subscribe to Peeks | newsletter archives | May 2014 | Volume 6 Issue 5

 
Peeks Newsletter Heading

Letter from the Editor

May is shaping up to be a busy month at WildPackets! We’ll be at Cisco Live in San Francisco from May 18 to May 22. Come visit us at booth #728 – we’ll be giving away a Samsung Galaxy Tablet 3.0! Stop by and ask us about:

  • Packet capture at 10/40/100G
  • 802.11ac wireless troubleshooting
  • Network forensics for security investigation
  • VoIP quality assurance
  • 10G/40G network visibility and analysis

The Target breach continues to generate news with the announcement last week that Target’s CEO would leave the company. Network forensics is an important tool that organizations can deploy to help mitigate the effects of damaging data breaches like the one that happened at Target. This month, we’ve outlined some ways you can use Network Forensics for post-incident response with an informative webinar to demonstrate the power of network forensics with real-world use cases.

Want to learn more about WildPackets Network Forensics solutions? Check out our new security website filled with related topics on security and forensics.

Sincerely,
Glenn Munlawin
Marketing Programs Manager

long rule

Real World Network Forensics

Although the 2013 Cost of Cyber Crime Study by HP and the Ponemon Institute found that cybercrime costs large enterprises an average of nearly $12 million – a 78% increase from 2009, the time it takes for organizations to resolve cybercrime attacks rose even more in the same period – increasing 130%. Because network speeds have increased so greatly, networks are too fast for legacy analysis tools, which can’t achieve the detailed packet-level analysis essential for security investigations. Read our blog on how Network Forensics can be used to fully understand what problems have taken place and how to solve them here.

long rule

BYOD and Its Impact on Network Security

Bring Your Own Device (BYOD) is a trend that has only gotten more popular as capabilities of smartphones increase. Unfortunately, the growing number of employees who demand to use their personal devices to complete work-related tasks has left IT managers scrambling to keep their networks secure. Using network monitoring solutions is one of several tactics that IT managers can deploy to ensure that their network stays safe. Learn about how introducing network monitoring as part of a multi-tiered security strategy can ensure your network stays safe, even when accessed by devices you can’t immediately control. Read more here.

Also read:

long rule

How to prevent the next Heartbleed incident

Network breaches are on the rise, and the recent Target data breach has only reiterated how damaging the consequences of a breach can be. Today’s stealthy attacks are still able to bypass security tools like firewalls and IPS systems – but do you have an adequate insurance policy in place in case you do experience a breach?

In this webinar, learn how network forensics can enable your in-house security team to track down, verify, and characterize attacks. And we’ll also share some best practices for configuring packet captures to help your organization pinpoint and remediate anomalous behavior that could signal an attack. Join us for this informative and timely seminar.

long rule

Webinar: Network Forensics: Your Insurance Policy for Network Breaches

Network breaches are on the rise, and the recent Target data breach has only reiterated how damaging the consequences of a breach can be. Today's stealthy attacks are still able to bypass security tools like firewalls and IPS systems – but do you have an adequate insurance policy in place in case you do experience a breach?

In this webinar, learn how network forensics can enable your in-house security team to track down, verify, and characterize attacks. And we'll also share some best practices for configuring packet captures to help your organization pinpoint and remediate anomalous behavior that could signal an attack. Join us for this informative and timely seminar.

long rule

trial.jpg

long rule

WildPackets Support Forum

Are you a WildPackets customer? Our support forums are a great place to look if you have a support question. If you don't see the answer to your question, you can post it and one of our technical support staff will get back to you as soon as possible. Click here to visit the page or check out some of our popular posts below

long rule

Recent News

Media Coverage

Press Release

VIDEO SPOTLIGHT

Short Rule

In case you missed our April webinar, "Network Visibility: The Key to Rapidly Troubleshooting Network Performance Issues,”check out a quick preview of the webcast talking about the four choices of network visibility. The full OnDemand webcast can be accessed here and the slides here.

Short Rule

bundle

Short Rule

WEBINARS

Short Rule

Network Forensics: Your Insurance Policy for Network Breaches Webinar
May 28 – 8:30 AM PST

Gigabit WLANs Need Gigabit WLAN Analysis
June 18 – 8:30 AM PST

NETWORK MONITORING
WORKSHOPS

Short Rule

Our Network Monitoring Workshops are free, half-day workshops on best practices for monitoring, analyzing, and troubleshooting highly utilized 10G networks, VoIP, virtual network infrastructures, wireless networks, and much more. Lunch is included. See if we’re coming to your city!

JOIN OUR DISCUSSIONS

Short Rule


Did you receive this email from a friend? Subscribe today to have Peeks delivered to your inbox.

right shadow

WildPackets is now Savvius

For the latest information on our products and services please go to our new site at www.savvius.com.

We are in the process of migrating some of our legacy content to our new site, so Wildpackets.com is still available. If the content you are looking for has already been migrated we will automatically redirect you.