Network Intelligence .

12
• Network Intelligence https://store.theartofservice.com/the-network-intelligence- toolkit.html

Transcript of Network Intelligence .

Page 1: Network Intelligence .

• Network Intelligence

https://store.theartofservice.com/the-network-intelligence-toolkit.html

Page 2: Network Intelligence .

Wi-Fi Multiple access points

1 Except for the smallest implementations (such as home or

small office networks), Wi-Fi implementations have moved toward "thin" access points, with more of the

network intelligence housed in a centralized network appliance,

relegating individual access points to the role of "dumb" transceivers

https://store.theartofservice.com/the-network-intelligence-toolkit.html

Page 3: Network Intelligence .

EMC Corporation Major acquisitions

1 2006–2010 Avamar, Iomega, Data Domain, Isilon Systems Bus-Tech, Indigo Stone

Kashya, nLayers, Voyence, Infra Corporation, WysDM, Configuresoft, Fastscale Pro

Activity, X-Hive, Dokumentum, Document Sciences, Kazeon Akimbi, YottaYotta

Interlink, Geniant, Business Edge, Conchango RSA Security, Authentica,

Network Intelligence, Valyd, Verid, Tablus, Archer Technologies Mozy, Pi, Source Labs

Greenplum

https://store.theartofservice.com/the-network-intelligence-toolkit.html

Page 4: Network Intelligence .

WiFi - Multiple access points

1 Except for the smallest implementations (such as home or

small office networks), Wi-Fi implementations have moved toward thin access points, with more of the

network intelligence housed in a centralized network appliance,

relegating individual access points to the role of dumb transceivers

https://store.theartofservice.com/the-network-intelligence-toolkit.html

Page 5: Network Intelligence .

Verisign - History

1 For the year ended December 31, 2010, Verisign reported revenue of $681 million, up 10% from

$616 million in 2009.[https://investor.verisign.com/releasedetail.cf

m?ReleaseID=546077 VERISIGN REPORTS 10% YEAR-OVER-YEAR REVENUE GROWTH IN 2010]

Verisign operates two businesses, Naming Services, which encompasses the operation of top-level domains and critical Internet infrastructure,

and Network Intelligence and Availability (NIA) Services, which encompasses DDoS mitigation,

managed DNS and threat intelligence.

https://store.theartofservice.com/the-network-intelligence-toolkit.html

Page 6: Network Intelligence .

Network Neutrality - End-to-end principle

1 Contrary to this idea, the research paper titled End-to-end arguments in system design by Saltzer, Reed, and

Clark argues that network intelligence doesn't relieve end

systems of the requirement to check inbound data for errors and to rate-limit the sender, nor for a wholesale

removal of intelligence from the network core.

https://store.theartofservice.com/the-network-intelligence-toolkit.html

Page 7: Network Intelligence .

Network intelligence

1 'Network Intelligence (NI)' is a technology that builds on the

concepts and capabilities of Deep Packet Inspection (DPI), Packet

capture|Packet Capture and Business Intelligence (BI)

https://store.theartofservice.com/the-network-intelligence-toolkit.html

Page 8: Network Intelligence .

Leidos - Operations

1 Trailblazer was a Digital Network Intelligence system, intended to

analyze data carried on computer networks

https://store.theartofservice.com/the-network-intelligence-toolkit.html

Page 9: Network Intelligence .

NetScout Systems, Inc. - History

1 In early 2006, Network General acquired Fidelia Technology, adding the NetVigil Business Service Monitoring technology

to their network and application performance analysis tools. In

September 2007, Network General agreed to be acquired by NetScout

Systems. In November 2007, NetScout acquired their Sniffer, Infinistream, and

Network Intelligence product lines.

https://store.theartofservice.com/the-network-intelligence-toolkit.html

Page 10: Network Intelligence .

Next-Generation Firewall - Next-Generation Firewall vs. Traditional Firewall

1 NGFWs encompass the typical functions of traditional firewalls such as packet filtering,[http://www.cnmeonline.com/features/next-gen-

security/ Next gen security] - by Ben Rossi - 07 August, 2012 network- and port-address Translation (NAT), stateful inspection,

and virtual private network (VPN) support.[http://www.niiconsulting.com/solutions/next-generation-

firewalls.html Next Generation Firewall (NGFW)] - Network Intelligence However, as threats continue to move up the OSI stack to include layer 7 and user-targeted attacks make the network user

increasingly vulnerable to security risks, enterprises need actionable intelligence and controls across all layers of the

computing stack, including the User Layer 8 [L2-L8].[http://www.cyberoam.com/NGFW/ NEXT-GENERATION

FIREWALLS] - Cyberoam An NGFW should be able to verify a user’s identity and allow user-based policy enablement accordingly.

https://store.theartofservice.com/the-network-intelligence-toolkit.html

Page 11: Network Intelligence .

Pinwale

1 'Pinwale' is the code name for an NSA collection and retrieval system

for so-called Digital Network Intelligence, including internet e-

mail., page [http://www.webcitation.org/6OHW3UQVy 1] at archive. It is searchable by

monitored NSA analysts.

https://store.theartofservice.com/the-network-intelligence-toolkit.html