Stay up to date with technology hot topics for Cyber Security, Network & Application Performance Monitoring, Network Test & Validation and Network Traffic Access getting the right data to the right Security and Monitoring resources.
The Anatomy of a spear-phishing attack
Email and spear-phishing are still the preferred tactics by cyber-criminals to initiate attacks on your organisation. Anti-spam and secure email gateways, whether they are on-premises or in the cloud, are vulnerable to spear-phishing and advanced targeted attacks.
Advanced Email Protection with up to 60% off*
ETP Cloud defends against the types of email-based Spam, Viruses, Spear-Phishing, Ransomware & Advanced Attacks that can bypass anti-virus software.
Demo overview of CloudShell, the leading cloud sandboxing platform for turning your dev/test labs, demo/PoC labs, support / training centres, and data centres into DevOps friendly self-service clouds. CloudShell gives all your users access to personal replicas of production environments.
Introduction to CloudShell Blueprints and Sandboxes. A Blueprint is an offline environment template, which contains the resources, connections and configurations required from the environment it represents. A sandbox is a live, isolated instance of the blueprint that allows users to consume and interact with its components.
Quali’s Cloud Sandboxing solution for cyber ranges allows enterprises to rapidly provision full-stack, real-world cyber environments in seconds. In this demo see how you can easily manage the entire lifecycle from modelling, deploying and monitoring to reclaiming cyber sandboxes.
The use of self-service infrastructure blueprints can support many permutations and achieve the benefits of Continuous Integration to address these challenges. This video introduces how to accelerate NFV certification as part of your deployment strategy using Quali’s Cloud Sandbox platform.
Video overview of CloudShell, the leading Lab-as-a-Service automation and orchestration platform for turning your test lab, demo/PoC lab, support / training centre, or data centre into a DevOps friendly self-service cloud.
Take a minute and a half to learn what wire data is, and why it is the linchpin of any successful IT operations analytics practice.
Give your security tools visibility of malware locked in SSL traffic
Gartner estimates that 50% of all network attacks will hide in SSL by 2017.
This short video from Blue Coat explains how you can unlock your SSL traffic to provide your active and passive security devices with visibility of malware that previously would have entered your network without detection.
You can learn more about the Blue Coat SSL appliance and request a demonstration here.
Network Time Protocol (NTP) over Anycast
Do you need a simple and reliable way to deploy time synchronisation over large-scale networks?
Our Spectracom range of time servers include a NTP over Anycast feature to greatly simplify network synchronisation deployments. You can use a single server address for NTP clients whilst optimising a high availability and scalable server configuration.
The Leap Second challenge
26 Leap Seconds have occurred since 1972 and will continue to do so until a global consensus is reached for a suitable replacement for Coordinated Universal Time (UTC).
If your systems are synchronised, you need to know how your network devices, systems and applications will respond to the next leap second. View our short video to learn more about how you can combat the effects leap seconds can have on your IT environment.
VSS Monitoring, Time Stamping NTP Edition
Time Stamping in VSS Distributed Taps. This unique feature enables users to apply a time stamp on a packet as it enters the tap – before aggregation and filtering are applied. This is a critical feature for time-sensitive environments, as it allows monitoring tools to take advantage of multi-point, optimised views of traffic without concern over latency.
For more information on the VSS Monitoring Distributed Series please visit the solution overview page here.
Analysing the Xangati Dashboard Data
This in-depth tour of the Xangati dashboard discusses how to generate and analyse the data displayed within the Xangati VI and VDI Dashboards.
It reveals virtual infrastructure behavior and shows how to spot anomalies in performance issues through reports and recordings. This video is ideal for someone who has installed the trial version and wants to know basic navigation techniques for their own infrastructure.