Www.netfort.com NetFort Customer Webinar Getting back to basics – Using LANGuardian Aisling Brennan 26 th Feb 2015.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Heroix Longitude - multiplatform, automated application performance monitoring and management software.
1 Conference Etiquette 1 Video Attendees: - Please mute your microphones until you are ready to ask a question. On Site Attendees: - Please mute your cell.
Network Systems Sales LLC
09/04/2015Unit 2 (b) Back-Office processes Unit 2 Assessment Criteria (b) 10 marks.
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
MONITORING TOOLS Open Source Security Tools to monitor your network.
Module 5: Configuring Access to Internal Resources.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Windows Network Policy Server Fundamentals Ranjana Jain MCSE, MCT, RHCE, CISSP, CIW Security Analyst IT Pro Evangelist Microsoft India
Understanding and Managing WebSphere V5
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Team - CA CSCI 5234 Web Security.  Collect and document information of ecommerce security mechanisms.  Using: wiki engine for collaboration.
© 2012 IBM Corporation Tivoli Workload Automation Informatica Power Center.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
OWASP Logging Project Presentation by Marc Chisinevski.
Scanners Inventory all machines on site; 12,000+ nmap farm All machines usually twice a day Find critical vulnerabilities and issue blocks Nessus Homegrown.
OM. Brad Gall Senior Consultant
How to monitor Windows file share activity on your network Aisling Dillon.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Introduction to our On-Line Self Service Center at
Simply Powerful Tuesday, June 9, :00 – 10:00 AM PDT We will begin ~5 minutes past the hour Bulk Mailer Professional and Business: It makes sense.
Session 10 Windows Platform Eng. Dina Alkhoudari.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Copyright 2000 eMation SECURITY - Controlling Data Access with
Vantage Report 3.0 Product Sales Guide
Web Application Firewall (WAF) RSA ® Conference 2013.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
TEAM Basic TotalElectrostatic ManagementAwareness&
INTRODUCTION TO WORDPRESS. About WordPress The free service that we will use from WordPress is often used as blogging software – very little knowledge.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
The Filer Proj-354 Apr 29 th, 2010 Group members Henry Au Wayne Choi Jaewon Yoo
A U.S. Department of Energy Office of Science Laboratory Operated by The University of Chicago Argonne National Laboratory Office of Science U.S. Department.
XA System-Link A Powerful Development Tool
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
ArcGIS Server for Administrators
How to Start Using MyData. So you’re new to MyData… 1.The shortcut to the MyData website is 2.This will.
Server Performance, Scaling, Reliability and Configuration Norman White.
Integrating and Troubleshooting Citrix Access Gateway.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
1 FOCUS ON THE CUSTOMER Support without SLA Based on the EPAM – ZOETIS partnership ROMAN VITYK – EPAM SYSTEMS AARON HAYDO – ZOETIS AUGUST 4, 2015.
Overview SessionVista™ Enterprise is the first integrated network monitoring and control appliance that combines application layer firewall capabilities.
What’s new in LANGuardian 12? By Aisling Brennan.
Database Security DAC MAC Application Servers Web Encryption Users/Roles Stored Procedures, Views.
Michael Miller Senior Director Real-Time Collaboration Products Oracle Collaboration Suite 10g Oracle Corporation.
Installing the ALSMS Software on a Windows Platform Configuration Example Alcatel-Lucent Security Products Configuration Example Series.
1 Presented by: Val Pennell, Test Tool Manager Date: March 9, 2004 Software Testing Tools – Load Testing.
An Introduction to Attendance on Demand
Top 5 Open Source Firewall Software for Linux User
Configuring ALSMS Remote Navigation
Tor Good + Evil.
WEBINAR Introduction to ViconNet 3.0 October 26, 2005
Securing the Network Perimeter with ISA 2004
Implementing TMG Server Publishing
Aisling Brennan 20th March 2014
NSE4-5.4 Dumps
Getting Started with LANGuardian
SharePoint Essentials Toolkit
DTN Training Welcome to: The session will begin shortly. SAY
Adoption of IP in the Next-Generation Contact Center (SIP-02)
Designing IIS Security (IIS – Internet Information Service)
Field installable, upgradeable and scaleable
Presentation transcript:

NetFort Customer Webinar Getting back to basics – Using LANGuardian Aisling Brennan 26 th Feb 2015

Slide 2 Today’s content will cover the basics about getting started with LANGuardian Ask questions!! No attendee left behind Ask questions using the chat box and we will do our best to cover them all Today’s session is being recorded A Few Notes About Today’s Session

Slide 3 What is LANGuardian and what it can do for you? How is it Done? Where does LANGuardian fit on your network? DEMO LANGuardian dashboards & LANGuardian Search (Forensics, FAM, Web activity, BW troubleshooting) & Security reports Q&A Agenda

Slide 4 LANGuardian is industry leading DPI software for monitoring, reporting on and troubleshooting network and user activity Continuously monitor network & user activity Real time and historical activity By IP address and username Find out what users are doing on the network across the network even internally Gives way more detail than tools based on netflow or log tools What is LANGuardian?

Slide 5 LANGuardian can be installed on physical or virtual platforms You do not need an operating system or database No need to install agents or clients on servers or workstations All you need is a SPAN or mirror port off your core switch Before you start

Slide 6 Where does it fit in your network?

Slide 7 Where does it fit in your enterprise network

Slide 8 CBAR local rules Report variables Hostname labels Server port labels Changes to report categories Changes to report menus DON’T FORGET TO UPGRADE!! LANGuardian 12.3 (it’s all about customisation)

Slide 9 Upgrade IDS to Snort 2.9 or Suricatta Bulk import of IDS signatures Boost data acquisition to 4 Gb/s Faster report execution Pan/zoom trends New GUI SSL decoder (record access to https sites). Roadmap

Slide 10 Would you be happy to share any use cases or feature requests that you think would add further value to the LANGuardian? Use Cases