Transcript
Page 1: Webinar - Is your deep packet inspection testing deep enough

PROPRIETARY AND CONFIDENTIAL

Is your Deep Packet Inspection testing ‘Deep’ enough?

Ankur Chadda

Product Marketing Manager

Page 2: Webinar - Is your deep packet inspection testing deep enough

PROPRIETARY AND CONFIDENTIAL

The Application Explosion – it never ends!

Page 3: Webinar - Is your deep packet inspection testing deep enough

PROPRIETARY AND CONFIDENTIAL

What are IT Departments Asking for…

Page 4: Webinar - Is your deep packet inspection testing deep enough

PROPRIETARY AND CONFIDENTIAL

Understanding Malware

Short for Malicious Software Represents hostile software used to

• Disrupt computer operation

• Gather sensitive information

• Gain access to private computer systems

Common malware types:• Adware

• Keyloggers

• Ransomware

• Rootkits

• Spyware

• Trojan Horses

• Viruses

• Worms

Source: PandaLabs Annual Report for 2012 by Panda Security

MALWARE INFECTIONS BY TYPE IN 2012

Page 5: Webinar - Is your deep packet inspection testing deep enough

PROPRIETARY AND CONFIDENTIAL

Malware Testing

• Test security counter measures and policies for detecting spreading malware

Infected host emulation

• Test inline or antivirus detection effectiveness

Binary transfer emulation

• Test the effectiveness and accuracy of your security devices and policies under real work load

Malware testing under application

load

Page 6: Webinar - Is your deep packet inspection testing deep enough

PROPRIETARY AND CONFIDENTIAL

Summary

BYOD adds complexity with number of devices, endpoints and versions of apps on your network

Security infrastructure testing is no longer legacy firewall testing, but more involved with multiple vectors

Realistic emulation critical to understand actual impact

www.spirent.com

Page 7: Webinar - Is your deep packet inspection testing deep enough

PROPRIETARY AND CONFIDENTIAL

To listen to the full webinar visit: http://www.spirent.com/OnDemand/Networks_and_Applications/DPI_Testing


Top Related