Jim Meehan, Director of Solutions Engineering at Kentik, reviews Kentik Detect’s alerting capabilities. The solution comes with predefined alert parameters around capacity, general anomalies, and DDoS threats, but these can also be defined per user preference. This can include specific filters and datasets, as well as historical baselines for context.
Kentik Detect for DevOps, NPM, and DNS with Avi Freedman
Avi Freedman, Co-founder and CEO at Kentik, demonstrates Kentik Detect as a plugin for Grafana. This provides a subset of data from the Kentik API that can be used alongside other application metrics in an overall dashboard.
Kentik Detect for Network Peering and Planning with Jim Meehan
Jim Meehan, Director of Solutions Engineering at Kentik, reviews using Kentik Detect for network peering analysis and planning purposes. This can be used by service providers, content source networks, or CDNs. Because Kentik Detect correlates flow data with other variables at full resolution, it gives organizations easily understood information to prioritize traffic for cost or […]
Kentik Data Engine with Avi Freedman
Avi Freedman, Co-founder and CEO at Kentik, gives a technical overview of their Data Engine. This is run in the cloud, and designed by Kentik for the particularly high ingest required to maintain full resolution of all network flow data. KDE allows for realtime stream processing of network traffic for anomaly detection. Avi goes into […]
Kentik Detect SaaS Platform with Jim Meehan
Jim Meehan, Director of Solutions Engineering at Kentik, reviews the UI and functionality of the Kentik Detect SaaS platform. This is designed to keep the full resolution of network flow data, rather than an aggregated ingest. This enables the creation of summary reports, while still allowing for drill down into very narrow pieces of data.
Introduction to Kentik with Avi Freedman
Avi Freedman, Co-founder and CEO at Kentik, introduces the company to the delegates. They offer network traffic analytics, starting with flow information and augment it with routing and other metrics.
Gigamon Integration with Phantom with Robert Truesdell
Robert Truesdell, Senior Director, Product Management and Technology Alliances with Phantom, discusses the security operations center with the delegates. These SOCs are increasingly understaffed and beset by sophisticated actors using automation against them. Robert introduces Phantom as a solution to these issues, and gives an overview of how they integrate with Gigamon’s visibility solutions.
Gigamon Adaptive Response Application with Hamad Altaf
Hamad Altaf, Staff QA Engineer at Gigamon, overviews the specifics of their Adaptive Response application, using Splunk as an example. This talk focuses on the containment part of the Defender Lifecycle, which is then in turn used to feedback to improve the quality of future detection.
Gigamon Using Metedata for Security Analysis with Noam Syrkin
Noam Syrkin, Senior Technical Marketing Engineer with Gigamon, gives an overview of how the company generates metadata, which can serve as the ingest for further tools like Splunk. The focus on metadata allows for greater efficiency due to the small amount of response time between packets, and helps overcome the limited reach of other visibly […]
Gigamon Splunk Overview of Enterprise Security and Adaptive Response Framework with Wissam Ali-Ahmad
Wissam Ali-Ahmad, Technical Lead for Global Strategic Alliances with Splunk, introduces the delegates to their solution. This allows you to take machine data from various sources and make it usable in a unified manner. This visibility gives insight into advanced threats and serves as a nerve center for modern security monitoring. This integrates with Gigamon […]
Gigamon Defender Lifecycle Model with Ananda Rajagopal
Ananda Rajagopal, Vice President, Products at Gigamon, gives an overview of the company’s Defender Lifecycle Model. This platform is based around the idea due to the velocity of traffic, real-time threat protection may not be feasible. This builds on simple principals of prevention, with a focus on detection, prediction, and containment of threats. Gigamon’s Defender […]
Cisco Tetration Analytics Security Model with Tim Garner
Cisco says their customers have used the Cisco Tetration platform to segment and build secure infrastructure for applications. This is designed to remediate the current state of networking, which provides little knowledge of how applications interact, what infrastructure services they depend on, and how to effectively implement segmentation.
Cisco Tetration Analytics Refresher with Tim Garner
Cisco says their Tetration analytics engine gives them visibility into every packet in a network environment via metadata filtering. Tetration is able to intelligently whitelist traffic based on usage, without requiring explicit configuration from a network engineer.
Pluribus Networks Embedded Visibility and Insight Analytics with Steven Shalita
Steven Shalita, Vice President of Marketing with Pluribus Networks, gives a high level overview of their analytics capabilities built into their Adaptive Cloud Fabric architecture. This goes beyond looking at basic network functions by generating metadata from the network itself via performance metrics. By using their fabric based model, Pluribus Networks has built their analytics […]
Introduction to the Pluribus Netvisor OS and Adaptive Cloud Fabric with Steven Shalita
Steven Shalita, Vice President of Marketing with Pluribus Networks, introduces the delegates to the Netvisor OS, their virtualized operating system, and their Adaptive Cloud Fabric architecture. The latter was introduced around April 2017 as their vision for a simplified, distributed network.