SlideShare a Scribd company logo
Security-Centric Networking
• Providing end-to-end visibility across physical, virtual environments
• Install based: 80% of F100, 50% of G2000
• R&D in US, Israel
• Large and growing customer base in Israel
• leading OEM source
• Security
• Monitoring
• Forensics
• Instrumentation
Source: 2012 Data Breach Investigations Report, Verizon.
9,500
will NOT be
recorded, captured, logged,
monitored or seen by the
organizations as they are
being lost
Source: 2012 Data Breach Investigations Report, Verizon. “Chinese cyberspies stealing key data, U.S. analysts say." CBC News, 12 Dec. 2011
Records
Management
Needs to Be
Simple, and
Centralized
Need to Have
Total
Visibility
of the Network
Monitoring
and
Enforcement
Should be
Separate
Provisioning
of Threat
Response
Needs to be
Easy
Utilize
Industry
Standards
Outdated
Innovations
Threat
Advanced
Persistent
Threats
Threat
Zero-day
Exploits
Threat
Limited
Resources
Threat
• Security is should be a strategic initiative yet implementation is
tactical and incident response is at “best effort”
• Risk mitigation of multiple attack vectors require several security
systems integrated together
• Technology of implemented solution is 1-2 years old at day one
• Solutions/technology used must be future ready and current
Security-Centric Networking
Security-Centric Networking
There’s a need for a
better (working!)
method to
implement defense
in depth
• Availability: Ability to respond
fast, accurately with needed power
• Agility: Reinforce defense when needed
• Advance: promote security tools across
the network as needed
I shell use
the concept
of SDN
Agility
Network Packet
Broker
• Total Network Visibility
• Easy Provisioning of
Threat Mitigation
Centralized
Controller
(via SDN)
• Centralized
Management
• Policies and Rules
• Industry Standards
• Separation of network elements and monitoring devices
• Automation and provisioning of monitoring applications and
tools based on real time traffic behavior
• End-to-end network monitoring
• Easy operation
• Improved Security & Monitoring
• You can view your network entirely. Every bit, every stream
without performance degradation
• You can connect any security tool to your network. Always
on, always active
• Your security devices support any load and scale as
needed
Security-Centric Networking
• Risk management and mitigation plan
• SDN controller
• Network Packet Broker (NPB) and access devices
• Your favorite security solutions
SDN Controller
NPB
Network Packet Broker
Traffic Grooming and Filtering
SDN Controller
Network Tools and Resources
North-South APIs
Chaining security solutions, turning “defense in depth” into
reality
• Learn the network, react to changes dynamically
• Use Network Packet Brokers for traffic distribution
• Add network controller that measures the network , provisions SDN and reacts
to network activity
Device provisioning and
management
Router
SDN Controller
Production Network
Threat
Centralized
Controller
Network
Packet
Broker
!
!!
Network
Monitoring
Forensics &
Enforcement
X
X
X
Phase 1 Phase 2
Security-Centric Networking
Security-Centric Networking
Security
tools
Security
tools
DMZ Network
SwitchRouter
Router Switch
xStream 10GxStream 10G
TAP/inline
Forensic Tools
Cyber
security
Tools
TAP/inline
MSG: Send Traffic
Network measurement Network measurement
NPBHA
w/ state
sync
Device provisioning and
management
Device provisioning and
management
SDN Controller
Cyber
security
Tools
• It is possible to create a “security switch” to deploy tactical
security solutions in a strategic fashion using NPB
• Security Defined Networks are possible by adopting the
SDN concept
Now It’s Your
Turn
Net Optics, Inc
5303 Betsy Ross Dr
Santa Clara, CA 95054
U.S.A
www.netoptics.com
1.408.737.7777
Sharon Besser
VP Technologies

More Related Content

What's hot (20)

PPTX
Outpost24 Webinar - Five steps to build a killer Application Security Program
Outpost24
 
PPTX
Algo sec suite overview 2013 05
hoanv
 
PDF
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24
 
PPTX
What is Next-Generation Antivirus?
Ryan G. Murphy
 
PDF
Taking the fire drill out of making firewall changes
AlgoSec
 
PDF
Migrating and Managing Security Policies in a Segmented Data Center
AlgoSec
 
PPTX
Incubation of ICS Malware (English)
Digital Bond
 
PDF
Consequence Informed Cyber Security
Dragos, Inc.
 
PPTX
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
EnergySec
 
PDF
Qradar as a SOC core
Mona Arkhipova
 
PPT
Computrace grc
Sébastien Roques
 
PDF
ICS Network Security Monitoring (NSM)
Digital Bond
 
PPTX
Scada security webinar 2012
AVEVA
 
PPT
DHS ICS Security Presentation
guest85a34f
 
PPTX
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
Liraz Goldstein
 
PPT
New Security Legislation & It's Implications for OSS Management
Black Duck by Synopsys
 
PDF
Cheatsheet for your cloud project
Petteri Heino
 
PPTX
Outpost24 webinar - Enhance user security to stop the cyber-attack cycle
Outpost24
 
PPTX
Using Assessment Tools on ICS (English)
Digital Bond
 
PPTX
Securing Electric Utility Infrastructure
Dragos, Inc.
 
Outpost24 Webinar - Five steps to build a killer Application Security Program
Outpost24
 
Algo sec suite overview 2013 05
hoanv
 
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24
 
What is Next-Generation Antivirus?
Ryan G. Murphy
 
Taking the fire drill out of making firewall changes
AlgoSec
 
Migrating and Managing Security Policies in a Segmented Data Center
AlgoSec
 
Incubation of ICS Malware (English)
Digital Bond
 
Consequence Informed Cyber Security
Dragos, Inc.
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
EnergySec
 
Qradar as a SOC core
Mona Arkhipova
 
Computrace grc
Sébastien Roques
 
ICS Network Security Monitoring (NSM)
Digital Bond
 
Scada security webinar 2012
AVEVA
 
DHS ICS Security Presentation
guest85a34f
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
Liraz Goldstein
 
New Security Legislation & It's Implications for OSS Management
Black Duck by Synopsys
 
Cheatsheet for your cloud project
Petteri Heino
 
Outpost24 webinar - Enhance user security to stop the cyber-attack cycle
Outpost24
 
Using Assessment Tools on ICS (English)
Digital Bond
 
Securing Electric Utility Infrastructure
Dragos, Inc.
 

Viewers also liked (12)

PPT
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
LiveAction Next Generation Network Management Software
 
PDF
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
LiveAction Next Generation Network Management Software
 
PPTX
Net Optics' Virtualization Solutions Deployment Case Study
LiveAction Next Generation Network Management Software
 
PDF
CBC Radio App 2.0 iOS
Ash Mishra
 
PPTX
Tapping Into the Health of Your Network
LiveAction Next Generation Network Management Software
 
PPTX
Compliance Challenges in a Virtualized Environment
LiveAction Next Generation Network Management Software
 
PPTX
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
LiveAction Next Generation Network Management Software
 
PPT
High-Availability Security Monitoring Using Bypass Switches
LiveAction Next Generation Network Management Software
 
PDF
The Secret to Surviving the Network Deluge
LiveAction Next Generation Network Management Software
 
PPTX
Network Security in a Virtualized Environment
LiveAction Next Generation Network Management Software
 
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
LiveAction Next Generation Network Management Software
 
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
LiveAction Next Generation Network Management Software
 
Net Optics' Virtualization Solutions Deployment Case Study
LiveAction Next Generation Network Management Software
 
CBC Radio App 2.0 iOS
Ash Mishra
 
Tapping Into the Health of Your Network
LiveAction Next Generation Network Management Software
 
Compliance Challenges in a Virtualized Environment
LiveAction Next Generation Network Management Software
 
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
LiveAction Next Generation Network Management Software
 
High-Availability Security Monitoring Using Bypass Switches
LiveAction Next Generation Network Management Software
 
The Secret to Surviving the Network Deluge
LiveAction Next Generation Network Management Software
 
Network Security in a Virtualized Environment
LiveAction Next Generation Network Management Software
 
Ad

Similar to Security-Centric Networking (20)

PDF
PCI and Vulnerability Assessments - What’s Missing
Black Duck by Synopsys
 
PDF
MID_SIEM_Boubker_EN
Vladyslav Radetsky
 
PPTX
Plnog13 2014 security intelligence_pkedra_v1
PROIDEA
 
PPT
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 
PDF
PCI and Vulnerability Assessments - What’s Missing?
Black Duck by Synopsys
 
PPTX
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Emulex Corporation
 
PPTX
Cyber Security in the market place: HP CTO Day
Symantec
 
PPTX
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
PPTX
5 Steps to an Effective Vulnerability Management Program
Tripwire
 
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
AlienVault
 
PPTX
CSO CXO Series Breakfast
CSO_Presentations
 
PPTX
How to Solve Your Top IT Security Reporting Challenges with AlienVault
AlienVault
 
PDF
Key Policy Considerations When Implementing Next-Generation Firewalls
AlgoSec
 
PPTX
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
SolarWinds
 
PDF
Open Source Security for Newbies - Best Practices
Black Duck by Synopsys
 
PPTX
The Benefits of Having Nerds On Site Monitoring Your Technology
nerdsonsite
 
PPTX
The Benefits of Having Nerds On Site Monitoring Your Technology
Kevin Lloyd
 
PDF
Scalar Security Roadshow April 2015
Scalar Decisions
 
PDF
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
Savvius, Inc
 
PPTX
Improve Situational Awareness for Federal Government with AlienVault USM
AlienVault
 
PCI and Vulnerability Assessments - What’s Missing
Black Duck by Synopsys
 
MID_SIEM_Boubker_EN
Vladyslav Radetsky
 
Plnog13 2014 security intelligence_pkedra_v1
PROIDEA
 
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 
PCI and Vulnerability Assessments - What’s Missing?
Black Duck by Synopsys
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Emulex Corporation
 
Cyber Security in the market place: HP CTO Day
Symantec
 
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
5 Steps to an Effective Vulnerability Management Program
Tripwire
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
AlienVault
 
CSO CXO Series Breakfast
CSO_Presentations
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
AlienVault
 
Key Policy Considerations When Implementing Next-Generation Firewalls
AlgoSec
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
SolarWinds
 
Open Source Security for Newbies - Best Practices
Black Duck by Synopsys
 
The Benefits of Having Nerds On Site Monitoring Your Technology
nerdsonsite
 
The Benefits of Having Nerds On Site Monitoring Your Technology
Kevin Lloyd
 
Scalar Security Roadshow April 2015
Scalar Decisions
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
Savvius, Inc
 
Improve Situational Awareness for Federal Government with AlienVault USM
AlienVault
 
Ad

More from LiveAction Next Generation Network Management Software (13)

PDF
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
LiveAction Next Generation Network Management Software
 
PDF
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
LiveAction Next Generation Network Management Software
 
PDF
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
LiveAction Next Generation Network Management Software
 
PDF
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
LiveAction Next Generation Network Management Software
 
PDF
Cisco1000v Net Optics Solution Brief
LiveAction Next Generation Network Management Software
 
PDF
Infographic: Aim Straight at Your Application Performance Issues
LiveAction Next Generation Network Management Software
 
PDF
The New Intelligent Network: Building a Smarter, Simpler Architecture
LiveAction Next Generation Network Management Software
 
PPTX
Big Data is on a Collision Course With Your Network - Are You Ready?
LiveAction Next Generation Network Management Software
 
PPTX
Is the Network Tap Mightier Than the Sword
LiveAction Next Generation Network Management Software
 
PPTX
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
LiveAction Next Generation Network Management Software
 
PPTX
Lawful Interception in Virtual Environments
LiveAction Next Generation Network Management Software
 
PPTX
Tap Into the Health of Your Network
LiveAction Next Generation Network Management Software
 
PPTX
Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...
LiveAction Next Generation Network Management Software
 
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
LiveAction Next Generation Network Management Software
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
LiveAction Next Generation Network Management Software
 
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
LiveAction Next Generation Network Management Software
 
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
LiveAction Next Generation Network Management Software
 
Cisco1000v Net Optics Solution Brief
LiveAction Next Generation Network Management Software
 
Infographic: Aim Straight at Your Application Performance Issues
LiveAction Next Generation Network Management Software
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
LiveAction Next Generation Network Management Software
 
Big Data is on a Collision Course With Your Network - Are You Ready?
LiveAction Next Generation Network Management Software
 
Is the Network Tap Mightier Than the Sword
LiveAction Next Generation Network Management Software
 
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
LiveAction Next Generation Network Management Software
 
Lawful Interception in Virtual Environments
LiveAction Next Generation Network Management Software
 
Tap Into the Health of Your Network
LiveAction Next Generation Network Management Software
 
Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...
LiveAction Next Generation Network Management Software
 

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
PPTX
Machine Learning Benefits Across Industries
SynapseIndia
 
PDF
OpenInfra ID 2025 - Are Containers Dying? Rethinking Isolation with MicroVMs.pdf
Muhammad Yuga Nugraha
 
PDF
Alpha Altcoin Setup : TIA - 19th July 2025
CIFDAQ
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
Lecture A - AI Workflows for Banking.pdf
Dr. LAM Yat-fai (林日辉)
 
PDF
Novus Safe Lite- What is Novus Safe Lite.pdf
Novus Hi-Tech
 
PDF
Rethinking Security Operations - Modern SOC.pdf
Haris Chughtai
 
PDF
Apache CloudStack 201: Let's Design & Build an IaaS Cloud
ShapeBlue
 
PDF
visibel.ai Company Profile – Real-Time AI Solution for CCTV
visibelaiproject
 
PDF
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
PDF
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
PDF
Market Insight : ETH Dominance Returns
CIFDAQ
 
PDF
RAT Builders - How to Catch Them All [DeepSec 2024]
malmoeb
 
PPTX
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
HR agent at Mediq: Lessons learned on Agent Builder & Maestro by Tacstone Tec...
UiPathCommunity
 
PDF
Agentic Artificial Intelligence (AI) and its growing impact on business opera...
Alakmalak Technologies Pvt. Ltd.
 
PDF
Upskill to Agentic Automation 2025 - Kickoff Meeting
DianaGray10
 
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
Machine Learning Benefits Across Industries
SynapseIndia
 
OpenInfra ID 2025 - Are Containers Dying? Rethinking Isolation with MicroVMs.pdf
Muhammad Yuga Nugraha
 
Alpha Altcoin Setup : TIA - 19th July 2025
CIFDAQ
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Lecture A - AI Workflows for Banking.pdf
Dr. LAM Yat-fai (林日辉)
 
Novus Safe Lite- What is Novus Safe Lite.pdf
Novus Hi-Tech
 
Rethinking Security Operations - Modern SOC.pdf
Haris Chughtai
 
Apache CloudStack 201: Let's Design & Build an IaaS Cloud
ShapeBlue
 
visibel.ai Company Profile – Real-Time AI Solution for CCTV
visibelaiproject
 
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
Market Insight : ETH Dominance Returns
CIFDAQ
 
RAT Builders - How to Catch Them All [DeepSec 2024]
malmoeb
 
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
HR agent at Mediq: Lessons learned on Agent Builder & Maestro by Tacstone Tec...
UiPathCommunity
 
Agentic Artificial Intelligence (AI) and its growing impact on business opera...
Alakmalak Technologies Pvt. Ltd.
 
Upskill to Agentic Automation 2025 - Kickoff Meeting
DianaGray10
 

Security-Centric Networking

  • 2. • Providing end-to-end visibility across physical, virtual environments • Install based: 80% of F100, 50% of G2000 • R&D in US, Israel • Large and growing customer base in Israel • leading OEM source • Security • Monitoring • Forensics • Instrumentation
  • 3. Source: 2012 Data Breach Investigations Report, Verizon.
  • 4. 9,500 will NOT be recorded, captured, logged, monitored or seen by the organizations as they are being lost Source: 2012 Data Breach Investigations Report, Verizon. “Chinese cyberspies stealing key data, U.S. analysts say." CBC News, 12 Dec. 2011
  • 6. Management Needs to Be Simple, and Centralized Need to Have Total Visibility of the Network Monitoring and Enforcement Should be Separate Provisioning of Threat Response Needs to be Easy Utilize Industry Standards
  • 8. • Security is should be a strategic initiative yet implementation is tactical and incident response is at “best effort” • Risk mitigation of multiple attack vectors require several security systems integrated together • Technology of implemented solution is 1-2 years old at day one • Solutions/technology used must be future ready and current
  • 11. There’s a need for a better (working!) method to implement defense in depth
  • 12. • Availability: Ability to respond fast, accurately with needed power • Agility: Reinforce defense when needed • Advance: promote security tools across the network as needed
  • 13. I shell use the concept of SDN
  • 14. Agility Network Packet Broker • Total Network Visibility • Easy Provisioning of Threat Mitigation Centralized Controller (via SDN) • Centralized Management • Policies and Rules • Industry Standards
  • 15. • Separation of network elements and monitoring devices • Automation and provisioning of monitoring applications and tools based on real time traffic behavior • End-to-end network monitoring • Easy operation • Improved Security & Monitoring
  • 16. • You can view your network entirely. Every bit, every stream without performance degradation • You can connect any security tool to your network. Always on, always active • Your security devices support any load and scale as needed
  • 18. • Risk management and mitigation plan • SDN controller • Network Packet Broker (NPB) and access devices • Your favorite security solutions SDN Controller NPB
  • 19. Network Packet Broker Traffic Grooming and Filtering SDN Controller Network Tools and Resources North-South APIs
  • 20. Chaining security solutions, turning “defense in depth” into reality
  • 21. • Learn the network, react to changes dynamically • Use Network Packet Brokers for traffic distribution • Add network controller that measures the network , provisions SDN and reacts to network activity Device provisioning and management Router SDN Controller
  • 25. Security tools Security tools DMZ Network SwitchRouter Router Switch xStream 10GxStream 10G TAP/inline Forensic Tools Cyber security Tools TAP/inline MSG: Send Traffic Network measurement Network measurement NPBHA w/ state sync Device provisioning and management Device provisioning and management SDN Controller Cyber security Tools
  • 26. • It is possible to create a “security switch” to deploy tactical security solutions in a strategic fashion using NPB • Security Defined Networks are possible by adopting the SDN concept
  • 28. Net Optics, Inc 5303 Betsy Ross Dr Santa Clara, CA 95054 U.S.A www.netoptics.com 1.408.737.7777 Sharon Besser VP Technologies

Editor's Notes

  • #3: Industry analysts consistently recognize Net Optics as one of America’s top private companies. And our company founder, EldadMatityahu, knows that while we built the company in Silicon Valley, the best way to secure our place as leaders is by tapping into the best and the brightest…and that means opening offices here in the Startup Nation. See the future by creating it.
  • #4: I want to begin today with some sobering statistics. In the same amount of time that I will be standing on this stage, approximately 10,000 customer records will be stolen from networks around the world. Of course, this statistic is not shocking to anyone in this room. After all, we’re here because we are well aware of the threats to network security and, specifically, cybersecurity.
  • #5: What SHOULD surprise you is that 9,500 of these stolen records will NOT be recorded, captured, logged, monitored or seen by the organizations as they are being lost. The breaches are all too frequently invisible to the organizations. And the targeted organizations and their customers only learn about it when and if credit or law enforcement agencies get involved – essentially - when it’s too late.  In December, news broke that hackers – believed to have ties to the Chinese military - infiltrated the computer systems of the U-S Chamber of Commerce. This was just the latest in a series of cyber attacks. Some in the United States accuse China of stealing $400 billion worth of sensitive information a year. The breaches are so serious that the National Counterintelligence Executive described them as a “long term strategic threat to the United States of America.” And he added “failure is not an option.” Of course, the news hits close to home here in Israel – Just last week, Kaspersky Labs detected the Flame worm and cybersecurity has been the top headline ever since. I’ll bet we’ll all be paying very close attention later this afternoon when Eugene Kaspersky takes to the podium.Israel’s largest bank and several other public institutions have come under attack –by Iranian and Saudi hackers – and we can only assume there will be more to come.
  • #6: But what has happened in the Cyber Security arena in the past year? As you know, when it comes to Cyber Security, the situation is getting worse, not better:130+ major Data Breaches have occurred in the first three months of 2013,Nearly 70% of these breaches go undetected47,000 Incidents were reported in 2012And nearly 44 million records were compromised last year Companies such as Checkpoint, Imperva, Radware, and other security firms are developing solutions that companies are paying billions of dollars for – and this may be somewhat controversial, but these individual solutions don’t appear to be stemming the tide.
  • #7: Scale, Scope, Resources, Speed of attacks – unprecedentedOrganized Crime – Financial BenefitGovernment Sponsored – State SecretsCheap Resources – Bot NetsTargets of Choice - Some Organizations will be a target regardless of what they do, but most will become a target because of what they do. There’s a need for a better (working!) method to implement defense in depth
  • #10: Combining, integrating, layering, looking beyond patterns of activity - but still not quite there yet
  • #14: The BEST Practices are now looking at the entire Architecture of the Network -- not just silo’s -- we need to view our networks in their entirety from the Cloud to the Data Center to the remote branches. We can’t turn on a nightlight here and a flashlight there to guide us through the dark. We need night vision goggles to eliminate the blind spots.Visibility Solutions that just look at the network edge or see only the random monitoring data that doesn’t get dropped by an oversubscribed SPAN port are simply not robust or comprehensive enough. As the diversity of applications increase, and the devices that access or host them spread to every corner of your organization, Visibility needs to become a core function incorporated into every network architecture. The past decade has seen Network Access and Visibility rise sharply as a critical component for gaining accurate information about the state of the network and that trend will only continue.