WildPackets Host Free Webinar Series on Network Forensics and Security

As attackers and attack vectors evolve more and more every day, further evidence pertaining to breaches and data exfiltration attacks come to surface only in Web traffic. When you suspect an attack, you need to answer the questions who, what, when and how – fast. Network forensics offers the best answer. Security analysts and network engineers can use network forensics to analyze what tactics a hacker used to infiltrate the network. With a clear view of all traffic, engineers can drill down quickly into any anomalies and uncover the source of a data or security breach. Knowing the importance of this tool, we thought it valuable to offer a series of free webinars on leveraging modern network forensics to protect your data.

On December 17th, Jay Botelho, Director of Product Management for Wildpackets will cohost with Keatron Evans, Principal of Blink Digital Security. They will be highlighting how network forensics—network traffic recording along with powerful search and analysis tools—can enable your in–house security team to track down, verify and characterize attacks. Keatron will look into a few real-world security breach scenarios as well as demonstrate best practices for attack analysis using network forensics.  We’ll look at common “browse by” hacks, rootkit based exfiltration and covert channel communications as the attack vectors and how to investigate them.

On December 19th, WildPackets resident experts will host a live, hands-on workshop with interactive demos and use cases.

Register at the below sites to participate:

Dec 17thLearn How to Use Network Forensics to Investigate Security Breaches

Dec 19thNetwork Forensics for Security Investigations

If you are interested in learning about network monitoring, analysis trends and best practices for troubleshooting wireless networks and virtual environments, don’t miss these webinars.

Add Network Monitoring Deployment to Your New Year’s Resolutions

With 2015 coming quickly, most businesses are carefully re-examining their goals and objectives in light of new technologies that have proven successful in their industry during the past year or two. If for your company this includes upgrading network speed to support more complex applications—or if you’ve made the change already—deploying network monitoring and network forensics should top your list of New Year’s resolutions.

Moving to 10G or 40G network speed significantly improves your ability to support video, web browsing, email, instant messaging, and other internal and end-user applications. At the same time, however, increasing bandwidth and allowing more traffic to traverse your network makes it more difficult for your network engineer to keep an eye on all activity 24/7.

Best-in-class network monitoring solutions like WildPackets’ OmniPeek Network Analyzer help you tackle this visibility issue with features such as a network traffic dashboard, which allows IT to quickly drill down to the details of any single node. With OmniPeek, your IT team has access to Interactive real-time monitoring of key network statistics, can easily view application vs. network latency, and can instantly drill down to packets.

Additionally, OmniPeek offers sophisticated notifications that alert your IT team when performance drops below a predetermined level. These warnings ensure your engineers can quickly address a small network issue (e.g., like an occasional dropped packet) before it becomes a bigger problem (e.g., significant latency or even a full-fledged outage).

Last but not least, network forensics functions help you avoid or quickly detect and deal with data breaches, cyber attacks, HR violations and other network security issues. Network forensics can capture days or even weeks worth of traffic and give your team 24/7/365 access to all this information for review. These solutions go a long way toward ensuring your organization doesn’t become the next JP Morgan, Target, Home Depot or P.F. Chang’s by providing capabilities such as:

  • Comprehensive data collection: Hours or even days of network traffic—anything that crosses the network, whether email, IM, VoIP, FTP, HTML, or some other application or protocol
  • Flexible data collection: All data gathered on a network segment for future inspection or focus on a specific user or server
  • High-level analysis: Expert analysis, graphical reports, and application performance scoring

Perhaps the best thing about putting network monitoring adoption on your list of resolutions is that you don’t have to rely on your willpower to get it done. Instead, you can put top-notch security measures in place and rest easy all year knowing your network is secure.

Are you lacking visibility into your high-speed network and looking to turn things around in the year to come? Click here to download our information kit.

State Department Latest Government Agency to Be Hacked

When retailers and restaurant chains were hacked, the public got angry. When financial institutions were invaded, the public worried. Now, as the list of organizations that have been breached grows to include government agencies, the public is starting to panic.

Shortly after news broke that the White House had its unclassified servers hacked, the State Department was forced to take the unprecedented step of shutting down its email in response to a cyber attack. The U.S. Postal Service, Office of Personnel Management, National Oceanic and Atmospheric Administration and Healthcare.gov are all also victims of recent network intrusions.

Government agencies were once thought to have the most secure networks, but recent events have clearly placed that assumption in doubt. In fact, regardless of an organization’s mission or the industry it occupies, the network monitoring and cyber security solutions it utilizes are what determines whether it is vulnerable to or protected from malicious hackers.

No matter what industry you’re in, in light of the avalanche of hacking and data breach stories hitting the news recently, it would be wise to re-examine the security tools that you have in place today. Network Forensics is one tool that should be in your arsenal.  Security analysts and Network Engineers can use network forensics to analyze what tactics a hacker used to infiltrate the network, something particularly valuable today when cybercriminals are constantly coming up with new and more sophisticated ways to breach security.  To learn more about this topic, download our white paper entitled, “Why Your Enterprise Needs Security Attack Analysis.”