build upon the positive momentum of its predecessor and what better way to start than with the new EndaceProbe™ Network Recorder EP5.1.3 release which does exactly that!
Whilst there’s too much to cover in this blog alone, I’ve focused on some of the key additions to our network visibility tool EndaceVision ™ to give a flavour of the new capabilities that this release brings.