webinar - is your deep packet inspection testing deep enough

7
PROPRIETARY AND CONFIDENTIAL Is your Deep Packet Inspection testing ‘Deep’ enough? Ankur Chadda Product Marketing Manager

Upload: spirent-communications

Post on 25-May-2015

617 views

Category:

Technology


0 download

DESCRIPTION

Watch this short security webinar to learn more about the the impact of BYOD (bring your own device), how traffic inspection is more than just the application and listen to real word case study examples such as how datasheet performance claims stand up against the reality and how specific security protocols impact performance

TRANSCRIPT

Page 1: Webinar - Is your deep packet inspection testing deep enough

PROPRIETARY AND CONFIDENTIAL

Is your Deep Packet Inspection testing ‘Deep’ enough?

Ankur Chadda

Product Marketing Manager

Page 2: Webinar - Is your deep packet inspection testing deep enough

PROPRIETARY AND CONFIDENTIAL

The Application Explosion – it never ends!

Page 3: Webinar - Is your deep packet inspection testing deep enough

PROPRIETARY AND CONFIDENTIAL

What are IT Departments Asking for…

Page 4: Webinar - Is your deep packet inspection testing deep enough

PROPRIETARY AND CONFIDENTIAL

Understanding Malware

Short for Malicious Software Represents hostile software used to

• Disrupt computer operation

• Gather sensitive information

• Gain access to private computer systems

Common malware types:• Adware

• Keyloggers

• Ransomware

• Rootkits

• Spyware

• Trojan Horses

• Viruses

• Worms

Source: PandaLabs Annual Report for 2012 by Panda Security

MALWARE INFECTIONS BY TYPE IN 2012

Page 5: Webinar - Is your deep packet inspection testing deep enough

PROPRIETARY AND CONFIDENTIAL

Malware Testing

• Test security counter measures and policies for detecting spreading malware

Infected host emulation

• Test inline or antivirus detection effectiveness

Binary transfer emulation

• Test the effectiveness and accuracy of your security devices and policies under real work load

Malware testing under application

load

Page 6: Webinar - Is your deep packet inspection testing deep enough

PROPRIETARY AND CONFIDENTIAL

Summary

BYOD adds complexity with number of devices, endpoints and versions of apps on your network

Security infrastructure testing is no longer legacy firewall testing, but more involved with multiple vectors

Realistic emulation critical to understand actual impact

www.spirent.com

Page 7: Webinar - Is your deep packet inspection testing deep enough

PROPRIETARY AND CONFIDENTIAL

To listen to the full webinar visit: http://www.spirent.com/OnDemand/Networks_and_Applications/DPI_Testing