webinar - is your deep packet inspection testing deep enough
DESCRIPTION
Watch this short security webinar to learn more about the the impact of BYOD (bring your own device), how traffic inspection is more than just the application and listen to real word case study examples such as how datasheet performance claims stand up against the reality and how specific security protocols impact performanceTRANSCRIPT
PROPRIETARY AND CONFIDENTIAL
Is your Deep Packet Inspection testing ‘Deep’ enough?
Ankur Chadda
Product Marketing Manager
PROPRIETARY AND CONFIDENTIAL
The Application Explosion – it never ends!
PROPRIETARY AND CONFIDENTIAL
What are IT Departments Asking for…
PROPRIETARY AND CONFIDENTIAL
Understanding Malware
Short for Malicious Software Represents hostile software used to
• Disrupt computer operation
• Gather sensitive information
• Gain access to private computer systems
Common malware types:• Adware
• Keyloggers
• Ransomware
• Rootkits
• Spyware
• Trojan Horses
• Viruses
• Worms
Source: PandaLabs Annual Report for 2012 by Panda Security
MALWARE INFECTIONS BY TYPE IN 2012
PROPRIETARY AND CONFIDENTIAL
Malware Testing
• Test security counter measures and policies for detecting spreading malware
Infected host emulation
• Test inline or antivirus detection effectiveness
Binary transfer emulation
• Test the effectiveness and accuracy of your security devices and policies under real work load
Malware testing under application
load
PROPRIETARY AND CONFIDENTIAL
Summary
BYOD adds complexity with number of devices, endpoints and versions of apps on your network
Security infrastructure testing is no longer legacy firewall testing, but more involved with multiple vectors
Realistic emulation critical to understand actual impact
www.spirent.com
PROPRIETARY AND CONFIDENTIAL
To listen to the full webinar visit: http://www.spirent.com/OnDemand/Networks_and_Applications/DPI_Testing