|
Jason Dover Presented at Security Field Day |
This Presentation date is March 24, 2021 at 11:00-13:00.
Presenters: Jason Dover, Pavel Minarik
Follow on Twitter using the following hashtags or usernames: #XFD5
Kemp Company Overview with Jason Dover
Watch on YouTube
Watch on Vimeo
Kemp powers the always-on application experience that enterprises and service providers need to succeed. Kemp has redefined load balancing and network visibility simplified deployment options, flexible licensing, and top-rated technical support. Kemp has more than 100,000 deployments in 138 countries.
Kemp’s product portfolio is centered on helping customers deliver the best possible application experience by addressing the requirements of modern application load balancers, network visibility, and response to emerging security threats in the network. The core components of this portfolio are the LoadMaster ADC & WAF, Flowmon NPMD and Flowmon ADS.
Personnel: Jason Dover
Kemp Principals & Approaches for Network Threat Detection
Watch on YouTube
Watch on Vimeo
Successful threat detection is a multi-layered approach that requires the right tools, methods and approaches. There’s no single magic bullet but with the right building blocks (including a scalable NDR solution), organizations can be successful in detecting and preventing exploits by extracting the insights from the network.
Personnel: Jason Dover
Kemp Flowmon Technical Architecture
Watch on YouTube
Watch on Vimeo
Kemp’s Flowmon network detection & response architecture, components, input data, detection techniques, algorithms and alignment with MITRE ATT&CK framework. Response to threats and further integration to cyber security technology stack.
Personnel: Pavel Minarik
Kemp Demo User Account Compromise
Watch on YouTube
Watch on Vimeo
In-depth walkthrough of the system capabilities on a single use case. Detection of a user account compromise and event evidence ranging from aggregated network telemetry through signature-based detection and full packet data with built-in out-of-the-box packet analysis.
Personnel: Pavel Minarik
Kemp Demo Ransomware Detection & Response
Watch on YouTube
Watch on Vimeo
A complex network compromise scenario evolving from initial exploitation through lateral movement, data hoarding and exfiltration over an alternative protocol followed by the final impact through data encryption. Detection of individual indicators of compromise within the network traffic flows as the attack is progressing allows the security operator to respond properly and on time.
Personnel: Pavel Minarik
Kemp Field Day Wrap-Up with Jason Dover
Watch on YouTube
Watch on Vimeo
In this wrap up session, Kemp discusses the key takeaways from their presentation and how to test this approach in your environment with a free network assessment.
Personnel: Jason Dover