© 2006 Property of Lancope. Proprietary and Confidential. Lancope and Emory University: Illuminating (and Securing) the Network Andy Wilson Senior Systems.

Slides:



Advertisements
Similar presentations
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Advertisements

Glenn Johnson John A. Dutton e-Education Institute Project Manager, Penn States e-Portfolio Initiative Glenn Johnson John A. Dutton e-Education Institute.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
What Does the Net Generation Expect From Us? SAC August 8, 2005 SAC August 8, 2005 Copyright © 2005, Joel L. Hartman. This work is the intellectual property.
While You Were Out: How Students are Transforming Information and What it Means for Publishing Kate Wittenberg The Electronic Publishing Initiative at.
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
Copyright John F (Barry) Walsh This work is the intellectual property of the author. Permission is granted for this material to be shared for non-
Another Tale Ted Krupicka Associate Director University Information Services Pacific University Forest Grove, Oregon Copyright Ted Krupicka,
Design & Development Scott Battaglia Application Developer Enterprise Systems and Services Rutgers, the State University of New Jersey
Copyright Sylvia Maxwell and Michael White, This work is the intellectual property of the author. Permission is granted for this material to be shared.
Copyright Brian T. Huntley and Tim Antonowicz 2007 This work is the intellectual property of the authors. Permission is granted for this material to be.
Wallace C. Arnold Director, HU Data Conversion & Management Laboratory Debra S. White Assistant Provost for Technology Hampton University: Public and.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
© 2007 Property of Lancope. Proprietary and Confidential. Enterprise Situational Awareness and Monitoring through Network Behavior Analysis Mark McDaniel,
Providing Scalable 24/7 Support Track 3: Harborside Ballroom E Tuesday, January 15 th 2:30 to 3:15 pm Ronald Ardron, Jr., Manager of Technical Support.
Mobile Computing and Security Authenticated Network Access (ANA) Jon Peters Associate Director Dave Packham Manager of Network Engineering NetCom University.
Moving Your Paperwork Online Western Washington University E-Sign Web Forms Copyright Western Washington University, This work is the intellectual.
Invent the Future. Some information about VT ~28,000 students; 83% UG/17% Graduate Most users publish/utilize a single address such as
Sharing MU's SharePoint Experience 2005 Midwest Regional Conference Innovative Use of Technology: Getting IT Done Wednesday, March 23, 2005.
Stanford’s Patch Management Project   Ced Bennett May 17, 2004 Copyright Cedric Bennett This work is the intellectual property of the author. Permission.
Managing Enterprise Directories: Operational Issues Performance Monitoring Brendan Bellina, University of Notre Dame Base CAMP – Tempe, Arizona February.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Beyond the Campus Gates: Bringing Alumni, Parents, and Prospects into the Campus Portal William P. Wilson Mark R. Albert John C. Duffy Gettysburg College.
What comes after reliability? Dave King Executive Director Indiana Higher Education Telecommunication System StateNets04 February 2004 Tempe.
Moving Your Paperwork Online University of California, Irvine presents PayQuest Copyright UC,Irvine This work is the.
Counting the Costs Mark Piper - University of Newcastle Steve Robertson - Campus Consulting Copyright Steve Robertson and Mark Piper, This work is.
Copyright Michael White and Sandra Thompson, This work is the intellectual property of the author. Permission is granted for this material to be.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Issues Associated with ePortfolios in Small Colleges EDUCAUSE Mid-Atlantic Regional Conference 2006 Ed Barboni, Senior Advisor, Council of Independent.
Higher Education and the New International Imperative David Ward President American Council on Education Global Challenges and Higher Education Duke University.
Rhode Island Network for Educational Technology, Inc Update Sharon Hussey Executive Director Copyright Sharon L. Hussey, This work is the intellectual.
Grids USC Case Study Copyright Shelley Henderson This work is the intellectual property of the author. Permission is granted for this material to.
Copyright ©2011 by Rachel Fourny ONLINE TESL RESOURCES.
Research and Education Networking Information Sharing and Analysis Center REN-ISAC John Hicks TransPAC2/Indiana University
Using Levels of Assurance Well, at least thinking about it…. MAX (just MAX)
ONLINE TESL RESOURCES ©Copyright Rachel Fourny 2010.
George Mason University Assessing Technology Support: Using Portfolios to Set Goals and Measure Progress Anne Agee, Star Muir, Walt Sevon Information Technology.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 NMI R3 Enterprise Directory Components.
Getting Everyone "On Board" for a Major IT Project Presentation to CUMREC MAY 16, 2002 Warren Mills, CEO Copyright Advantiv, Inc This work is the.
Learning & Teaching = Activities Copyright Steve Ehrmann & Nikki Reynolds, This work is the intellectual property of the author. Permission is granted.
Security Through Network Intelligence Lancope StealthWatch Technology.
EDUCAUSE 2006 Electronic Portfolios, A Perfect Solution to Assessment in an Online English Composition Course Dr. Mary Jane Clerkin Copyright Dr. Mary.
©Stephen Kingham SIP Protocol overview SIP Workshop APAN Taipei Taiwan 23rd Aug 2005 By Stephen Kingham
Scalable Bandwidth on Demand: A New Model for the Era of Entitlement? Educause Mid-Atlantic Regional Conference January 17, 2003 Gregory D. Palmer Jennifer.
Integration is Critical for Success Curriculum Course Delivery Ongoing Support Instructor & Learner.
Improving the Social Nature of OnLine Learning Tap into what students are already doing Tap into what students are already doing Educause SWRC07 Copyright.
What’s Happening at Internet2 Renee Woodten Frost Associate Director Middleware and Security 8 March 2005.
Copyright © 2011 Rachel Fourny. This work is the intellectual property of Rachel Fourny. Permission is granted for this material to be shared for non-commercial,
Recent Developments in Directories: Performance Monitoring with “Look” Brendan Bellina, University of Notre Dame Spring 2003 Internet2 Member Meeting.
WebISO, Single Sign-On & Authorization General Overview Shelley Henderson Project Manager, Grid Software USC Information Services Copyright.
The Duluth Area CIO’s Consortium Collaborating with Regional IT Organizations Copyright Linda Deneen and Lynne Hamre, This work is the intellectual.
Copyright James Kulich This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
© 2009 Pittsburgh Supercomputing Center Server Virtualization and Security Kevin Sullivan Copyright Kevin Sullivan, Pittsburgh Supercomputing.
Chief Information Officer Effectiveness in Higher Education Wayne Brown, Ph.D. Copyright Wayne Brown This work is the intellectual property of the.
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
© Scottsdale Community College Leveraging the Power of E-Learning Taking your course to a higher level Presented by Sidne Tate Director, Instructional.
October 2006 Funded by JISC and ESRC to serve the UK academic and research communities. Voyage of the U.K. JISC Federation: Shibbolizing the U.K.'s Research,
Application Protocol - Network Link Utilization Capability: Identify network usage by aggregating application protocol traffic as collected by a traffic.
Breaking Down Barriers & Building Bridges Improves Customer Satisfaction & Efficiency Wendy Woodward | March 15, 2011 Copyright Wendy Woodward 2011.
SIP Protocol overview SIP Workshop APAN Taipei Taiwan 23rd Aug 2005
Network and Services Management
Copyright Notice Copyright Bob Bailey This work is the intellectual property of the author. Permission is granted for this material to be shared.
Ed Barboni, Senior Advisor, Council of Independent Colleges
Blaine A. Brownell, President,
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
EDUCAUSE Networking 2002 Washington, D.C. April 17, 2002
Presentation transcript:

© 2006 Property of Lancope. Proprietary and Confidential. Lancope and Emory University: Illuminating (and Securing) the Network Andy Wilson Senior Systems Engineer

© 2007 Property of Lancope. Proprietary and Confidential. Copyright Lancope Inc This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

© 2007 Property of Lancope. Proprietary and Confidential.  6 years focused research in flow-based (proprietary, NetFlow, sFlow) network security technologies  Based in Atlanta, GA. Holder of 8 Patents.  Founded in 2000 by Dr. John Copeland-Georgia Tech  $24M Venture funding by Canaan Partners, GMG Capital, HIG Ventures and Council Ventures  Experienced Management and Research teams  Flagship product, StealthWatch™, leading enterprise Network Behavior Analysis (NBA) solution  Mature product line (v5.6 – March 2007)  300 customers, protecting 35+ million hosts About Lancope IMSP Member

© 2007 Property of Lancope. Proprietary and Confidential. Benefits of Flow-based Network Behavior Analysis Leverage existing flow data: the “Who, What, When, Where and How” of network traffic –NetFlow – Cisco / Juniper –sFlow - Foundry / Extreme / ProCurve –cFlow - Juniper By turning all routers and switches into a virtual surveillance system Provides valuable intelligence about: –Network Users and Applications –Peak Usage Times –Traffic Routing –Security and Network Health

© 2007 Property of Lancope. Proprietary and Confidential. The Solution: StealthWatch StealthWatch is the flow- based, real-time, single data set for actionable intelligence for Security, Network and IT Operations. Optimizing Security and Network Operations™

© 2007 Property of Lancope. Proprietary and Confidential. Behavior Rather than Signatures Analyze Flows… Establish baseline… Alarm on changes in behavior… Number of concurrent flows Packets per sec Bits per second New flows created Number of SYNs sent Time of day Number of SYNs received Rate of connection resets Duration of the flow

© 2007 Property of Lancope. Proprietary and Confidential. StealthWatch: Functional Overview Collect and Process 130 Unique Flow Statistics Apply Over 130 StealthWatch Algorithms Generate Alarms, Alerts, and Reports Build Profile of 90+ Host Attributes Send SYSLOG, SNMP, and s Perform Mitigation Action Display in UI Mirror Port, SPAN, or Tap Cisco (NetFlow) Foundry (sFlow) Generate Profile-Enhanced Alarms, Alerts, and Reports Store Detailed Log of All Flows

© 2007 Property of Lancope. Proprietary and Confidential. Gaining Visibility + Scalable Deployment

© 2007 Property of Lancope. Proprietary and Confidential. StealthWatch: Optimizing Security & Network Operations Flows

© 2007 Property of Lancope. Proprietary and Confidential. StealthWatch Functional Benefits: Security Operations

© 2007 Property of Lancope. Proprietary and Confidential. StealthWatch Functional Benefits: Network Operations

© 2007 Property of Lancope. Proprietary and Confidential. Links http:// 2827

© 2007 Property of Lancope. Proprietary and Confidential. Questions??