subscribe to Peeks | newsletter archives | March 2012 | Volume 4 Issue 2

 
Peeks Newsletter Heading
spacer long rule

LETTER FROM THE EDITOR

Winter will soon be on its way out and Spring on its way in. We are looking forward to the upcoming installment of our Coffee Corner chat series with Jay and Chris on Cyber Security. You can check out previous chats on our YouTube channel as they address everything from VoIP analysis to wireless.

Cyber security has been a topic on everyone's mind with the recent Symantec security breach and other publicized network hacks, driving home the fact that companies need to have contingency plans in place, as no amount of security can protect all of your data all of the time. With this in mind, we are releasing our Cyber Attack Preparedness kit as well as a whitepaper dedicated to network forensics. Be sure to check out all we have to offer on the security front.

We're having another quiz this month! The topic? Application visibility. The prize? If you ace it, you have a chance to win one of two $125 Amazon Gift Cards (US entrants only). Good luck!

As always, we would like to thank you for subscribing to the Peeks Newsletter. We continue to strive to provide you with engaging and informative content and hope that you'll join us this Spring – virtually at one of our webinars or in person at one of our roundtables.

Sincerely,
Eden Signature
Eden Hensley
Director of Marketing Communications

long rule

FOCUS ON: Cyber Security

In light of the recent headlined cyber security breaches, we wanted to highlight an integral, but often overlooked, part of your network security plan: network forensics. Network forensics is crucial both for protecting your network from breaches as well as understanding what has happened after an attack has occurred. Not only does network forensics help you solve security attacks, it can also help you on a business front with violations of industry regulations to degradation in application performance. Whether accidental or malicious, the key is to have a solution in place now – before you have a need for incident analysis or require data to investigate an attack.

  • Our Cyber Attack Preparedness Kit provides you with the tools you need to analyze cyber attacks and network security breaches. As criminals get smarter and savvier every year being able to detect and characterize attacks - whether they've just begun or occurred days ago - is crucial to protecting your data. Download now.
  • Our network forensics white paper takes you through the three phases of digital investigation, so that if your network experiences an attack, you can get to the root cause of the problem quickly. Download now.
  • In case you missed it in February, be sure to check out our OnDemand webcast "Cyber Security – IDS/IPS is Not Enough" to help dispell some of the false sense of security that companies have with IDS/IPS protection systems. Watch now.

long rule

EXTENSIBILITY SOFTWARE: New Cloud Stats Plug-in

As more companies transition to the cloud, the use of IT systems and networks also undergoes a transformation. Users make less "internal" connections in exchange for connections to hosted, cloud-based systems. In order to help ease this transition, WildPackets has come up with a Cloud Stats plug-in that makes it easier for network administrators to manage their networks by recognizing a cloud service by name, not IP address. Now you can display the host names of cloud services in OmniPeek. If you are an OmniPeek user, you can download the plug-in here.

long rule

RECENT NEWS

Contributed Articles

Media Coverage

Top of Side Box

VIDEO SPOTLIGHT

youtube screenshot

With cyber attacks happening more frequently, you need an "insurance policy" to protect yourself. Not an IPS/IDS, but a total solution which will capture the breach or attack as it happens, providing you with all the data you need to determine exactly how the breach happened, what information was compromised, and how to tune your existing security solutions to block similar attacks in the future. And the name of that insurance policy is TimeLine from WildPackets. Join Jay and Chris to hear more about Cyber Security.

Short Rule

TRAINING

WP-202 Advanced WLAN Assessment and Analysis
April 16 – 19, 2012

WP-203 VoIP (Voice over IP) and Video Analysis and Troubleshooting
May 14 – 17, 2012

Short Rule

NETWORK PERFORMANCE ROUNDTABLES

Kansas City, MO
March 13, 2012

Cincinnati, OH
March 15, 2012

Los Angeles, CA
March 20, 2012

Greenville, SC
March 27, 2012

Houston, TX
March 28, 2012

Charlotte, NC
March 29, 2012

Short Rule

WEB SEMINARS

802.11 – Who's Ready for 802.11ac and ad?
March 14, 2012
8:30 AM PDT

VoIP and VoFi – Quietly Competing for Your Network Bandwidth
April 18, 2012
8:30 AM PDT

Just Two Clicks Away – From Monitoring and Reporting to Root-Cause Analysis
May 16, 2012
8:30 AM PDT

Short Rule

TRADESHOWS

Aruba Networks Partner Summit
Las Vegas, NV
March 19 – 21, 2012

Cisco Live! Australia
Melbourne, Australia
March 20 – 23, 2012

INTEROP
Las Vegas, Nevada
May 8 – 12, 2012

Cisco Live! San Diego
San Diego, California
June 10 – 14, 2012

Short Rule

PRODUCT NEWS

Here are updates to our extensibility software since the last Peeks: Cloud Stats Plug-in Version 1 and Engine Remote Adapter Sample.

Short Rule

JOIN OUR DISCUSSIONS


Bottom of Side Box

WildPackets is now Savvius

For the latest information on our products and services please go to our new site at www.savvius.com.

We are in the process of migrating some of our legacy content to our new site, so Wildpackets.com is still available. If the content you are looking for has already been migrated we will automatically redirect you.