Skip to content

Jay Kay Technology Conference – PFU

May 9, 2015


These are my notes from the various sessions as part of the 2015 Jay Kay Technology Conference. – Todd


Carmine Clementelli

Network Exposure – 60 to 80 percent of network misuse incidents originate from the inside network. Cost of an internal breach is higher than an external breach.

Today’s Vectors for Attacks and Network MIsuse

  1. Unauthorized devices on the network
  2. Use of Risky Applications
  3. Application Attack

iNetSec Smart Finder

It is a rackmount appliance to be installed in the data centre, or as a VM. If it is internally deployed, immediately blocks attacks. Can trunk VLAN’s onto a port, can also mirror a port from a switch. Using both will give you the quickest and most data. Can be used to automatically approve / block particular applications, or devices. Tracks pieces by MAC address. Entirely agentless.

It appears to be like a packet sniffer on steroids. Not only can it pick up and track the traffic, it can also use some basic TCP tools to block the traffic from happening. Very slick product. Pricing is around $7,000. Really only takes a look at the local site, doesn’t look beyond the local site.



Leave a Comment

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: