Christmas and New Year may be approaching fast, but the ever-changing and unpredictable world of Information Security continues at full speed.
From the 4th-7th of December, we’ll be exhibiting at Black Hat Europe at the ExCel, London.
Attended by cybersecurity professionals and enthusiasts from around the world, Black Hat Europe 2017 will bring the best and brightest in the industry together to share information on the latest research, developments and trends.
We’ll be at our at stand (booth 201) throughout the event to answer questions and to share thoughts and ideas with attendees, particularly on the major breaches of recent years and the impending GDPR legislation. With the May 2018 deadline not far away, organizations need to be aware of how to respond to potential data breaches quickly or face hefty fines if they are inadequately prepared.
Some of the major breaches that we’ll be discussing include:
- Equifax, a victim of one of the largest hacks in recent memory. The company took two months to admit that the breach had taken place. Post-GDPR, Equifax would need to reduce their identification and reporting time from two months to just 72 hours.
- Deloitte, where a cyberattack on the company’s Azure-hosted email server’s administration account resulted in confidential documents and emails being stolen. To prepare for GDPR, cloud providers need to prioritize network visibility, something that current cloud software structures often hinder.
- TalkTalk, which announced in 2015 that a breach had taken place, erred on the side of caution by “over-reporting”, later discovering the breach was not as bad as first thought. Under GDPR, more companies may be inclined to over-report, given potential fines of up to 4% of their global revenue for under-reporting. In a post-GDPR world, precision in post-breach analysis and forensics is essential.
We’ll be demonstrating how our EndaceProbe Network Recorders can be integrated with security tools from partners like Cisco, Splunk, Plixer and Palo Alto Networks to accelerate the investigation of security alerts and help companies to identify and respond to intrusions before they can escalate into a major breach.
We’ll also be talking to attendees about why recording their network traffic provides the only truly reliable evidence for conclusively determining the cause and scope of security intrusions and breaches.
Attending Black Hat London 2017 and want to learn more about Endace? Visit our exhibition at booth 201 and meet our team. If you’re unable to attend Black Hat, visit our website to learn more about Endace and our EndaceProbe Network Recorders . Or follow us on Twitter or LinkedIn
While at Cisco Live today, I was struck by the traffic patterns on the show floor. Wherever there was a traffic jam, it seemed as though it was caused by a few people walking slower than everyone else, or by a momentary obstruction that halted traffic. Enterprise networks share many of the same attributes (and problems) that show floors do in that respect. The part that makes it worse for enterprise networks (vs. show floors) is that there are mission-critical applications that run on top of these networks. When networks have performance issues (even momentary ones), the impact on these applications can be catastrophic.
Continue reading “Dynatrace-Endace Partnership Enhances AA-NPM with EndaceProbe”
As Interop once again draws near, the InteropNet infrastructure stands ready and waiting to provide critical connectivity to the thousands of visitors and hundreds of exhibitors who attend the show. Each year, InteropNet is provided by a dedicated band of volunteer vendors, whose preparation starts early in February at the UBM hot stage. There, the network is designed, constructed and tested, so that it is ready to be shipped to Las Vegas in time to provide the network for Interop. Each year, the team reviews the latest technology to determine what is needed to provide a state of the art network that can showcase emergent trends in the networking space.
Continue reading “Endace Network Visibility Solutions Part of InteropNet at Interop 2014!”
“Spot the bad guys, stop the bad guys,” are rational and valid goals when it comes to securing your network. In fact, many organisations commit the majority of their security resources and investment to defense and detection, often by deploying automated technologies and solutions. But by their very nature, such solutions focus on protecting against known vulnerabilities and threats, have little context of your own network and can’t be a complete security solution.
Continue reading “Securing the Evidence of Network Threat Propagation”
The Sochi Winter Olympics are officially underway, and as you may have seen, NBC will once again be providing viewers access to live streaming in a multitude of mediums. On the NBC Olympics page, computer users can enter their cable or digital television provider personal user name and password and watch live video of the events. Mobile viewers can also download the free NBC Live Extra App. The iPhone, Droid and iPad app will have live and recorded events, and on demand HD video. And for the first time, NBC Universal will stream video on Facebook as part of a partnership deal with the social media giant.
Continue reading “How to Keep Sochi From Sucking Up Bandwidth”
I don’t know about you, but the winter holiday season is a bittersweet pill for me to swallow due in part to two occurrences which are aptly named “Black Friday” and “Cyber Monday.” The connotations themselves conjure up images of sinister malevolence. Black Friday might as well be called “The Black Plague” and Cyber Monday could very well be the title for the next Terminator movie, “Cyber Monday – Rise of the Machines.” The two lexicons of retail mind-control methods are emblazoned in the pre-frontal cortex of every consumer out there…unless by chance, you have been one of the lucky few individuals who is stuck in the 1950’s and opts to buy their holiday presents from the Sears Roebuck Holiday catalog, I envy you.
Continue reading “Who needs Mixed Martial Arts (MMA) when you have Cyber Mondays?”
Earlier this month, I enjoyed some time working with LAN Assistans, our Nordic partner, as we co-exhibited at Nordic IT Security 2013 in Stockholm, Sweden. As part of our participation package, we had a short “open mic” session over lunch to talk about our security topic of choice. Being stripped of my familiar presentation support aids like PowerPoint slides and asked to just stand up and talk really focused my mind (and increased my adrenaline levels!).
I often hear our team talk about our network recording and visualization solutions’ technical innovations, performance and features. In truth, Endace solutions have grown up from a DNA of engineering excellence, so it’s not so surprising that we love talking about our great technology! But for this open mic session, I thought I’d take a different approach and think about what our solutions enable our customers to do…here is a snippet of my “open mic” session:
Continue reading “Standing Up for Security”
We use technology in our everyday lives without a thought of how that content is delivered. We conduct credit card transaction over a smartphone app for taxi fare, and stream live sporting events like the World Series not just to our television sets but to our smartphones, tablets and PCs. We connect to the corporate VPN while in mid-air over the Atlantic with an expectation that it should be seamless.
Innovation in technology continues to propel us forward from the physical to the virtual world. Server, storage and network virtualization, along with the cloud, has made it easier for the workforce and applications to be agile and mobile. Keeping applications and people connected is vital for any businesses to operate and generate revenue streams.
Continue reading “Propelling Applications Forward with Network Visibility and Agility: Ecosystem Member for Cisco ACI”
Network operations (NetOps) and security operations (SecOps) teams can now take advantage of our Endace Fusion Connector for Splunk, which will dramatically lower time-to-resolution (TTR) for network issues that typically take days to resolve in the absence of readily available packet data. This Connector (available here on splunkbase) easily installs into any 5.x Splunk deployment and provides a seamless bridge between logs and packets.
Continue reading “Introducing the Fusion Connector for Splunk; Ideal for NetOps and SecOps Teams”
In the world of application delivery and performance management, it’s not easy on the applications or networking operations side to troubleshoot and resolve end-to-end issues. I‘m sure you have heard of Mean Time To Resolution (MTTR); frequently used for measuring how long it takes to resolve a particular problem from the time a trouble ticket is open to when the problem is resolved (i.e. when the ticket is closed). Have you heard of Mean Time To Innocence (MTTI), which is basically the metric for how long it takes to prove the issue wasn’t your responsibility?
Continue reading “Application Delivery – Mean Time To Innocence”