Jay Kay Technology Conference – PFU
These are my notes from the various sessions as part of the 2015 Jay Kay Technology Conference. – Todd
Network Exposure – 60 to 80 percent of network misuse incidents originate from the inside network. Cost of an internal breach is higher than an external breach.
Today’s Vectors for Attacks and Network MIsuse
- Unauthorized devices on the network
- Use of Risky Applications
- Application Attack
It is a rackmount appliance to be installed in the data centre, or as a VM. If it is internally deployed, immediately blocks attacks. Can trunk VLAN’s onto a port, can also mirror a port from a switch. Using both will give you the quickest and most data. Can be used to automatically approve / block particular applications, or devices. Tracks pieces by MAC address. Entirely agentless.
It appears to be like a packet sniffer on steroids. Not only can it pick up and track the traffic, it can also use some basic TCP tools to block the traffic from happening. Very slick product. Pricing is around $7,000. Really only takes a look at the local site, doesn’t look beyond the local site.