Follow on Twitter using the following hashtags or usernames: #XFD5
Watch on YouTube
Watch on Vimeo
Kemp powers the always-on application experience that enterprises and service providers need to succeed. Kemp has redefined load balancing and network visibility simplified deployment options, flexible licensing, and top-rated technical support. Kemp has more than 100,000 deployments in 138 countries.
Kemp’s product portfolio is centered on helping customers deliver the best possible application experience by addressing the requirements of modern application load balancers, network visibility, and response to emerging security threats in the network. The core components of this portfolio are the LoadMaster ADC & WAF, Flowmon NPMD and Flowmon ADS.
Personnel: Jason Dover
Watch on YouTube
Watch on Vimeo
Successful threat detection is a multi-layered approach that requires the right tools, methods and approaches. There’s no single magic bullet but with the right building blocks (including a scalable NDR solution), organizations can be successful in detecting and preventing exploits by extracting the insights from the network.
Personnel: Jason Dover
Watch on YouTube
Watch on Vimeo
Kemp’s Flowmon network detection & response architecture, components, input data, detection techniques, algorithms and alignment with MITRE ATT&CK framework. Response to threats and further integration to cyber security technology stack.
Personnel: Pavel Minarik
Watch on YouTube
Watch on Vimeo
In-depth walkthrough of the system capabilities on a single use case. Detection of a user account compromise and event evidence ranging from aggregated network telemetry through signature-based detection and full packet data with built-in out-of-the-box packet analysis.
Personnel: Pavel Minarik
Watch on YouTube
Watch on Vimeo
A complex network compromise scenario evolving from initial exploitation through lateral movement, data hoarding and exfiltration over an alternative protocol followed by the final impact through data encryption. Detection of individual indicators of compromise within the network traffic flows as the attack is progressing allows the security operator to respond properly and on time.
Personnel: Pavel Minarik
Watch on YouTube
Watch on Vimeo
In this wrap up session, Kemp discusses the key takeaways from their presentation and how to test this approach in your environment with a free network assessment.
Personnel: Jason Dover
Thank you for being part of the Tech Field Day community! Our mailing list is a great way to stay up to date on our events and technical content, and we appreciate your signup.
We promise that we’ll never spam you, send ads, or sell your information. This list will only be used to communicate with our community about our events and content. And we’ll limit it to no more than one message per week.
Although we only need your email address, it would be nice if you provided a little more information to help us get to know you better!